• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Survive the New Year: Building a business continuity plan

January 19, 2015 by Secure360 and UMSA

Emergency Checklist

Copyright: alexskopje/123rf

In 2014 the business world was met with security breach after security breach. It left the affected companies in not only a crippling financial situation but also with tarnished reputations. Which, one could argue, is worth more than the bottom line. However, there’s a lot to be learned from 2014: consumers and businesses are no longer satisfied with the status quo concerning security best practices. So, in 2015, take the opportunity to learn from last year’s mistakes and build a business continuity plan.

1) Identify internal key personnel.

Never assume colleagues, in both upper and lower management, know whom to contact in case of an emergency. Create a committee of members from various aspects of the business, to ensure no process or level of infrastructure is overlooked. Collect updated contact information, both professional and personal, on a regular basis. Communicate and distribute the list of key personnel internally and to confidential external contacts, if applicable. Because when disaster strikes, and it will, it’ll be too late to outline or identify key personnel.

2) Create various disaster recovery plans.

While “design an evacuation plan for San Francisco” might be an odd interview question, Google had the right intentions. When it comes to developing a business continuity plan, there is no one-size-fits-all for every situation. A natural disaster recovery plan could and should have different points of contacts and business operations than a security or data breach. Document the necessary procedures and create action items for your list of key personnel – just so it’s clearly defined what the roles and responsibilities are.

3) Take inventory of critical resources.

It’s important to take inventory of vital business resources and documents. Are confidential documents or business critical data stored securely? Are backups available? How are they stored and what are the security measures? Do key personnel members have access to offsite company technology? Take the time to ask day-to-day tactical questions as well as higher-level business operation questions.

4) Outline and distribute external contacts and resources.

In the event your physical location has been compromised, an offsite or telecommuting plan needs to be in place. Every day your company is offline means a loss in productivity and profits. Identify a secondary, offsite location for key personnel members to discuss and evaluate the situation, and communicate a temporary business operation plan to employees.

5) Test, revise, repeat.

Don’t assume a one-time run through of an evacuation or disaster recovery plan is suitable for members of your key personnel to feel comfortable executing their tasks. Schedule various planned and unplanned drill scenarios, to gauge how personnel respond under pressure. If certain procedures or members aren’t adequately performing, make any or all adjustments as needed.

Take a proactive step in 2015 and build a business continuity plan. No business is impervious to attack. Protect your data, profits and reputation by having clear, updated and rehearsed disaster recovery plans. Don’t be afraid to test and revise as needed. It’s better to have a solid, working business continuity plan than lose precious productivity days in the event of a disaster.

How often does your company schedule planned or unplanned drills?

 

Filed Under: Business Continuity Management

About Secure360 and UMSA

The Secure360 and UMSA team is made up of professionals in the security and risk management industries. Topics of expertise range from physical security, IT, risk management, cybersecurity, cloud, information security and records management.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Categories

  • Uncategorized
  • Guest Posts
  • Business Continuity Management
  • News and Events
  • Physical Security
  • Cybersecurity
  • Professional Development
  • Risk and Compliance

latest tweets

  1. Secure360 Conference
    Secure360 Conference: As much as many of us enjoy it, there are risks to working from home, specifically as we rely more and more on the… https://t.co/S2nuIyWgjk
    about 3 days ago

  2. Secure360 Conference
    Secure360 Conference: The time to register is NOW, because today is the final day to score early bird rates. #Sec360 is the professional… https://t.co/rsIAkxmmCV
    about 4 days ago

  3. Secure360 Conference
    Secure360 Conference: We can never thank our wonderful #Sec360 sponsors enough! Silver Sponsors @AxoniusInc @BlackBerry @Fortinet and… https://t.co/pnYxfkR135
    about 4 days ago

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.