Latest Blog -- More on Disaster Recovery

In my last post on Disaster recovery, I discussed that backups can lead to a false sense of security and that the only thing that really matters is the ability to restore. See this link:   Basic Rules of Disaster Recovery This is still absolutely correct. In some circles it is a new and controversial idea; most experienced IT hands immediately recognize this need to restore as an absolute truth. Today I want to discuss some other elements of disaster recovery planning. There is much more to it than just getting restorable backups. Here are some additional vital points that need to be recognized.   Depending upon the nature of the disaster and your company’s management’s response to the disaster, managing staff can be the most important and potentially impactful of all tasks. Why? Very simple. People respond to disasters not computers. More on Disaster Recovery...

The Basic Rules of Disaster Recovery

This is a topic that is likely here to stay as long as computers are relied on for productivity. The key is the restoration of functuality.

Disaster Recovery is a large topic. Unfortunately, most people think of this topic in terms of information systems recovery, which is a very important part of the picture, yet there is so much more information that is vital.  Our discussion will start with information systems recovery and then in later blogs I will address some of the other factors.

After forty plus years in Information Technology and being involved at various levels of IT and management I defined some basic rules regarding disaster recovery that anyone would be wise to be familiar with.

  1. The capability to back up data in and of itself is useless.  Backups of data are often useless or nearly so. 

Backups of data are even dangerous ...

Click HERE for the complete solution.

 

A word on Computer Security

This is a topic that is likely here to stay as long as we use networked computers in business and government. 


Various Types of Malware

There are various general categories of Malware - some of the most advanced malware has elements of each. Here is a brief description and summary.

  • Virus - A form of malware that does something destructive to a computer or data

  • Worm - A form of malware that duplicates itself from computer to computer

  • Trojans - A form of malware that delivers something else (some other form of malware into your system - such as a Spyware)

  • Spyware - Something that tracks your actions and delivers this info to other systems

  • Root Kit - A technically advanced form of malware. Difficult to find and relatively dangerous. Thankfully this is somewhat hard to implement.

  • "Drive by Exploit" - This particular breed of malware that makes your computer execute instructions when you visit a website. What's particularly nasty about this one is that when it executes, it executes as though it is YOU executing it. In other words with your log-in ID, security, etc.!

More from the Presentation - "The Critical Dozen".


Computer security is a tough topic. It is not unusual for people to just mentally run away from the topic. A certain mental toughness seems to be essential to work in this area. In addition, a substantial amount of knowledge is required to effectively deal with many computer security matters.

There are millions of attacks on computers every single day.  Many of these attacks are themselves conducted by teams of computers that have been compromised and used to accomplish destructive purposes without the slightest knowledge of the computer's owner. Unfortunately, breaking into computers and using them for malicious purposes is a billion dollar industry today.

Attackers steal information and use it in fraudulent financial transactions. Or gain other business and technical advantages they never earned. 

Fortunately, today, after years of dealing with computer and information security related issues, solutions are becoming available that can make it very difficult and expensive to break into systems.  Contact me and we can discuss some of them.

There are tools publicly available that can help bring commercial systems up to Defense Department Standards.   The National Institute of Standards and Technology provides excellent guidance on computer security matters in their 800 series of documents. There are standards for education of administrators of Department of Defense systems known as the 8570 series. However, it is still the end user of a computer that can make or break its security.  User’s actions are frequently part of major security problems.  Education of users is a critical step toward information security.


Winning Strategies for Project Management book is available on Amazon.

Project Management is not easy, but with the methodologies developed and explained in this book, it is easier to accomplish your goals and deliver real value to all concerned. Too often projects involving technology do not create as much value nor help as much as they should. After you finish this book, you are unlikely to look at business and project management the same way again. Enjoy the voyage!

Click Here for the book on Amazon