Access your Pro+ Content below.
Time is now for pandemic flu planning
This article is part of the November 2009 issue of Information Security magazine
I have my children's pediatrician on speed dial as I wait for the H1N1 vaccine to come into her office. And with every news report I grow more anxious. While I may be overreacting, I am nonetheless concerned and you should be too. Only 55.6 percent of companies have plans to address the H1N1 threat, according to a recent survey by the Pandemic Prevention Council. Time is not on your side. You should be getting your pandemic planning house in order now. So where do you begin? You need to have a strategy and think it through. You may have a business continuity plan and it's a good start, but a pandemic plan should be approached differently. As Ruth Razook, CEO of RLR Management Consulting explained in a recent SearchFinancialSecurity.com article: With business continuity, the building is gone but the people remain. With a pandemic plan, the building is there but the people are gone. So do you have a pandemic committee made up of HR, executive management, physical security, IT, among others? Have you reached out to your local ...
Features in this issue
Spam, phishing and infected attachments continue to plague messaging platforms, despite sophisticated protection. What's the answer?
Rapid7's acquisition of the Metasploit Project takes down one of the few remaining open source security projects. But expect a smooth transition; there have been many success stories and mistakes made to learn from.
Enterprises can no longer differentiate between insiders and external threats. That's such a 2003 paradigm.
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it.
Columns in this issue
Safeguarding your organization against a H1N1 outbreak should be a top priority.
Security experts Bruce Schneier and Marcus Ranum debate the longterm viability of antivirus software.
The checklist approach to security is easy, but the result is poor security.