• PROTECT AND ENHANCE THE VALUE OF YOUR ENTERPRISE

    FREE CUSTOMIZED DEMO

    The Continuity Logic customized demo provides an opportunity for qualifying organizations to evaluate Frontline Live 5™, with their plans, desired controls, policies, and procedures. This first-of-its-kind system for both business continuity and many other areas of Governance, Operational Risk and Compliance (GRC) is powerful, but often best viewed with some of your familiar plans, data and templates.

    LEARN MORE ABOUT FRONTLINE LIVE 5

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

In 2010, just as the recession’s wave of fiscal calamity was peaking, George Bascom and Todd Foglesong, from Harvard’s Kennedy School of Government, published a report, Making Policing More Affordable. They pointed out that public expenditures on policing had more than quadrupled between 1982 and 2006. But with city budget shortfalls opening up across the country, police departments and their chiefs, once used to ever-growing budgets, were now facing a new reality of cutbacks, layoffs and even outright mergers and consolidations of entire police departments with others. With federal subsidies disappearing (federal support for criminal justice assistance grant programs shrank by 43 percent between 2011 and 2013), thanks to a frugal Congress, police had few options.

With funding spigots turning off, law enforcement agencies must find ways to operate more affordably, according to Bascom and Foglesong. One obvious way is to use technology in more efficient ways. Being more efficient with technology also means being smarter. 

One example can be found in Camden, N.J., a poverty-ridden, high-crime city of 77,000, located on the banks of the Delaware River, across from Philadelphia. Desperate to cut costs, the city disbanded its entire police force. The Camden County Police Department rehired most of the laid-off officers, and hired another 100 at much lower salaries and benefits, to create a consolidated regional police force. The move is considered highly controversial and certainly radical. While police departments in other jurisdictions have merged or consolidated to cut costs, none have gone down the path that Camden has taken.

...

http://www.emergencymgmt.com/safety/Forecasting-Future-Technology-Policing.html

During the January 2014 winter storm that crippled the Atlanta metro area and left thousands stranded on the city’s highways, businesses stepped up to the plate to assist those with nowhere to turn. Home Depot opened 26 stores in Georgia and Alabama to shelter stranded travelers, and other local stores like Walgreens, Wal-Mart, and Target welcomed weary – and cold – drivers who abandoned their cars when it was obvious they were not going to make it home that night. These businesses provided the community with resources and services when people needed them most.

POD

In planning for public health emergencies, communities are quickly learning that businesses are true partners in response and recovery efforts. The private sector has the expertise, resources, and systems that operate every day that can assist in a public health response, be it for a pandemic, terrorist event, or natural disaster. During Hurricane Sandy, for example, big businesses used their commercial supply chain to deliver water, food, and other supplies. As the U.S. Chamber of Commerce says, “when the going gets rough, businesses gets moving.”

Staff at CDC’s Strategic National Stockpile – the largest global stockpile of pharmaceuticals and medical supplies for a public health emergency – are working to help state and local agencies forge these partnerships for both distribution and dispensing efforts and as a way to increase access to medicines in an event that affects that entire community. Partnering with public health is good business, too. These private partners are members of the community and when disaster strikes, they can help keep their employees safe and healthy and their businesses up and running.

POD lines

“As a global manufacturer of computers and computer services, we have committed ourselves to providing our customers with quality products and services,” said a representative from Dell, the information technology powerhouse that has partnered with public health to assist in dispensing medicine to its employees during an emergency. “We are doing the same thing with our employees. We want them to feel good about coming to work and their company taking care of them. That’s why we have gotten very much involved in the points of dispensing program that is being offered by many of our health departments around the country.”

In addition to serving as closed points of dispensing, which allows businesses to provide medicine to their own employees, companies also are coordinating with CDC and their public health departments to provide volunteers, to assist in communications, and to serve the larger community as public dispensing sites. This type of collaboration and partnership between the private and public sector will augment and support a public health response and ultimately help keep Americans prepared, safe, and protected.

For more information on how businesses can partner for preparedness, visit http://www.cdc.gov/phpr/partnerships/.

Tuesday, 30 September 2014 15:18

Russian Roulette with Security Breaches

There has been a  “dirty little secret” in security that the risks associated with compliance violations, brand damage and remediation costs simply are not sufficient to encourage ubiquitous use of multi-factor authentication, encryption of sensitive data and other proven controls for preventing breaches. This has been a major contributing factor behind the data breach epidemic.  (Why is ANY sensitive data unencrypted in this day and age?)

As the frequency of attacks increases and the nature of the threats change, companies are playing a game of Russian roulette with hackers. They are not utilizing an encryption security infrastructure and risking an attack that will leave privileged customer information available for these criminals to use.

In the first three months of 2014, there were 200 million records stolen according to the Breach Level Index.  In 2013, we saw some of the biggest players in retail get hacked and there seemed to be few negative financial consequences for these companies.  Stock prices and company reputation have rebounded back to normal within a few months. Shoppers are comfortable patronizing these businesses again, even the customers whose information was hacked.

...

http://www.corporatecomplianceinsights.com/russian-roulette-with-security-breaches/

Tuesday, 30 September 2014 15:15

Dealing with Reputation Risk

Properly assessing risk is critical to any business. Successful businesspeople understand that every decision they make must be weighed against the potential risk to the company. This risk assessment must not be limited solely to situations directly related to the business itself, however. They must also consider reputation risk, or the risk events will have a negative impact on one’s personal reputation and, by extension, the business.

Whether fair or not, the decisions made in someone’s personal life can have a substantial impact on the company they are connected to. This risk extends beyond just the owner or executives of a company; employees caught doing unscrupulous things can cause a public relations nightmare for the business, ultimately resulting in massive losses for the company itself.

Assessing Reputation Risk

Unlike business transactions, where there are countless models and historical examples of the likely risk and reward of most given situations, reputation risk is far harder to quantify and prepare for. It is nearly impossible to predict, for example, whether or not an executive will get belligerently intoxicated and assault a police officer. The executive can bring unwelcome attention to the company, which in turn can cause investors, advertisers, and partners to shy away in the short or even long-term.

...

http://www.riskmanagementmonitor.com/dealing-with-reputation-risk/

Data center, telecom industry leaders to discuss findings from global report

COLUMBUS, Ohio – Emerson Network Power, a business of Emerson (NYSE: EMR) and a global leader in maximizing availability, capacity and efficiency of critical infrastructure, today announced plans for its latest Critical Advantage webcast series. The first webcast will feature a panel of industry experts discussing findings from Emerson’s recent report, “Data Center 2025: Exploring the Possibilities,” and will air live Oct. 15 at 1 p.m. Eastern/10 a.m. Pacific.

Emerson Network Power’s Peter Panfil will be joined by Peter Gross of Bloom Energy, Mark Monroe of DLB Associates and Ben Stewart of Verizon Terremark to discuss the industry’s vision for the data center of the future. The panel will examine the results of Emerson’s recent survey of more than 800 data center professionals from around the world.

Emerson Network Power’s Critical Advantage series brings together leading technology experts to discuss relevant, timely industry issues. This series will include the following webcasts, with additional topics planned.

        October 15, 2014: Data Center 2025: A Panel Discussion on Trends

        December 2014: Pre-Fabricated Data Centers: Are they right for you?

        February 2015: What Actually Causes Downtime: Examining the Data

        June 2015: Evolution of the Edge: Moving Computing Closer to the User

To register for a Critical Advantage webcast, visit www.EmersonNetworkPower.com/Webcasts. To view the full Data Center 2025 report and video input from industry experts, visit www.EmersonNetworkPower.com/DataCenter2025. For more information on Emerson Network Power products and solutions that support the data center, visit www.EmersonNetworkPower.com.

DENVER, Colo.Peak® (formerly PeakColo), an enterprise-class IaaS Cloud provider for channel partners, announces it has been recognized as one of the fastest growing companies in Colorado in the Lead411 Hottest Colorado Companies Award.   Peak was chosen for this award for factors including its triple digit growth year over year, innovative cloud services offering, and raising significant funding over the past two years.

Lead411 researches thousands of companies nationwide to identify the fastest growing companies. To be qualified for the Hottest Colorado list, companies must be privately held and in the software, wireless, hardware, Internet, or media industry, as well as be located within Colorado area.

“This year’s Hottest Award winners are stronger than ever,” comments Tom Blue, Lead411 CEO. “We expect to see large growth and ‘big things’ from this group.”

Peak operates eight secure cloud locations across the U.S. and U.K., delivering on-demand dedicated storage, computing and network resources.   It’s 100% channel centric model enables channel partners, agents, distributors and Value Added Resellers with a highly reliable cloud offering that can be white-labeled as their own.

“Peak is proud to have been chosen for Lead411’s Hottest Company award out of over 1100 companies considered,” states Laurel Burton, VP of Marketing for Peak.  “We’re privileged and excited to be named among the top tech companies in Colorado. Peak has experienced tremendous growth, and this recognition validates our hard work. It speaks to our commitment and our continued leadership in the cloud arena.”

To view the full list of Peak’s awards and recognition, please visit http://www.poweredbypeak.com/media/awards/

For more information on Peak, please email getcloud@poweredbypeak.com or call (855) 532-4734.

 

About PEAK

Peak® is an enterprise-class Infrastructure-as-a-Service (IaaS) cloud service provider to channel partners. White-labeling Peak’s cloud services as their own, resellers and agents rapidly enter the cloud marketplace under their own brand without capital expenditure, enjoying a faster route to profitability. Peak operates Type II SSAE 16 and SOC 1 & 2 compliant cloud nodes in eight geographies across the United States and in Europe (Silicon Valley, Seattle, Denver, Chicago, New Jersey, New York, Atlanta, and the United Kingdom). Its VMware vCloud® Powered cloud environment contains tens of thousands of virtual machines and multiple petabytes of storage for public, private, hybrid and disaster recovery solutions. Peak offers both Cisco UCS and Open Compute platforms, and is a Platinum-level NetApp Service Provider. For more information, visit www.poweredbypeak.com call (855) 532-4734; or follow us on Twitter or LinkedIn.

Upgraded feature lets organizations get alerts for tweets about events and threats near their assets

LANSING, Mich. — IDV Solutions, LLC today announced the release of an upgraded Twitter visualization module for its market-leading enterprise risk visualization (ERV) software platform, Visual Command Center®. 

The new Twitter Visualization and Alerting module combines the real-time nature of social media with the power of geospatial visualization to provide early warning to organizations of potential threats to its people or operations. 

“Twitter is now where news breaks first, so it’s important to give our customers a tool for extracting information that’s important to them from the mass of tweets,” said Ian Clemens, Chief Technology Officer at IDV Solutions. “The upgraded module lets organizations tap Twitter for immediate information on a threat, giving them more time to take action to protect employees, assets and business continuity.”

The new module continuously monitors for any number and combination of words or phrases posted within a configurable distance from employees or facilities.  Alert notifications are displayed in Visual Command Center and can also be delivered via e-mail or mass notification systems.

Once alerted to a potential threat, Visual Command Center’s powerful visualization, filtering, and query tools support users as they assess the threat and act to mitigate risk. Visual Command Center unites activity and events from multiple data sources—including Web feeds, social media, travel tracking, and physical security systems—into one platform for risk awareness and response. It visualizes potential risks, including breaking news, weather, and natural disasters, on an interactive map and timeline, along with in-house data like asset locations, floor plans, and physical safety systems.

Twitter Visualization and Alerting is available as an add-on to Visual Command Center version 3.1 or later for both existing and new clients.  For more information, visit http://idvsolutions.com/products/visual-command-center.

 

About IDV Solutions, LLC

IDV Solutions, LLC helps organizations take command of risk by delivering Enterprise Risk Visualization capabilities through software and services that enable organizations to protect their assets, ensure continuity of operations and optimize performance. Its Visual Command Center software is used in organizational functions such as security, field services, supply chain, and operations. By repeatedly solving key problems for customers in the Global 2000 and government, IDV and its products have earned a reputation for delivering immediate value and building risk resilient organizations. For more information, please visit http://www.idvsolutions.com.

SANFRANCISCO – The World leading system optimizing company, IObit, today announced the release of the IObit Uninstaller 4, the FREE uninstaller that can uninstall applications, even for Windows 8 Apps, remove toolbars and plug-ins in browsers thoroughly, even Power Scan for applications that not conducted by IObit Uninstaller.

