Business Continuity


Published on

Published in: Economy & Finance, Technology
  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Hello I would like to thank you all for coming this morning. I hope that you find the seminar useful and take away some real benefits for your business. The seminar this morning will be conducted by myself David Watson, and my colleague Tim Long. I am head of IT at Milsted Langdon and an IT Consultant for the past ten years. So between us we have over twenty years experience in building and running IT systems in the real world.
  • Business Continuity

    1. 2. <ul><li>9.00 Security </li></ul><ul><li>9.30 Breakfast </li></ul><ul><li>9.50 Backup systems </li></ul><ul><li>10.15 Virus Protection </li></ul><ul><li>10.45 Q & A </li></ul>
    2. 3. <ul><ul><li>Identify critical functions for business survival </li></ul></ul><ul><ul><li>In what order and how fast these functions need to be recovered </li></ul></ul><ul><ul><li>What are the interdependences of these functions </li></ul></ul><ul><ul><li>The impact on revenue, investor confidence, customer service, goodwill, competitive edge, market share, etc </li></ul></ul>
    3. 4. <ul><li>Natural </li></ul><ul><ul><li>Flooding, Lighting Strikes, Power Cuts </li></ul></ul><ul><li>Computer Viruses </li></ul><ul><ul><li>Email based, Web based, </li></ul></ul><ul><li>Sabotage </li></ul><ul><ul><li>Hacking, disgruntled employees, </li></ul></ul><ul><li>Mistakes </li></ul><ul><ul><li>Deleting files, formatting the wrong disks, </li></ul></ul>
    4. 5. <ul><li>Security </li></ul><ul><ul><li>Control, Patches, Passwords, Physical, </li></ul></ul><ul><li>Backup </li></ul><ul><ul><li>Strategies, Solutions, Types, Software, </li></ul></ul><ul><li>Virus Protection </li></ul><ul><ul><li>Integration, Administration, Detection, Support, </li></ul></ul>
    5. 6. <ul><li>Fore warned is forearmed </li></ul><ul><ul><li>Nobody believes anything bad will happen to them until it does ! </li></ul></ul><ul><li>Security only works if the secure way is the easy way </li></ul><ul><ul><li>Make your systems too rigid and people will flout them </li></ul></ul><ul><li>Patches </li></ul><ul><ul><li>Every piece of software has bugs </li></ul></ul><ul><ul><li>There is no point in installing patches if the system is not secure in the first place </li></ul></ul>
    6. 7. <ul><li>There really is someone out there who wants your password! </li></ul><ul><ul><li>They are extremely valuable </li></ul></ul><ul><ul><li>“ Post it Note” Vulnerability </li></ul></ul><ul><li>The most secure network is a well administered one. </li></ul><ul><ul><li>User Accounts, Shares, privileges </li></ul></ul><ul><li>More Complex networks are more difficult to defend </li></ul><ul><ul><li>Partnerships, Remote Access </li></ul></ul><ul><ul><li>“ Few and Well controlled” </li></ul></ul>
    7. 8. <ul><ul><li>Security is about risk management </li></ul></ul><ul><ul><ul><li>You cannot avoid risk </li></ul></ul></ul><ul><ul><ul><li>Business imperatives will conflict with security </li></ul></ul></ul><ul><ul><li>Your network will be comprised </li></ul></ul><ul><ul><ul><li>Detect </li></ul></ul></ul><ul><ul><ul><li>Investigate </li></ul></ul></ul><ul><ul><ul><li>Recover </li></ul></ul></ul>
