Disaster Planning (24)

Getting back to business after a disaster depends on preparedness planning done today. Business owners invest a tremendous amount of time, money and resources to make their ventures successful, and yet, while the importance of emergency planning may seem self-evident, it may get put on the back-burner in the face of more immediate concerns. For business owners, being prepared can mean staying in business following a disaster. An estimated 25 percent of businesses do not reopen following a major disaster, according to the Institute for Business and Home Safety. The materials and resources on this Web site can help small businesses make plans to recover from financial losses and business interruption and to protect their employees, the community and the environment.

    IT Infrastructure and Employment (19)

    In many enterprises, CIOs are perceived as mere technology managers, while in reality they should be viewed as business leaders. The CIO’s focus should be on reducing costs and improving profitability through the strategic usage of IT. It is very important for the Information Technology organization to get out of a transactional mode. If the CIO has the right infrastructure in place, then the CIO can help in directing the strategy of the enterprise, and even shape its destiny. The CIO brings his own perspective, and without IT, you cannot build a robust and business.

      Security (3)

      The FBI received a record number of complaints and the associated direct cost of the frauds carried out with stolen data was $265 million versus $235million last year. Adding to this is the challenge of securing personal information and intellectual property data. Companies are granting access to more systems and information - bank customers access to account balances; workers maintain their own 401k and investment accounts; web shoppers place orders and make purchases with a single click; and business partners work on projects in a collaborative manner online. To reduce the risk of a data breach or theft, organizations must adopt new tactics. In addition, companies must address e-mail and Web security along with employing a functional data loss and prevention strategy. The application of multiple security techniques is required to reduce risk. For example, there must be a way to control spam and block the downloading of malicious software from poisoned Web sites. In today's open Web 2.0 and social networking environments, companies need a way to defend against attacks and protect secret or sensitive data. At the same time, they must maintain a flexible and responsive infrastructure to support today's business working habits.

        Reference Sites (12)

        Reference sites and directories

          Non English Language Links (1)

          Links to IT Management Issues in languages other than English

            Disaster Planning Security Policies Procedures Job Descriptions IT Infrastructure, Strategy, & Charter Template IT Salary Survey Internet PDA SmartPhone DRP Security