Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Vaccinating Disasters

By Ken Hunt
November 24, 2009

There’s been a great deal of publicity surrounding this year’s cold and flu season, and for understandable reasons given the introduction of the H1N1 vaccine around the U.S. The amount of literature in airports, on TV and in magazines have been clear and concise; take simple, but effective and necessary, precautions against catching and spreading the seasonal bacterial and viral bugs to family, friends and co-workers.
     
This good advice should not be lost to those in charge of corporate networks. In fact, now is one of the best times for you to review your IT Disaster Recovery Plans before it becomes too late to do so.
     
The key here is that while many IT issues can be prevented, other circumstances outside of anyone’s control can and will prevent employees from being physically able to get to the office, and cause severe disruptions in the process. Though many companies offer VPN access to the small percentage of staff members who regularly travel or are based in remote areas, situations like the ones described here could result in a sizable rise in the number of employees needing to use a company’s IT systems away from the workplace. Organizations that can’t flex to such an increase in demand will not only negatively impact productivity, but quite possibly put their entire network system uptime at risk.
     
So in the spirit of the season, we recommend that you look at the efficacy of your Disaster Recovery Plan by answering these three questions.
  • Do you have a remote access surge plan? Can the company rapidly increase the number of secure access points to its network for employees that find themselves unable to come to the office for extended, albeit temporary, periods of time? If the answer is no, it might be wise to think of some of the recent natural disasters, such as the Iowa floods from two years ago, and come up with a “worst case scenario” strategy in how to build up capacity on short notice to help more staff members gain remote connectivity.

    One effective way for you to do this is to identify sources that offer one, two or three-month access points licenses in order to enable network administrators the capability to immediately increase their remote user count in the event of a significant operational disruption. This works like an insurance policy toward any future planned or unplanned event when remote traffic looks to increase from current user counts to hundreds or even thousands of additional users.
  • Is the temporary access you provide these folks secure? It’s important to ensure that employees working virtually due to unforeseen circumstances still have the same security protection as they would in the office without compromising the integrity of the IT network.

    Doing so means that the additional temporary access points obtained should come with such safeguards as:
    Multiple operating system support
    User group-oriented virtual portal customization
    Multiple Internet login for rapid connection for users from different regions
    A wide range of authentication methods (digital certificates, dynamic passwords) for enhanced security
    Single-Sign-On to reduce the hassle of memorizing passwords

  • Do you have help? Organizations should not have to go at it alone, but rather enlist their system integrators and product vendors to help make this happen. The best partners are the ones who should have offerings that specifically meet this demand. They should also have an arsenal of best practices to provide companies with lessons learned from others.
         
    References are a must here; such companies should be able to provide you with contact information of key folks inside organizations that were in such a bind and able to recover from it with the system integrator’s help. Due diligence is a vital component in choosing the right partner.       

Having a workable Disaster Recovery Plan that can respond to all types of security and access issues – including those that come about from natural phenomenon or health epidemics – can be the difference between staying up and going down. No one can predict the future, but rest assured; it will hold unforeseen challenges and circumstances. Youcan stay ahead of the curve by developing strategies and identifying resources that can help adjust to situations beyond their control. For it’s not a question of if such an issue will occur, but rather when.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

T. Kendall "Ken" Hunt, Chairman and CEO of VASCO, a leading supplier of strong authentication and e-signature solutions and services specializing in Internet Security applications and transactions.  VASCO has positioned itself as global software company for Internet Security serving a customer base of approximately 8,500 companies in more than 100 countries, including more than 1,250 international financial institutions. VASCO’s prime markets are the financial sector, enterprise security, e-commerce and e-government. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Walmart's Ken Senser Announces Retirement; Brian Murphy Named VP of Global Security and Aviation

    See More
  • SEC1119-500Profile4-slide4_900px

    Ken Harr: Protecting the Citizens

    See More
  • police officer

    Ken Ferrante named Hoboken Public Safety Director

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Environmental Protection

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing