- This topic has 1 reply, 4 voices, and was last updated 2 years, 3 months ago by .
- You must be logged in to reply to this topic.
Cybersecurity Certifications | Mile2
Home » Topics » OCU ISCAP A Forum » OCU ISCAP A Weekly Discussions » OCU ISCAP A Week 05 Lesson 16 Discussion
A security officer needs to plan ahead for all “what-ifs.” Planning for a disaster is important in order to have a speedy recovery thus losing the least amount of money for an organization. What are ways to prevent disasters? Discuss at least 4 of these ways and how preventing these can be better than a cure.
A security officer will want to develop a Business Continuity Plan. In the plan countermeasures to prevent a shutdown of the capability to perform critical business services will need to be implemented. Fault tolerancing and redundancies are needed, hard drive failure and many critical devices wear over time, so a plan to countermeasure any data loss or breach in security is needed. Fire safety measures, policies on how to react to fires and fire suppression are also common countermeasures, along with insurance that is reviewed consistently. In case of a catastrophic failure at the main facility, having a backup facility will be required, or a way to contract the business out until repairs are made. A hot site, where the business can pick up in a few days and get operational again, or a cold site that will need refurbished with equipment can be used as well. Contingency plans for security will need to be maintained when disaster occurs, especially if business operations are moved off the original site, the same level of security needs to be upheld still.
The support ticket system is for technical questions and post-sale issues.
If you have pre-sale questions please use our chat feature or email information@mile2.com .
Mile2 Cybersecurity Certifications is a world-leader in providing accredited education, training, and certifications for INFOSEC professionals. We strive to deliver the best course ware, the strongest Cyber Range, and the most user-friendly exam system in the market.
Our training courses follow our role-based Certification Roadmap. Plus, many of our classes include hands-on skill development in our Cyber Range. We train students in penetration testing,disaster recovery, incident handling, and network forensics. Additionally, our Information Assurance training certification meets military, government, private sector and institutional specifications.