Since Windows 8 released, nearly 80% users complained about the uninstallation of pre-installed Metro apps, some users cannot find the way to uninstall, even if some others find the “uninstall” option, they can only uninstall each app one by one, it’s quite annoy. To simplified uninstallation for Win 8 Metro Applications, the brand new IObit Uninstaller 4 unleashed with an new tab added with all Win 8 apps are listed in, it supports batch uninstall for Metro applications, also enhanced Power Scan can help clean leftovers thoroughly, even registry key can be deeply detected out and deleted.

IObit Uninstaller 4 also brings the quick uninstall feature for some programs to shorten the uninstall processes, then no more confirmation box will disturb during uninstall process. It can monitor all programs’ un-installation that not using IObit Uninstaller. In Toolbar/Plug-in option, the version 4 provides a browser protect to help detecting and removing malicious Plug-ins. A new UI option joined the version 4, besides makes the interface more simple and conscious; users could make a choice to display the one they like. Among those innovations, IObit Uninstaller 4 also added entrance to System Restore Point for easy management and improved the detection and uninstallation for Windows Update.

“While making the releasing plan on IObit Unintaller4, we are dedicated to offer users an ultimate uninstaller. Besides offering easy to use operation, IObit Uninstaller can even uninstall itself completely.” Said Antonio Zhang, Marketing Director at IObit, “We believe IObit Uninstaller can fit for your needs, and even can do better beyond your imagination.”

Note that IObit Unisntaller 4 does not need any installation, it works reliably and totally FREE with no limitation, and now it is available for everyone to download. Come to try it from CNET Download.com and IObit.com

About IObit Uninstaller 4

Integrated with up to date uninstall technology, IObit Uninstaller 4 helps you remove unwanted programs and browser plug-ins/toolbars easily even when Windows "Add or Remove Programs" fails. The newly added Win8 Apps Module even helps you uninstall the pre-installed Win8 apps. Not only just remove applications by the programs' build-in uninstall, it also scans and removes all leftovers easily and thoroughly with Powerful Scan. What's more, even uninstallation not performed by IObit Uninstaller can automatically call Powerful Scan to delete leftovers in this version. For system stability, IObit Uninstaller 4 still creates a system restore point before every uninstallation and provides a better management of system restore point.

About IObit

Founded in 2004, IObit provides consumers with innovative system utilities for Windows, Mac, and Android OS to greatly enhance operational performance and protect their computers and mobile devices from security threats.

www.iobit.com

Health officials from dozens of countries gathered Friday at the White House, seeking ways to strengthen international defenses against epidemics such as the Ebola outbreak raging in West Africa.

The Obama administration launched a global health security initiative in February to help other nations develop basic disease-detection and monitoring systems to contain and combat the spread of deadly illnesses. That push to develop a long-term strategy gained urgency in the wake of the Ebola epidemic.

“Now, the good news is today our nations have begun to answer the call,” President Obama told the Friday gathering. “With all the knowledge, all the medical talent, all the advanced technologies at our disposal, it is unacceptable if, because of lack of preparedness and planning and global coordination, people are dying when they don’t have to. So, we have to do better , especially when we know that outbreaks are going to keep happening.”

...

http://www.washingtonpost.com/politics/global-leaders-answer-call-against-deadly-outbreaks-such-as-ebola/2014/09/26/a3b3d51c-45ae-11e4-b437-1a7368204804_story.html

Monday, 29 September 2014 14:21

Big Data Is Bigger in North America

North America leads the way in Big Data, besting other regions when it comes to investing, according to a new market survey by Gartner. The research firm found that while Big Data experienced international growth last year, North America led with a 9.2 percent jump in the past year.

The survey also found that 73 percent of organizations have either already invested or plan to do so in the next two years. That’s another significant increase over 2013, when the number was 64 percent.

By comparison, InsideBigData quotes IDG’s 2014 Enterprise Big Data report, which showed lower numbers. IDG found that 49 percent were already in the process of implementing Big Data projects or in the process of doing so in the future.

That begs the question: Who are these Gartner respondents that are so gung-ho on Big Data? Well, if you’re familiar with Gartner, you know its clients tend to be established enterprises and larger government agencies, more so than, say, small businesses or startups. In this case, the survey responses came from 302 Gartner Research Circle members, who are “the voice of selected business decision makers,” according to this.

...

http://www.itbusinessedge.com/blogs/integration/big-data-is-bigger-in-north-america.html