Wednesday, February 10, 2016

Cyber Security

It's likely that most of the readers of this newsletter are aware of danger of cyber security threats. What we can't know, however, is whether all of you have incorporated cybersecurity into your business continuity and disaster recovery plans. It definitely should be a priority for organizations of all types. One attack could be severe enough to seriously damage or even close your business. Check this week's articles for more information on how to better prepare for and/or help prevent cybersecurity threats.

Do businesses understand that cybersecurity is the lynchpin for safeguarding their most precious assets -- intellectual property, customer information, financial data, employee records, and much more? (Item #1)   Here are five major trends in cybersecurity that you should have in mind when updating your InfoSec plans for 2016. (Item #2)   This article is meant to be a Panama Canal of sorts... a link between the two disciplines of BCP and cyber security, or cyber for short. (Item #3)

The mounting threat of cyber attack should be a driving force for more enterprises to place it firmly within the context of business continuity planning. (Item #4)   Effectively managing cyber risk means putting in place the right governance and the right supporting processes, along with the right enabling technology.  (Item #5)   It is imperative that you protect your systems from cyber threats -- the lifeblood of your organization depends on it. (Item #6) 

Sign up for (or just peruse) the NewsBriefs at

Wednesday, February 3, 2016

Privacy Issues

Many of us -- maybe most of us -- have been affected by data breaches in the past year. Perhaps your organization is one whose data has been breached by hackers. But your data could have been exposed or stolen in other ways in the workplace, during the data recovery process for example. What controls do you have in place to prevent your disaster recovery process from becoming part of the problem? A newer privacy risk is the proliferation of wearable technology in the workplace. Also of concern is the monitoring of computer/social networking activity by employers. If you have not thought about how some of these issues might impact you, this week’s articles should be of interest.

Disaster plans often address speed to recovery with often overlooked information privacy issues leaving real vulnerabilities to the protection of personally identifiable information. (Item #1)   disaster plans often address speed to recovery, overlooking information security and privacy issues; this results in significant risks to PII. (Item #2)   There are enormous benefits from Big Data analytics, but also massive potential for exposure that could result in anything from embarrassment to outright discrimination. Here's what to look out for - and how to protect yourself and your employees. (Item #3)

Here is a brief explanation of the types of issues that can arise when managing employees and attempting to stay within the bounds of privacy laws. (Item #4)  The impact of wearable technology is ringing alarm bells among privacy advocates. (Item #5)  Employees should therefore be conscious of what information they display on social media websites. (Item #6)

Sign up for (or just peruse) the NewsBriefs at