    8. 9. <ul><li>Does your company backup all mission critical data at least daily? </li></ul><ul><li>Are company backups sent off site within 24 hours to a safe location? </li></ul><ul><li>Does your company backup and recovery plan include remote company locations? </li></ul><ul><li>Have you used Business impact analysis to quantify and rank the financial risk of all outages to vital functions? </li></ul>
    9. 10. <ul><li>Does your company have a written disaster recovery plan? </li></ul><ul><li>Has your company tested your disaster recovery plan? </li></ul><ul><li>Are you aware of your legal liability for disaster recovery? </li></ul><ul><li>Have you approved sufficient resources to support your disaster recovery plan? </li></ul>
    10. 11. <ul><ul><ul><li>How to protect your business data </li></ul></ul></ul>
    11. 12. <ul><ul><ul><li>What to backup </li></ul></ul></ul><ul><ul><ul><li>Backup Strategies </li></ul></ul></ul><ul><ul><ul><ul><li>Standalone, Small Network, Large Company </li></ul></ul></ul></ul><ul><ul><ul><li>Backup Systems </li></ul></ul></ul><ul><ul><ul><ul><li>ZIP, Travan, DAT, DLT </li></ul></ul></ul></ul><ul><ul><ul><li>Backup Software </li></ul></ul></ul><ul><ul><ul><ul><li>Backup Exec </li></ul></ul></ul></ul><ul><ul><ul><li>Backup Polices </li></ul></ul></ul><ul><ul><ul><li>Q & A </li></ul></ul></ul>
    12. 13. <ul><li>Everything </li></ul><ul><ul><li>Data </li></ul></ul><ul><ul><ul><li>Documents, Spreadsheets, Emails </li></ul></ul></ul><ul><ul><li>Applications </li></ul></ul><ul><ul><ul><li>Word Excel Templates, Accounts </li></ul></ul></ul><ul><ul><li>Operating System </li></ul></ul><ul><ul><ul><li>Windows 98 / NT / 2000 </li></ul></ul></ul><ul><ul><li>Previous Application Versions </li></ul></ul>
    13. 14. <ul><ul><li>Standalone </li></ul></ul><ul><ul><ul><li>Single user, or Small Office no Network </li></ul></ul></ul><ul><ul><li>Small Network </li></ul></ul><ul><ul><ul><li>Up to Ten PCs and one server or Peer to Peer Networks </li></ul></ul></ul><ul><ul><li>Large Network </li></ul></ul><ul><ul><ul><li>Multiple Servers 100 + Users </li></ul></ul></ul>
    14. 15. <ul><ul><ul><li>Tape Drive Cost Media </li></ul></ul></ul><ul><ul><ul><li>Iomega ZIP Drive £130 £9 </li></ul></ul></ul><ul><ul><ul><li>Travan TR5 Drive £190 £17 </li></ul></ul></ul><ul><ul><ul><li>DAT DDS4 Drive £500 £22 </li></ul></ul></ul><ul><ul><ul><li>DLT Drive £1100 + £25 </li></ul></ul></ul>
    15. 16. <ul><ul><ul><li>Veritas Backup Exec </li></ul></ul></ul><ul><ul><ul><li>Scalable </li></ul></ul></ul><ul><ul><ul><li>Scheduled Backups </li></ul></ul></ul><ul><ul><ul><li>Backup Agents </li></ul></ul></ul><ul><ul><ul><ul><li>SQL, Exchange, Oracle </li></ul></ul></ul></ul><ul><ul><ul><li>Messaging </li></ul></ul></ul><ul><ul><ul><ul><li>Email </li></ul></ul></ul></ul>
    16. 17. <ul><li>Tape rotation schemes </li></ul><ul><ul><li>Grandfather, father, son </li></ul></ul><ul><ul><li>Assign four daily tapes </li></ul></ul><ul><ul><ul><li>Mon, Tues, Wed, Thurs </li></ul></ul></ul><ul><ul><li>Assign five weekly tapes </li></ul></ul><ul><ul><ul><li>Fri 1, Fri 2, Fri 3, Fri 4, Fri 5 </li></ul></ul></ul><ul><ul><li>Assign three monthly tapes </li></ul></ul><ul><ul><ul><li>Month 1, Month 2, Month 3, </li></ul></ul></ul>
    17. 18. <ul><ul><ul><li>How to protect your business from a Virus Infection </li></ul></ul></ul>
