Risk
8/24/2007
12:19 PM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

Weathering The Weather

Watch the news coverage of the Midwest floods and the toll they've taken on families, homes and holdings, and you can't avoid hearing -- and often -- from flood victims who discovered that their insurance didn't cover flood or landslide/mudslide damage. It's no great leap to extend those personal stories to small and mid-size business stories. How covered are you when a natural disaster strikes your business?

Watch the news coverage of the Midwest floods and the toll they've taken on families, homes and holdings, and you can't avoid hearing -- and often -- from flood victims who discovered that their insurance didn't cover flood or landslide/mudslide damage. It's no great leap to extend those personal stories to small and mid-size business stories. How covered are you when a natural disaster strikes your business?Not all the threats your business faces are digital, and not all of them are criminal.

If you don't have a disaster preparation and recovery plan in place for your business -- and, just as crucially, for your remote and mobile employees -- you're running a risk that could catch up with you without warning.

Are all of your business-critical and confidential files backed up and stored on a remote site? What's the date of your most frequent backup?

Do you have a contingency plan in place for running your business -- even minimally -- if your office equipment is destroyed, or if you face an extended period of time without electricity?

Do you carry sufficient insurance to replace that equipment -- and does the insurance cover the likeliest (and, to be safe, the most likely of the unlikely) natural disasters for your region?

Are all of your employees up-to-speed on your disaster and recovery plans?

For that matter, are all of your employees up-to-speed on assistance and support they could offer other employees (first) and your business (once you're sure everyone is all right) in the event of a natural disaster?

Some of you may be experiencing some of this first-hand: in addition to the floods over the past few days, a power outage has knocked out a chunk of Chicago's electric grid as I write.

When natural disaster strikes you'll have plenty to deal with without being distracted -- or heartbroken -- by matters you could have dealt with earlier.

Make sure your overall security planning includes planning for weather and other natural catastrophes as well as digital disasters.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4692
Published: 2015-07-27
The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.

CVE-2015-1840
Published: 2015-07-26
jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space cha...

CVE-2015-1872
Published: 2015-07-26
The ff_mjpeg_decode_sof function in libavcodec/mjpegdec.c in FFmpeg before 2.5.4 does not validate the number of components in a JPEG-LS Start Of Frame segment, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via craft...

CVE-2015-2847
Published: 2015-07-26
Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

CVE-2015-2848
Published: 2015-07-26
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!