strong password maintenance two factor encryption techniques proper firewall

Strong password maintenance two factor encryption

This preview shows page 3 - 5 out of 5 pages.

strong password maintenance (two-factor), encryption techniques, proper firewall, and anti- malware software. The best way to ensure compliance with security protocols, is to budget for extra company laptops, and mobile devices, that are maintained, and kept up-to-date, by the Information Technology (IT) Department. Lastly, additional funding for other company assets such as office supplies, hardware, and software requirements, needed to get back up and running, should be included, and carried over, in the annual budget. This will ensure, any additional company assets needed for disaster recovery, and business continuity, can be purchased, and readily available when needed. While there are many options available to this business, other than the ones discussed, these are the
Image of page 3
DISASTER RECOVERY AND BUSINESS CONTINUITY PLAN 4 most cost effective, and efficient ones available. This Disaster Recovery & Business Continuity Plan, will bring daily operations back up to peak performance in the timeliest manner.
Image of page 4
DISASTER RECOVERY AND BUSINESS CONTINUITY PLAN 5 References American Voice Mail Inc. (2017). What will you do when you can't answer the phones . Retrieved from americanvoicemail:
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Winter '18

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture