TITLE

A COST EFFECTIVE, SAFE, AND SIMPLE METHOD TO PROVIDE A DISASTER RECOVERY PLAN TO SMALL AND MEDIUM SIZED BUSINESSES

AUTHOR(S)
Guster, Dennis; McCann, Brandon; Krzenski, Kira; Lee, Olivia F.
PUB. DATE
September 2008
SOURCE
Review of Business Research;2008, Vol. 8 Issue 4, p63
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Every organization can experience an unexpected incident that prevents it from continuing normal business operations, and it can happen at any time. In today's information era when most business operations rely heavily on information resources and internet connectivity, incidents can range from computing downtime to severe system damage. It can cause loss of data and jeopardize information security. Derived from a real-time disaster, this paper presents an effective information resource recovery plan that utilizes off-the-shelf software, minimal bandwidth and, once implemented, can be easily replicated across multiple sites. Some major advantages of the proposed plan include low overhead, simplicity of implementation, and excellent security.
ACCESSION #
35601368

 

Related Articles

  • SECURING PRIVACY. Greisiger, Mark // Risk Management (00355593);Oct2001, Vol. 48 Issue 10, p14 

    To address concerns about online privacy, most organizations have drafted formal privacy policies. A major issue that remains, however, is ensuring that a company's online and offline business practices are consistent with these policies. In the Web environment, privacy problems often arise not...

  • TMI.  // Current Health 2;Feb2006, Vol. 32 Issue 6, p14 

    The article presents a made-up example of personal Web site with too much information.

  • A System Dynamics Model of Information Security Investments. Behara, Ravi S.; Huang, C. Derrick; Qing Hu // Journal of Information System Security;2010, Vol. 6 Issue 2, p30 

    Information security management has become an increasingly serious and high-stake challenge to organizations, due to growing reliance on the Internet as the business platform, the intrinsic vulnerability of Internet technologies, and the increasing value of information stored in information...

  • The security of computer systems and networks. Israël, Mauro // Défense Nationale et Sécurité Collective;may2008, Vol. 64 Issue 5, p91 

    The future of our civilisation—which invented the Internet—depends on our ability to understand and master this fantastic tool. Risks such as generalised denial of service or loss of confidentiality could lead to the ruin of our economies and the disruption of our logistic and...

  • Study Finds Major Impact From Network Downtime.  // Business Communications Review;Mar2004, Vol. 34 Issue 3, p6 

    Reports on the findings of a survey suggesting that majority of companies in the U.S. suffered on the average 501 hours of network downtime. Causes and sources of downtime; Impact on revenues.

  • Report: CEOs must be prepared for massive Internet disruption.  // Mortgage Banking;Nov2007, Vol. 68 Issue 2, p105 

    The article reports that chief executive officers (CEOs) and other business leaders must recognize the increasing dependence of their business functions on the Internet and the risks associated with it to the U.S. economy. According to report, Internet disruption is detrimental to businesses,...

  • Security Convergence - The Future can be found in the Past. Elliott, David // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68 

    The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will...

  • The rules have changed.  // Caribbean Business;12/16/2004, Vol. 32 Issue 52, p22 

    Comments on the shift in corporate security threats from thefts and break-ins to security breaches of a company's information system in Puerto Rico. Rise in threats to information systems that contain valuable data on the business and its clients; Classification of threats whether from insiders...

  • Not protecting Web applications. Johnson, Brad // Network World;8/28/2006, Vol. 23 Issue 33, p58 

    The article focuses on the problems faced by companies to properly protect their Web site and Web applications in the U.S. As reported, almost every company has some type of Web presence ranging from simple brochure sites to sophisticated transaction-oriented applications, and therefore has some...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics