The company IT Security perimeter no longer exists, now that mobile and cloud computing are so prevalent. The availability of files and information to employees in the office, on site, on the road or at home is high.
Self-Study Elearning Course & Certification
Offered as part of our Crisis Management & Communication Discipline in ICOR University, CMC 5000 provides critical information for those responsible for managing crises in the organization and providing both internal and external communications.
The University of Illinois Chicago offers this course to its students as part of its Emergency Management & Continuity Certificate Program and now this same course is available to the public.
Offered as a self-study elearning course, CMC 5000 is ideal for senior management responsible for leading the organization during a crisis, those in public affairs, public relations, or anyone who is participates in crisis management in the organization.
Successful completion of the course and passing the online examination results in earning the ICOR Credential, "Crisis Management & Communication Professional (CMCP).
The cloud has revolutionized the way we build IT systems within enterprises. Indeed, enterprise IT’s goal since the inception of cloud computing has been to replicate the power of cloud computing within their own data centers.
The trouble is that cloud computing systems were built net-new, which meant they could start from scratch and thus be more innovative with the use of cloud-based resources using the most modern technology and approaches available. Enterprises don’t have the same luxury. Decades of enterprise hardware and software purchases exist at diﬀerent levels of maturation, and those structures must also support mission-critical systems in operations.
However, things are changing. New technology now provides enterprises with the public cloud experience, which includes:
The incredible amount of energy needed to power data centers is well documented. Globally, data center energy use accounts for three percent of all electricity consumed, a figure that will continue to grow in the coming years. While fueling one of the backbones of our economy, this incredible power usage has resulted in staggering electricity bills and large amounts of pollution associated with producing that energy. To help combat this, utility companies in recent years have been offering incentive programs to data center owners and operators who are willing to make their facilities more energy efficient.
While these incentives are incredibly beneficial to data centers, I’ve found many operators hesitant to take advantage of the opportunity for a variety of reasons, including not being sure where to start, fear of unknown project costs, and confusion on the different types of incentives that are available. These concerns are all very understandable, and I can share some knowledge to help clear up the confusion that surrounds utility incentive programs.
But then so are the IT security risks that go with such availability, unless appropriate measures are taken.
Those measures cannot be the same as the traditional firewall solutions, because so much computing activity now takes place outside such firewalls.
The security paradigm has to be turned inside out. Instead of trying to keep all data within one big fence, each piece of data must travel with its own protection.
How do you ensure that the time and money spent on business continuity is yielding the desired results? Karen Humphris, senior advisory manager at ContinuitySA, looks at the subject and provides a checklist of 12 critical BCM success factors.
As business continuity management (BCM) becomes more important as a way to mitigate risk and create peace of mind, ensuring the money and time spent on BCM yields the desired results is critical. Organizations need to be certain that the BCM programme they have in place is realistic, and that it will work. One of the best ways of answering these questions is to measure how mature the BCM plan and capability actually is.
Measuring, as we all know, is the first and vital step to managing anything.
Many companies have adopted a BYOD program, recognizing the productivity benefits that can deliver. In addition, more and more companies require BYOD users to use a device passcode to prevent company data from falling into the wrong hands if the device is lost or stolen.
However, much like desktop security threats, the risk of data loss from malware and vulnerabilities must also be considered as part of a mobile security program.
Users, unfortunately, are mostly unaware that they can easily get a malware infection by visiting a compromised website and downloading a malicious app. Once on the device, the app can then access confidential data on the device as well as access the corporate network. Contrary to popular belief, iOS devices are just as susceptible to malware as Android devices, and Skycure has identified that any business with over 200 iOS devices has at least one malware infection.
Business resilience is your organization’s ability to adapt and adequately respond to events—no matter how critical the situation—that affect your business internally or externally with little impact to your operations, people, and structure. Your business’s ability to be resilient and prepared relies on careful, corresponding planning related to both business continuity and disaster recovery, and at the forefront of prevention and strong response is access to monitoring your business and your people.
Maintaining a resilient business with regular operations before, during, and after an unexpected event requires emergency notification software that, like business resilience and disaster recovery planning, takes a holistic approach. In order to build a resilient business, you must be able to rely on your emergency notification software to monitor everything around you—potential threats, your people, your business, your communications. You need the full picture of what is exactly going on at all times.
AlertMedia keeps the pulse of your business – monitoring what your organization cares about most.
There are some very important risks in your construction fleet that you may be overlooking. Independent contractors can introduce risks and your employees using their personal vehicles could pose other hidden exposure to your business. These are two top issues to be aware of, and here are some suggestions for mitigating them.
If you hire independent contractors, you could be sued for their actions in relation to a vehicle accident that they cause while working for you.
To reduce this exposure, ensure that each of your independent contractors has a valid auto liability insurance policy. Make sure the policy is in force throughout the duration of their contract with you. Additionally, be sure that their insurance carrier is financially stable. You can verify the insurance carrier’s financial strength at www.ambest.com.
AUSTIN, Texas – Two important deadlines are ahead for Texans who are considering a loan through the U.S. Small Business Administration for recovery from the April storms and flooding.
Most survivors who registered with FEMA for disaster assistance were contacted by the SBA with information on the agency’s loan-interest disaster loans, as well as instructions on how to complete the loan application.
The deadline to submit the application for physical damage is June 24, 2016. The deadline for businesses to submit a loan application for economic injury is Jan. 25, 2017.
The SBA is the federal government’s primary source of money for the long-term rebuilding of disaster-damaged private property, offering low-interest disaster assistance loans to businesses of all sizes, private nonprofit organizations, homeowners and renters.
Survivors may apply online using the electronic loan application via SBA’s secure website at disasterloan.sba.gov/ela.
Disaster loan information and application forms are also available from SBA’s customer service center by calling 800-659-2955 or emailing email@example.com. Individuals who are deaf or hard‑of‑hearing may call 800-877-8339. For more disaster assistance information or to download applications, visit sba.gov/disaster.
Completed applications should be mailed to:
U.S. Small Business Administration
Processing and Disbursement Center
14925 Kingsport Rd.
Fort Worth, TX 76155
SBA loan applications should be submitted even as disaster survivors await an insurance settlement. The loan balance is reduced by the settlement. SBA loans may also be available for losses not covered by insurance.
Both FEMA and the SBA encourage Texans who suffered damage or loss from the April storms and were provided a loan application to complete the application. There is no obligation to take a loan if offered. If approved, and a survivor does not accept the loan, it may make them ineligible for additional federal assistance.
Homeowners may borrow up to $200,000 from SBA to repair or replace their primary residence.
Homeowners and renters may borrow up to $40,000 to repair or replace personal property.
Businesses may borrow up to $2 million for any combination of property damage or economic injury. SBA offers low-interest working capital loans—called Economic Injury Disaster Loans—to small businesses and most private nonprofit organizations of all sizes.
# # #
FEMA’s mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.
If you are heading up an application develop team or are running an IT organization and you are looking at your developers initial steps to developing cloud native applications, I want to share some experienced insights gained from PaaS customers. For me it is a view of the path many of you may be heading down applying some best practices that can optimize Dev and Ops together.
Apprenda, one of our ACI ecosystem partners, and Cisco recently hosted a series of presentations, we called PaaS Days, about the Application-Centric Enterprise to share how private PaaS and policy driven automation together can address real-world problems such as application time-to-market, datacenter security and corporate compliance. I want to share some insights I gained there about different application strategies for cloud. Depending on the company’s cloud maturity level and whether the management is centralized or not, the application strategy can take on a project oriented or an organization level scope.