Recent viruses that struck computers worldwide not only made global headlines, but also cost businesses and personal users billions of dollars and man hours to recover data and fix networks. The Business Week headline asks the key question: "Epidemic: Crippling computer viruses threaten the info economy...Can they be stopped?" CNN report indicates that "63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage." Furthermore, a recent survey by Icsa Labs of firms with more than 500 PCs found they took an average of 23 person days to recover (data / functionality /loss of revenue due to denial of service) from each virus disaster.
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers. Renowned author and instructor, Joseph F. Gustin (author of Disaster & Recovery Planning), in this new timely book, addresses cyber terrorism and other forms of terrorist activity, including mailroom security, bomb threats, and the constant attack from viruses, hackers and other invasive programs. Also covered in detail are the necessary steps for prevention, how to assess vulnerability, emergency preparedness, prevention strategies, and incident response and recovery.
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to disrupt and/or destroy business operations is becoming increasingly important for facility managers. Renowned author and instructor, Joseph F. Gustin (author of Disaster & Recovery Planning), in this new timely book, addresses cyber terrorism and other forms of terrorist activity, including mailroom security, bomb threats, and the constant attack from viruses, hackers and other invasive programs. Also covered in detail are the necessary steps for prevention, how to assess vulnerability, emergency preparedness, prevention strategies, and incident response and recovery.