Is Confidential Information Protected in Your Disaster Recovery and Business Continuity Plan?

Get Exclusive
White Papers
Follow Us TwitterFollow Us FacebookFollow Us Blog Janco RSS FeedGoogle Plus

Disaster Recovery Template

Disaster Recovery Planning

More on Disaster Planning

Security Template

Security Policies Procedures

More on Security

 Newsletter HomeNext

In this Newsletter

Disaster Recovery SecurityIs Confidential Information Protected in Your Disaster Recovery and Business Continuity Plan?

Consider that much of the backup data, resides in the cloud and at off site facilities. How is access to that data controlled?

Most organizations find themselves with overly permissive access controls. Employees join and leave the organization frequently, and roles, responsibilities and project teams change quickly as well. Since it is nearly impossible to manually keep up with the changes, all this leads to more access permission granted than revoked.

Any program to reduce the probability of data loss and misuse has to start with rightful and warranted access controls. Ensuring that only the right people can get to the right data at all times not only reduces the odds of misuse, it also makes any subsequent safeguards and loss prevention techniques more cost effective and pragmatic to deploy. Consider a folder containing confidential data. If it is open to everyone or to a large number of individuals then (1) anyone can access and misuse the data, and (2) access by everyone must be monitored and audited – which is not a realistic undertaking. Alternatively, limiting access to those who actually need the data, and reporting on their access patterns, is realistic and a practical way to ensure that data access permissions are not abused.

Read on...                                                 Order Now...

Job DescriptionsRecent Events Highlight Shortcomings in Disaster Recovery and Business Continuity Plans

CIOs and individuals responsible for the recovery process have found found there were many partial, outdated, or ineffective disaster and business continuity plans out there.  Why was it so difficult to get it right?

Experts say there are 5 main reasons for this:

Read on...               Order Now...

Job Descriptions

Security Policy and ProcedureTemplate

Data Security and Protection are a priority and this template is a must have tool that every CIO and IT department must have. Over 3,000 enterprise worldwide have acquired this tool and it is viewed by many as the Industry Standard for Security Management and Compliance.

Read on...           Order Now...

Job DescriptionsRecords Management Policy Template

Experts Agree You Should Update Your Policy Annually

Records retention and destruction is mandated

Current Rules and Regulations Regarding the Protection and Destruction of Confidential and Sensitive Documents require that any person or company that possesses or maintains such information to take reasonable measures to protect against unauthorized access to, or use of the information in connection with its disposal.

The Record Management, Retention, and Destruction is a detail policy template which can be utilized on day one to create a records management process.  Included with the policy are forms for establishing the record management retention and destruction schedule and a full job description with responsibilities for the Manager Records Administration. 

Read On...           Order Now...