Access "Time is now for pandemic flu planning"
This article is part of the November 2009 issue of How to implement a change management that works and reduces security risks
I have my children's pediatrician on speed dial as I wait for the H1N1 vaccine to come into her office. And with every news report I grow more anxious. While I may be overreacting, I am nonetheless concerned and you should be too. Only 55.6 percent of companies have plans to address the H1N1 threat, according to a recent survey by the Pandemic Prevention Council. Time is not on your side. You should be getting your pandemic planning house in order now. So where do you begin? You need to have a strategy and think it through. You may have a business continuity plan and it's a good start, but a pandemic plan should be approached differently. As Ruth Razook, CEO of RLR Management Consulting explained in a recent SearchFinancialSecurity.com article: With business continuity, the building is gone but the people remain. With a pandemic plan, the building is there but the people are gone. So do you have a pandemic committee made up of HR, executive management, physical security, IT, among others? Have you reached out to your local public health officials or other ... Access >>>
Premium Content for Free.
Messaging security risks have upper hand on solutions
Spam, phishing and infected attachments continue to plague messaging platforms, despite sophisticated protection. What's the answer?
Enterprises must treat Insider risk as they do external threats
Enterprises can no longer differentiate between insiders and external threats. That's such a 2003 paradigm.
- Messaging security risks have upper hand on solutions
Metasploit Project acquisition ups ante for penetration testing market
Rapid7's acquisition of the Metasploit Project takes down one of the few remaining open source security projects. But expect a smooth transition; there have been many success stories and mistakes made to learn from.
Integrated change management reduces security risks
by Diana Kelley and Ed Moyle
Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it.
- Metasploit Project acquisition ups ante for penetration testing market
Time is now for pandemic flu planning
Safeguarding your organization against a H1N1 outbreak should be a top priority.
Schneier-Ranum Face-Off: Is antivirus dead?
Security experts Bruce Schneier and Marcus Ranum debate the longterm viability of antivirus software.
Standards compliance does not equal sound information security risk management
The checklist approach to security is easy, but the result is poor security.
- Time is now for pandemic flu planning
More Premium Content Accessible For Free
Secure file transfer: Send large files fast, but keep your system safe
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
Is your mobile security strategy combating the wrong enemy?
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
What's the best focus for MDM strategy now?
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...