This is a modal window.
Disaster can come in many forms, from a flood to a data breach, to the death of a critical member of your team. When a disaster happens, it is never at a convenient time. It doesn't matter if it is holidays, right before your vacation, or at the end of a grueling busy season. It just happens and you're left to pick up the pieces. The first 24 hours of a disaster are the most critical. How are you going to get back online? How are you going to organize a safe work environment for your staff? How are you going to communicate what has occurred and what you are doing to resolve it to your stakeholders? An organization that is without its data or communications for a prolonged period has a significant risk of going out of business. Every minute of downtime is lost productivity, a missed deadline, or a forfeited opportunity. It isn't a matter of if a disaster occurs, but when it does occur how you will respond. This course will discuss a wide range of disasters from acts of God to man-made calamities, including data breaches and employee maleficence. It offers insight into the major risks, their causes, methods for mitigation of risks, and recommendations for resolution. It will have a detailed discussion on how using technology effectively can help minimize and hedge business risk and ensure continuity of operations. It will examine best practices for data security, the use of hot/cold sites, how to ensure that data is properly backed up, utilizing the Cloud for enhanced redundancy, and more. It is a good course for any organization that is concerned about the continuity of operations and surviving a disaster.
- Review the major causes for data breaches and malware attacks for organization. We will discuss how these attacks occur and the methods to reduce risk.
- Overview of the major security tools and best advice to help prevent data breaches from occurring in your organization.
- Discussion of some of the major risks of data loss in an organization and how an effective backup plan can effectively mitigate the risk.
- Compare and contrast some of the various methods to recover in the event of data loss in an organization.