Be Prepared

Be Prepared

We learn lessons every time there is a catastrophe or potential catastrophe like this. I say that we learn them, but I mean that we could learn them if we would pay attention, reflect, consider, plan, execute, and anticipate.

Lessons we would all acknowledge, but we cannot say we have learned until we implement strategies are:

1. We are vulnerable and getting more vulnerable daily because we are growing more dependent upon technology.

2. We have sources and resources for protection. They cost time and money, but they can help eliminate, ameliorate, or minimize great loss.

3. The old Cold War notion of the domino effect applies to our digital world and networks today. When one sector goes down, all are potentially effected.

4. The suffering that is possible when the network crashes does not simply plague the powerful; it touches the most vulnerable. It is human suffering.

5. The time to plan for crisis is when we are not in a crisis.

6. Those who are prepared, recover more quickly.

7. Not just big companies, but small businesses and individuals need backup plans for storage and for operations.

What am I missing? If you say "nothing," we are all at risk, but cause there is always something we are missing.

That reality keeps us on our toes

The key is to prepare Be Prepared.

Preparing for a cyber attack is crucial for businesses to ensure the security of their data and operations. Here is a comprehensive guide to help a business prepare for potential cyber threats:

P. Policy

You should have some clear and implementable security policies in place. Study best practices and standard for your industry. Follow your policies with a plan and make sure all of your staff understands and is trained to implement.

R. Risk Assessment

Do a risk assessment. Identify potential vulnerabilities. Be aware of threats and threats. Understand the changing landscape of the risks in the field. Be adaptable. Consult your insurance carrier for advice.

E. Employees

Your staff and volunteers are your first line of defense. Train them to recognize phishing attempts and to understand safe internet use. Keep the training up-to-date,.

P. Purchase

Buy the software, antivirus protection, and consulting you need to head off an attack and recover when one occurs. The dollars you spend on this side of an attack will be saved many-fold after one.

A. Authentication

Implement multi-factor authentication for accessing sensitive systems and data. Utilize strong passwords. Keep them updated.

R. Review

Don't count on anything to remain stable. Monitor, inspect, review, revise, resource, and renew regularly.

E. Encrypt

Encrypt your data. Move it securely. Back it up regularly and religiously. Utilize redundancy.

D. Do It. Test it. Insure it. Monitor it.

All of this is about implementation, otherwise known as doing. Just thinking about it will not protect you. Get it done. Once you have a plan, test it. Get insurance. Get advice. Get eyes on the project. Get it done.

There is much more to it and this is not intended to exhaust the subject. But if you start with this acronym, you will be on your way to being P-R-E-P-A-R-E-D

.hashtag#outage hashtag#cyberattack hashtag#IToutage #


To view or add a comment, sign in

More articles by Tom Sims

  • Interpreting Your Life

    Interpreting Your Life

    Who Is Writing Your Captions? Someone is interpreting your life and your experiences. Are they qualified? Are you? I…

    1 Comment
  • Word Becoming Flesh

    Word Becoming Flesh

    The Word Became Flesh and We Beheld John 1:1-18 (NRSVU0 In the beginning was the Word, and the Word was with God, and…

    1 Comment
  • Faithing

    Faithing

    Faith, according to Hebrews 11:1 is substantive and evidential in and of itself. Does that suggest that faith in…

    3 Comments
  • How We Grow and Help Others Grow

    How We Grow and Help Others Grow

    A Sermon Notes: Ask and Answer Accept Advance Admire Look at how Jesus grew to suggest how we grow and help others to…

    1 Comment
  • Forgotten in Sevice

    Forgotten in Sevice

    With a Living Legacy There is a picture hanging on this wall. In it, are Oswald and Biddy Chambers.

  • Where There Is Sadness, Sow Joy!

    Where There Is Sadness, Sow Joy!

    Merry Christmas! May this and every day be a Mass of Christ, Merry, joyful, and filled with celebration. May you be…

  • Christmas in Polecat Hollow

    Christmas in Polecat Hollow

    The first significant snows of winter came last week to Polecat Hollow and carpeted the ground with layer upon layer of…

  • Who? Me?

    Who? Me?

    Matthew 2:5-6 - And they said unto him, In Bethlehem of Judaea: for thus it is written by the prophet, And thou…

    1 Comment
  • Same Old Thinking

    Same Old Thinking

    I have a short letter today, but, if you you apply it, it will give you long results. You have heard that the same old…

  • Longing and Hope at Advent

    Longing and Hope at Advent

    Preaching Advent Hope and Eschatological Judgment on the First Sunday of Advent I had a terrible night of dreaming. I…

Insights from the community

Explore topics