Andreas
Andreas
@andreas@nomorecubes.net
2,661 posts
4 followers
  • Intrusion Detection Technology: Examples

    Acoustical detection: A bio-hazard laboratory is in a hermetically sealed area of a building. Motion detection: A large warehouse needs after hours protection. Electrostatic detection: A expensive painting on display […]

  • Components of layered defense

    Mechanisms for preventing unauthorized access to rooms where sensitive data is stored. Bars on windows that represent possible building entry points. Surveillance devices for securing the perimeter of the organizations’s […]

  • Securing a safe

    Create strong combinations for the safelock and change these frequently Install the safe in reinforced concrete

  • Secure HVAC systems

    HVAC is short for „Heating, Ventilation and Air Conditioning“. Installing separate air conditioning for data centers. Maintain positive pressurization Also, in the context of access control: Implementing access control for […]

  • Preventing Power Problems

    Install static controls. Use power line conditioners. Installing regulators to ensure clean power. Installing single-socket power line filter suppressant.

  • Disaster Response Roles

    Responsible for carrying out the recovery processes and tasks: Emergency Response Team Responsible for contaction the organization’s lawyer an/or legal team: Primary site restoration team Responsible for interfacing with the […]

  • BC and DR essentials

    Information on how to release progress reports  to vendors and the media. Information about how an event is communicated and escalated. A listing of each group’s roles and responsibilities.

  • Technology Recovery Strategies

    Dual data centers: Two fully functional sites that both support an organization’s functions. Cold sites: Empty spaces containing no technical equipment or resources. Hot sites: Sites fully configured with equipment […]

  • Recovery Strategy Considerations

    The setup, maintenance, and execution of the recovery strategy must cost no more than the value of protecting the relevant technological asset or business process. Ensure that the financial benefit […]

  • Plan Test Types

    Call exercise: To find out how many involved people on the notification list are available any given time. Compact exercise: testing a plan using the most comprehensive type of test. […]