Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

2/3/2010
09:19 AM
Rob Enderle
Rob Enderle
Commentary
50%
50%

Tool Helps Prepare For Disaster

When I see an event like the Haiti earthquake, I worry that we treat disaster preparedness much like we do data backup -- we don't really think about it until it's too late. We are faced with putting in place a plan to deal with disaster, and then realize we don't aren't properly prepared. But I might have found a tool that can help.

When I see an event like the Haiti earthquake, I worry that we treat disaster preparedness much like we do data backup -- we don't really think about it until it's too late. We are faced with putting in place a plan to deal with disaster, and then realize we don't aren't properly prepared. But I might have found a tool that can help.I took a briefing from a little company that I hadn't heard of before (and have no business relationship with) called Preparis because it sounded like these guys had a solution that might make sense. Created after 9/11 because the founder's company had been close to Ground Zero and was nearly destroyed by an inability to get its arms around the resulting staffing and organizational problems, this is a solution forged in fire. What the company realized is few, if any, companies had the bandwidth or focus to do disaster preparedness right, but collectively -- using a SaaS model -- a program might be possible to create a solution that would scale, remain current, and better assure a company of any significant size could better survive the next disaster. This isn't a buy-it-and-forget-it tool. It requires a significant commitment that goes beyond what seems like a reasonable price. The program comes with analytics to determine risks and assess performance, training, and retraining to assure your people are and remain up-to-date on their duties. It also includes a certification process that ensures you aren't fooling yourselves into thinking you are in better shape than you actually are, and a set of online tools that allows the program to spread across your organization effectively. Listed customers include AT&T, Equifax, InterContinental Hotels Group, Georgia-Pacific, UPS, Emory University Morgan Lewis, Paul/Weiss, and the Atlanta Falcons, covering an impressively broad number of businesses and industries. They represent a broad set of subject matter experts ranging from the expected business continuity and disaster recovery fields to mental health, workplace violence, and global warming. This last one is likely to assess flood-related risks.

I think it is worth our time to make sure our companies and employees are protected against disasters of all types. So many lives and companies are lost not because of the disaster itself, but because people simply don't know what to do to protect themselves and their jobs. Whether you use a tool like Preparis or another, it is worthwhile to review it just to get a sense for how extensive a solution could be and to compare what you have against this bar.

In any case, here is hoping that you never need a tool like Preparis.

-- Rob Enderle is president and founder of Enderle Group. Special to Dark Reading.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5252
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
CVE-2019-5235
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
CVE-2019-5264
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
CVE-2019-5277
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
CVE-2019-5254
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...