BCP/DR – Do you know these frameworks?

BCP/DR – Do you know these frameworks?

Business Continuity Planning is the way an organization can prepare for and aid in Disaster Recovery (DR). It is an arrangement agreed upon in advance by management and key personnel of the steps that will be taken to help the organization recover should any type of disaster occur. Though personally, I do not like Business Continuity Planning (BCP) to be associated with DR. For me BCP is more about the continuity of business and not just IT.

Disaster Recovery (DR) is the process an organization uses to recover access to their software, data, and/or hardware that are needed to resume the performance of normal, critical business functions after the event of either a natural disaster or a disaster caused by humans.

Business Continuity/Disaster Recovery Plans come in various forms, each reflecting the corporation’s particular set of circumstances. It’s about using the right people, processes, and technology.dr

Standards/Frameworks:

The best practices and various business continuity standards that details the steps for best business continuity plan are many and one needs to balance all these standards/requirements to get it right.

The list below does not include popular ISO, NIST, and other standards. The few below are those which you may or may not know.  They are very interesting to read.

Please check the frameworks below to see if your BCP/DR team has considered them.

  1. NFPA 1600
  2. ANS/NZS50502010 Business continuity-Managing disruption-related risks
  3. DRI Library
  4. BS25999
  5. ISO/IEC(various standards)
      The list is long but included few above to start the conversation.

     

    For more information  contact 

    eInnoSec Initiated Project for Like Minded Security Professionals (www.einnosec.com)

    Please check the earlier postings from e-InnoSec Team (www.einnosec.com):

        1. https://www.linkedin.com/feed/update/urn:li:activity:6533692345538408448/
        2. https://www.linkedin.com/feed/update/urn:li:activity:6531139710239199232/
        3. https://www.linkedin.com/feed/update/urn:li:activity:6525881711706853376/

Information Systems Audit

einnosec

www.einnosec.com

 

 

An information technology audit or information systems audit is an examination of the management controls within an information technology infrastructure and IT processes.

The potentially catastrophic events such as loosing data, loss of systems for extended period of time, malware, hackers, etc. pose a serious threat to organizations that are investing billions of dollars in their computer systems, databases, etc. This dependence on complex computing and large-scale data schemes has led organizations around the globe to recognize how IT auditors can help them understand the constantly shifting risks of the information age. IT auditors follow all the same ethical and independence parameters as financial auditors, but their focus is on the governance of IT systems and processes.

Continue reading “Information Systems Audit”

Mobile Security

einnosec

www.einnosec.com

 

MOBILE SECURITY

Gartner research paper “Agenda Overview for IT Operations Management” published on Jan 3rd, 2014 states that “The Nexus of Forces – the converging and mutually reinforcing social, cultural and technological factors of cloud, mobility, social and information – is driving a radical shift in power away from the enterprise and toward the individual.”

Continue reading “Mobile Security”

BYOD/COPE – WHAT & HOW?

einnosec
www.einnosec.com

BYOD/COPE – WHAT & HOW?

As more and more companies embrace “Bring Your Own Device (BYOD)” model, many questions arise. Allowing access to corporate data on a personal device means that you will be exposed to privacy laws. These laws vary significantly around the world and are intended to protect the employee. Countries in the European Union have the most restrictive privacy laws and regulations and can impact your ability to roll out a BYOD initiative as well as your approach to implementation in that region. Continue reading “BYOD/COPE – WHAT & HOW?”

Remote Monitoring and Management

Remote Monitoring and Management

eInnosec RMM offering comprise of three core deliverables: 24/7 remote monitoring, service desk, and event monitoring. We have invested in the state of the art tools to enable receiving alerts to situations requiring immediate attention and also to provide maximum uptime to customers. The common services include event monitoring, managed firewall, intrusion detection, virtual private network, vulnerability scanning, and anti-viral services. eInnosec high availability security operation center provides 24/7 services.

eInnosec’s team of consultants and support technicians provide round the clock services to manage and maintain your mission critical infrastructure devices. eInnosec Service Desk is key component in providing effective problem management and remediation services to end users. The service desk allows the MSP to resolve issues remotely for customer 85% of the time, tremendously reducing the need to schedule an on-site visit.

  • We offer Silver, Gold and Platinum plans that range from simple monitoring and escalation to complete remote support and on-site support.
  • The Managed Services consists of Problem Resolution, Preventive Maintenance, Remote Access Support, Remote Event Monitoring, Dispatch Desk, Help Desk and additional services as required.

NOC Services

NOC Services

Our NOC Services provide comprehensive monitoring and remediation services for servers, networks, applications, databases and workstations. NOC Managed Services identify network problems before they can impact business functions or productivity and seek to resolve issues remotely from the NOC or by dispatching technicians to customer sites. The monitoring and management includes: Performance Monitoring, Configuration Management, Traffic Analysis, User Device Tracking, WAN and VOIP Monitoring, Backup management.

eInnotech will support the clients the to meet their expectations:

  • Customize the team you want exactly how you want it
  • Have complete control over each resource
  • Deliver services using your RMM and PSA tools
  • Mix and match resources over time as your requirements evolve
  • Rapidly replace or add new resources

Mobile and VOIP Services

Mobile and VOIP Services

Adoption rates of hosted VOIP and managed VOIP are increasing as more companies look to reduce the costs and complexities of deploying VOIP in house.

Mobile devices are proliferating in the workplace, making it easier for users to access business data and applications. While mobile technology enhances the productivity of users, it also puts strain on the IT organization that has to monitor, maintain and secure these devices.

Featured offering:

VOIP

  • Pro-active health management with configurable monitoring and alerting.
  • Service Desk Staff to fully support all technical aspects of your VOIP business environment.
  • Monitoring covers Gateways, IP Phones, Quality of Service (QOS), CISCO Unity, etc.

Mobile Devices

  • Effective provisioning of devices out in the field, deploying a mail profile and control over apps.
  • Comprehensive business analytics.
  • Continuous improvement with enhanced testing, management of the lifecycle, and visibility of mobile-enabled business processes.
  • Service Desk Staff to fully support all technical aspects of your mobile business environment.
  • Pro-active health management with configurable monitoring and alerting.
  • Configuration management and staging with zero touch deployments.
  • Comprehensive asset management with full asset audit, viewable by device type.