(TNS) — An ice storm 10 years ago proved a learning experience for some local agencies, and proof of proper preparedness for others.
The ice storm of 2005 left more than 75,000 residents without power for several days, killed four people and devastated the city and county.
Looking back, Russ Decker, director of the Allen County Emergency Management Agency, said the neat thing about the storm was Allen County’s actions after it.
“When it was over, the first thing everybody wanted to do was get together and figure out what we can do” better next time, he said.
The results left more municipalities and county agencies ready in case there is a repeat of 2005’s disaster.
High-profile data breaches at well-known companies such as Home Depot, Staples and Sony have shined a bright spotlight on data security, or the lack of it. But these breaches have also raised an alarm within these public companies and other organizations. Many more companies, including big IT service providers, have elevated the job of IT security to the C-level, a highly visible response to what is now a highly visible issue.
“Security jobs are being moved to the C-suite because the billions lost to data breaches are a C-level problem,” said Arthur Zilberman, CEO, LaptopMD.com, a New York-based computer repair company.
Traditionally, insurance agencies do not reward companies that stay out of trouble. The idea is to split the cost of compensation to a few unfortunate enterprises among the larger number of all enterprises that take out an insurance policy. Compensation is paid according to the nature of the insurance claim presented and the terms of the policy. However, it can only be made if risks can be evaluated and damage calculated. Some aspects such as damage to a company’s brand may be impossible to assess, even if they have a major negative impact. Insureds and insurers try to work with quantifiable factors. But smart enterprises know there is additional leverage to be gained when putting insurance in place.
TORONTO – CNA today announced that its $2.9 billion Specialty Lines business, which has market-leading positions in professional and management liability, financial and other specialized property and casualty insurance products and services, will begin offering specialty products in Canada effective January 1, 2015.
"This announcement represents our overall strategy to serve the unique and expanding needs of multinational customers. By tapping into the company's deep expertise and the strengths of our current products and services, we were able to create an insurance solution that is tailored specifically for Canada," said John Hennessy, president and chief operating officer, CNA Canada.
In Canada, CNA Specialty will begin accepting submissions for Management Liability and Professional Liability.
Coverage options are available for:
- Directors & Officers (D&O) Liability
- Technology & Telecommunications Liability
- Employment Practices Liability (EPL)
- Fiduciary Liability
- Miscellaneous Professional Liability
For more information, contact Michael O'Connor, vice president & chief underwriting officer, Specialty, at Michael.O'Connor@cna.com.
Serving businesses and professionals since 1897, CNA is North America's eighth largest commercial insurance writer and the 13th largest property and casualty company. CNA's insurance products include standard commercial lines, specialty lines, surety, marine and other property and casualty coverages. CNA's services include risk management, information services, underwriting, risk control and claims administration. All products and services may not be available in all provinces and may be subject to change without notice. For more information, please visit CNA at www.cnacanada.ca. "CNA" is a service mark registered by CNA Financial Corporation with the United States Patent and Trademark Office. Certain CNA Financial Corporation subsidiaries use the "CNA" service mark in connection with insurance underwriting and claims activities.
Business Continuity planning and maintenance cycles often leave little time and few resources for planning how the organization will react if the unexpected actually occurs (their Incident Response).
An analogy can be drawn between healthcare and Business Continuity Management: planning and plan exercise cycles are analogous to maintaining a healthy lifestyle and having regular medical checkups. And when something serious occurs, the medical care system is prepared to react. So should your BCM program.
Trapp Technology has unveiled disaster recovery (DR) services that are designed to deliver physical or virtual data replication, redundant connectivity and high availability of IT infrastructure during downtime recovery.
The Scottsdale, Arizona-based managed service provider (MSP) said its DR services can instantly initiate seamless recovery of applications and data.
"Our clients consistently asked us to assist them with more of their technology needs, disaster recovery being one of the most common requests," DJ Jones, Trapp's vice president of sales and marketing, told MSPmentor. "With the high demand for disaster recovery services, we made sure [these were] a priority."
By Rachel Weingarten
Some brands stay fresh and relevant generation after generation. What makes certain corporate branding strategies timeless while others come and go?
Take Brooks Brothers. No less a person than Abraham Lincoln was one of the brand’s most loyal customers. So how does a nearly 200-year-old company not only stick around, but remain relevant and even cutting-edge?
By Andrew Hiles
Service level agreements (SLAs) and business continuity go hand-in-hand: or they should do!
Whether SLAs are implemented in support of a balanced scorecard to align information and communications technology with business mission achievement, or as a stand-alone initiative, the strategic use of service level agreements can be a perfect solution to the justification of investment in resilience and business continuity: an approach I have been advocating for over ten years.
How does it work?
First, define the business mission.
Take, as an example, a multinational company – call it Klenehost - selling miniature packs of soap, shampoo, hair conditioner and shower gel to the hotel industry. These are packaged in different ways and customized for specific hotel chains.
Proofpoint looks at how information security threats are likely to evolve during the coming year.
2014 was a year in which information security vaulted into the public eye, driven by a surge in both the number and the visibility of data breaches and compromises. This new attention will bring greater scrutiny in 2015, just as the nature and severity of threats continue to evolve for the worst.
Cyberextortion will be the most rapidly growing new threat family
Beginning with the rapid rise of CryptoLocker in late 2013, the threat from ransomware expanded rapidly in 2014, adding not only other ‘extortion malware’ but also spreading to mobile platforms such as Android. Paying the ransom remains arguably a popular option despite its risks, and the estimated $3 million in ransoms generated by CryptoLocker alone has shown cybercriminals the revenue potential of digital extortion schemes. These attacks are difficult to defend against and costly to recover from, and lead to business disruption that extends far beyond the loss of data.
Steven Harrison predicts how business use of cloud computing will develop and change during the next 12 months:
Hybrid is the equaliser
Whilst cloud computing has become an integral part of IT systems, concerns around vendor lock-in, licensing restrictions and security mean that businesses are still resistant to moving all IT operations into a hosted environment. As a result, the hybrid cloud will become the deployment model of choice for those organizations that want to leverage the elasticity of the cloud in tandem with existing infrastructure. The challenge for organizations adopting a hybrid approach is ensuing that systems can run in parallel and operate as one environment to guarantee performance uptime.