    18. 19. <ul><ul><ul><li>What is a Virus? </li></ul></ul></ul><ul><ul><ul><ul><li>Trojan, Worms, Macro </li></ul></ul></ul></ul><ul><ul><ul><li>Virus Hoaxes </li></ul></ul></ul><ul><ul><ul><ul><li>Budweiser Frogs, Good Times </li></ul></ul></ul></ul><ul><ul><ul><li>Email Viruses </li></ul></ul></ul><ul><ul><ul><ul><li>Attachments, </li></ul></ul></ul></ul><ul><ul><ul><li>Internet Viruses </li></ul></ul></ul><ul><ul><ul><ul><li>VBS, HTML, </li></ul></ul></ul></ul><ul><ul><ul><li>Ten steps to safer computing </li></ul></ul></ul>
    19. 20. <ul><ul><ul><li>History </li></ul></ul></ul><ul><ul><ul><ul><li>The Brain Virus </li></ul></ul></ul></ul><ul><ul><ul><li>Macro </li></ul></ul></ul><ul><ul><ul><ul><li>WM/ Wazzu , OF97/Crown B </li></ul></ul></ul></ul><ul><ul><ul><li>Boot Sector </li></ul></ul></ul><ul><ul><ul><ul><li>Form, Parity Boot </li></ul></ul></ul></ul><ul><ul><ul><li>Parasitic </li></ul></ul></ul><ul><ul><ul><ul><li>Jerusalem, CIH Chernobyl </li></ul></ul></ul></ul><ul><ul><ul><li>Trojan Horses </li></ul></ul></ul><ul><ul><ul><ul><li>Troj/Zelu , Back Door Trojans </li></ul></ul></ul></ul><ul><ul><ul><li>Worms </li></ul></ul></ul><ul><ul><ul><ul><li>Kakworm Love Bug </li></ul></ul></ul></ul>
    20. 21. <ul><ul><ul><li>Hoaxes are reports of non existent viruses </li></ul></ul></ul><ul><ul><ul><ul><li>Warn you that there is a new highly destructive undetectable virus </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Ask you to avoid reading emails with a particular subject line </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Claim that the warning was issued by the FBI or Microsoft or some other Large organisation </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Urge you to forward the email to everyone you know. </li></ul></ul></ul></ul>
    21. 22. <ul><ul><ul><li>Email is now the biggest source of viruses </li></ul></ul></ul><ul><ul><ul><li>Can you get a virus just by reading email? </li></ul></ul></ul><ul><ul><ul><li>Viruses Spreading automatically by email </li></ul></ul></ul><ul><ul><ul><li>Attachments </li></ul></ul></ul><ul><ul><ul><li>How to stop email viruses </li></ul></ul></ul>
    22. 23. <ul><ul><ul><li>The Internet has increased the risk of infection </li></ul></ul></ul><ul><ul><ul><li>Sharing of software is easier </li></ul></ul></ul><ul><ul><ul><li>Click and Infect? </li></ul></ul></ul><ul><ul><ul><ul><li>Activex, HTML, Java, </li></ul></ul></ul></ul><ul><ul><ul><li>Safety on the net </li></ul></ul></ul>
    23. 24. <ul><ul><ul><li>1. Don’t use documents in .doc and .xls format use RTF and CSV instead </li></ul></ul></ul><ul><ul><ul><li>2. Don’t launch unsolicited programs or documents </li></ul></ul></ul><ul><ul><ul><li>3. Forward warnings to only one person </li></ul></ul></ul><ul><ul><ul><li>4. If you don’t need WSH turn it off </li></ul></ul></ul><ul><ul><ul><li>5.Follow software companies security bulletins </li></ul></ul></ul><ul><ul><ul><li>6. Block unwanted file types at the email gateway </li></ul></ul></ul><ul><ul><ul><li>7.Change boot sequence to boot from Hard disk </li></ul></ul></ul><ul><ul><ul><li>8. Write protect floppies before giving to other users </li></ul></ul></ul><ul><ul><ul><li>9. Subscribe to a security newswire </li></ul></ul></ul><ul><ul><ul><li>10. Make regular backups of all programs and data </li></ul></ul></ul>