View in browser | Unsubscribe 
Business Continuity NewsBriefs
October 14, 2009

These NewsBriefs are produced and delivered weekly by Attainium to keep our friends and clients
current on topics relating to Business Continuity, Disaster Recovery and Crisis Management.

Terrorist acts result in destruction, but they also can have extensive physical and other collateral consequences. Along with the physical and psychological effects, major re-allocation of resources occurs in order to repair the damage, recreate a sense of normality, and institute protective actions after the fact. Being prepared for the worst is the most important action you can take to mitigate the damaging effects of terrorism.

How can business leaders lead in the wake of terrorist actions? (Item #1)   Terrorism can hit your organization hard; what can you do to decrease terrorism risk? (Item #2)   Counter-terrorism brings to mind police, military and the CIA, but corporations? (Item #3)  

Even small organizations have been targeted by terrorists; how can you protect yours? (Item #4)   Threats of cyber terrorism are increasing daily. (Item #5)   Facilities managers underestimate the vulnerability of buildings to terrorist attack, may have misconceptions about likely targets and may be unprepared for such an eventuality. (Item #6)  

As always, we look forward to hearing about your concerns with regards to business continuity. If you have a topic you'd like to see covered, please email me at [email protected]

Best Regards,

Bob Mellinger
Attainium Corp

Quote of the Week

". . . and he that will not apply new remedies must expect new evils;
for time is the greatest innovator. . . ."

- The Essays by Sir Francis Bacon, 1601 -


1. Leading Your Workforce during Times of Terrorism
With each new reported terrorist act, people react with fear, anger, and frustration, as well as patriotism. On and on it goes. While no one knows when the threat of terrorism will end, one fact is indisputable: the out-of-control emotions of our employees will have an impact on our organizations. How can business leaders lead in the wake of this situation?

2. Terrorism Checklist: How vulnerable is your organization for Terrorism?
In order to assess your organization's vulnerability for terrorism, two issues are of importance: the activities of your organization and the location of your offices. For both issues some critical factors can be identified.

3. Counter-terrorism for Corporations - Part I
It is hard to believe that behind red mahogany desks, professionals are now deeply involved in security measures to protect their organization, employees and customers against terrorist attacks. This article will examine how corporations are involved in the fight against terrorism.

4. OPSEC Practices Can Protect Small Businesses from Crime & Terrorism
Large businesses have the resources to employ security professionals who can install security countermeasures to protect their businesses and their people. But what can a small business person do to protect themselves and their business?

5. Rise in cyber crime, cyber terrorism and cyber espionage tied heavily to data-stealing malware
Politics and cyber crime have finally intersected in news headlines; understandably so: In the U.S. alone, the number of known breaches of government computers with malware more than doubled between 2006 and 2008, according to the Department of Homeland Security. And, says Trend Micro advanced threat researcher Paul Ferguson, it is even possible that cyber terrorists may have already planted malware within the U.S. electrical grid that would allow them to remotely disrupt service.

6. Terrorism prevention, preparedness, and response in facilities
From a security perspective, an organization's buildings represent a complex challenge. An organization's facilities may cover more than one building or site. In large organizations the number of people using a building can run into many thousands per day and the access needs of all these people and the interrelationships between the many different functions which operate within a facility must be considered in any effective security strategy which complements the effective operation of the business.

Attainium Corp
14540 John Marshall Highway   |   Suite 103   |   Gainesville, Virginia 20155   |   571-248-8200
Privacy Policy


Copyright © 2009 Attainium Corp - All Rights Reserved.

Email Marketing Powered by MailChimp