Be Prepared

Be Prepared

We learn lessons every time there is a catastrophe or potential catastrophe like this. I say that we learn them, but I mean that we could learn them if we would pay attention, reflect, consider, plan, execute, and anticipate.

Lessons we would all acknowledge, but we cannot say we have learned until we implement strategies are:

1. We are vulnerable and getting more vulnerable daily because we are growing more dependent upon technology.

2. We have sources and resources for protection. They cost time and money, but they can help eliminate, ameliorate, or minimize great loss.

3. The old Cold War notion of the domino effect applies to our digital world and networks today. When one sector goes down, all are potentially effected.

4. The suffering that is possible when the network crashes does not simply plague the powerful; it touches the most vulnerable. It is human suffering.

5. The time to plan for crisis is when we are not in a crisis.

6. Those who are prepared, recover more quickly.

7. Not just big companies, but small businesses and individuals need backup plans for storage and for operations.

What am I missing? If you say "nothing," we are all at risk, but cause there is always something we are missing.

That reality keeps us on our toes

The key is to prepare Be Prepared.

Preparing for a cyber attack is crucial for businesses to ensure the security of their data and operations. Here is a comprehensive guide to help a business prepare for potential cyber threats:

P. Policy

You should have some clear and implementable security policies in place. Study best practices and standard for your industry. Follow your policies with a plan and make sure all of your staff understands and is trained to implement.

R. Risk Assessment

Do a risk assessment. Identify potential vulnerabilities. Be aware of threats and threats. Understand the changing landscape of the risks in the field. Be adaptable. Consult your insurance carrier for advice.

E. Employees

Your staff and volunteers are your first line of defense. Train them to recognize phishing attempts and to understand safe internet use. Keep the training up-to-date,.

P. Purchase

Buy the software, antivirus protection, and consulting you need to head off an attack and recover when one occurs. The dollars you spend on this side of an attack will be saved many-fold after one.

A. Authentication

Implement multi-factor authentication for accessing sensitive systems and data. Utilize strong passwords. Keep them updated.

R. Review

Don't count on anything to remain stable. Monitor, inspect, review, revise, resource, and renew regularly.

E. Encrypt

Encrypt your data. Move it securely. Back it up regularly and religiously. Utilize redundancy.

D. Do It. Test it. Insure it. Monitor it.

All of this is about implementation, otherwise known as doing. Just thinking about it will not protect you. Get it done. Once you have a plan, test it. Get insurance. Get advice. Get eyes on the project. Get it done.

There is much more to it and this is not intended to exhaust the subject. But if you start with this acronym, you will be on your way to being P-R-E-P-A-R-E-D

.hashtag#outage hashtag#cyberattack hashtag#IToutage #


要查看或添加评论,请登录

Tom Sims的更多文章

  • Pi Day/Pie Day - Endless

    Pi Day/Pie Day - Endless

    In the great debate over whether life is digital or analogical, we throw up our hands and shout, “Yes!” Welcome to Pi…

    1 条评论
  • Is There No Balm in Gilead?

    Is There No Balm in Gilead?

    The prophet laments in Jeremiah 8:18-9:6. Sometimes it is in his own voice, sometimes it is in the voice of God.

  • Bacon - Sizzling - Sensual - Successful

    Bacon - Sizzling - Sensual - Successful

    Someone told me in a conference, over a decade ago, that, at the time, if you used the word “bacon” as one your search…

  • Transfigured on the Mountain, Transformed in the Lowlands

    Transfigured on the Mountain, Transformed in the Lowlands

    Transfiguration and Transformation “The LORD is king; let the peoples tremble! He sits enthroned upon the cherubim; let…

    1 条评论
  • On Fear, Faith, and Failure - RIPE-O with TYPEOS

    On Fear, Faith, and Failure - RIPE-O with TYPEOS

    Feeding and Starving You have heard that fear is false evidence appearing real. I thought I'd off a few more and it is…

    1 条评论
  • Wake Up Calls

    Wake Up Calls

    There is a device at the head of my bed with which I have a love/hate relationship. It gives me a degree of comfort -…

    1 条评论
  • Who Defends God? Who Cares?

    Who Defends God? Who Cares?

    In your spiritual leadership, how much time do you spend defending the honor, dignity, power, existence, and goodness…

    1 条评论
  • Succession Planning

    Succession Planning

    Succession planning is always important. Sometimes you follow a person who was a great success.

  • What Joseph Knew that Enabled Him to Get Past the Past and Prosper

    What Joseph Knew that Enabled Him to Get Past the Past and Prosper

    Joseph said to his brothers, “I am Joseph. Is my father still alive?” But his brothers could not answer him, so…

    1 条评论
  • Teach Your People Not to Fret

    Teach Your People Not to Fret

    Let us be part of a movement to help people grow out of the paralysis of fear, worry, and fretting. It is part of a…

    3 条评论

社区洞察

其他会员也浏览了