|
||
|
|
|
|
|
|
|||
|
The DataGuard Data Protection Newsletter October, 2004
Bullet Points
Internet Blackmail Patch Facts Manually Updating Virus Deffinitions Protecting Non-Critical Data Systems Improving Your Disaster Recovery Plan
Welcome! The cost of keeping your IT systems secure is going up. InformationWeek research just showed that U.S. companies will spend 12% of their tech budget on information security, substantially up from 8% in 2002. Security breaches and malicious code attacks are considered more threatening to business continuity this year than in 2003, and many companies fell victim to either a worm or virus attack over the last 12 months. Smaller companies were breached more often in the past year. Downtime attributed to security attacks rose over the last 12 months caused by vulnerabilities in key technology products. One of the main reasons is that the average time period between the disclosure of a vulnerability and its first exploit has gone down from several weeks to less than six days in the first half of 2004, and in some cases there were global exploits ready in just two days. The vast majority of the 2004 vulnerabilities were moderately to highly severe. One of the most recent ones is the new JPEG hole. Malicious hackers now are seeding porn newsgroups with JPEG images that take advantage of this hole. There is also another somewhat disturbing trend that was published by security company Qualys. They compared the difference in time frame that holes were fixed for internal and external systems. "External" in this case is defined as systems like Web, e-mail and gateway servers. Compared to 2003, in 2004 the amount of systems still vulnerable decreased with 50% every 21 days, whereas in 2003 that was 30 days. However, they observed that internal systems take longer to fix (a whopping 62 days), giving worms much more time to wreak havoc. There is definitely a misconception in IT that external systems have greater exposure. They don't. Another reason internal systems stay vulnerable longer is that there are many more of them and patching is more involved. It is still very important to continue to scan and patch internal systems, as malware has many ways to compromise systems.
Food for thought. Joe Tartaglia / High Caliber Solutions If there are any topics you would like to see discussed in the future or if you have any comments, please contact me at JoeT@HighCaliber.com
Improving Your Disaster Recovery Plan With the rise in cyberattacks, terrorism, and industrial sabotage — not to mention natural disasters such as tornadoes, floods, earthquakes, and hurricanes — business continuity management has quickly come to the forefront as more and more firms are being forced to invoke their disaster recovery plans. Here are some tips on how to improve your disaster recovery plans: 1. Be proactive rather than reactive. Work through the possible disaster scenarios ahead of time so that you have an idea of what might happen to company operations and what steps you'll need to take to counteract the disruption. You'll pay a premium if you're caught scrambling after the fact. 2. Don't put all your eggs in one basket. Spread your vital operations across more than one location to provide sufficient redundancy should a disruption occur. Make backups frequently and store them inside and outside the facility. Randomly and periodically check on the backups to make sure they're actually viable and accessible. Many companies overlook the fact that a lot of vital data resides on employees' workstations and laptops. If these are not backed up, you're really out of commission. 3. Make your business continuity plan is kept up to date. Don't allow your plan to gathering dust on a back shelf. It needs to be a living document to remain viable. If business processes change or key emergency contacts no longer work for the organization, your plan needs to be updated. 4. Aim for the quickest recovery you can afford. When disaster strikes your company, your competitors will jump at the chance to fill the void. A strong business continuity plan will ensure that you don't lose market share in the event of a disruption. Especially if yours is a Web-based operation, you need to get up and running again as fast as possible. Statistics show that oftentimes when prospective customers can't log onto your web site, they don't come back. 5. Routinely test your plan. The drills you do today may be critical to your company's survival. It's all part of making sure that your plan stays current. Make sure a triage process is established. Otherwise, in the heat of a disaster, those heading up the team might decide to change priorities based on the last phone call received, rather than on an integrated approach to business recovery. 6. Tailor your business continuity investments to likely threats and key priorities. It's all about balancing protection against costs and survival. Recent events have made us think of terrorism as our foremost threat, but there are many other threats that are far more commonplace: employee or non-employee workplace violence, labor actions and disputes, cyberattacks (including computer viruses and denial of service), hoaxes, and industrial espionage. Your plan needs to focus on those issues most likely to cause disruption. Physical plant security is another issue to consider. Does the physical security plan include instructions for contacting local fire, police, and rescue authorities? Do employees know where to report for work in case their usual facility is unavailable? Do you have technology in place to allow them to work from home? Can another facility provide space and resources in the event of a disaster at one location? It's important to realize that it is neither possible nor cost effective to try to protect everything. You need to examine your operations and determine what you really need to survive. 7. Check that all your plan components sync with each other. To effectively respond to a business disruption, your business continuity plan needs to incorporate all the components required for your successful recovery: your data, your workforce, your facilities, your networks, even your vendors and suppliers. You must have procedures in place to ensure that events occur in the right sequence to get you back up and running as promptly as possible. It's a delicate balance, but a crucial one. While the goal of a business continuity plan is to get you back up and running as quickly as possible, your vigilance and diligence before the fact may even help you prevent some disasters and business disruptions from ever occurring.
DataGuard archives: Click Here |