Denizon’s Business Continuity Services

Disruptions to business operations can be as catastrophic as a Hurricane Katrina or a 9/11 or as relatively trivial as a minor power outage or a planned shutdown. What ever the gravity, scope and duration the disruption has, your company should be able to handle each situation so that you can declare “business as usual” and really mean it.

By implementing a business continuity plan, your enterprise will not just be able to resume business after a disaster strikes. Rather, your enterprise will be able to deliver goods and services continuously.

One of the major factors that prevent businesses from resuming immediately after a disaster is the loss of data. That is why you’ll want to keep your data in the most secure places.

At Denizon, we won’t just ensure that all your data stays protected at all times, we’ll also put up the appropriate procedures to guarantee their availability in the shortest possible time whenever an interruption happens. That way, all your stakeholders – customers, suppliers, regulators, investors, and everyone in your team – can get back to business right away.

To achieve this, we’ll work with you to plan for and set up the necessary infrastructure, IT solutions, organisation, and practices. We’ll assess your risks, identify the threats and vulnerabilities, then come up with ways to control them.

Ironically, the very act of laying down the foundations of business continuity is a major disruption by itself. Now, both disruptions and even the act of preventing them cost money. That is why we’ve devised a system to reduce interruptions to the most acceptable levels as well as forgo all unnecessary costs.

Do find time to view our service offerings and we’ll show you how to bring down those downtimes.

We can assist you with the following:

Check our similar posts

How Small Irish Businesses Avoid the GDPR Sting

Accountants providing chartered accounting services and tax advice are alerting smaller Irish companies to the consequences of the pending General Data Protection Regulation (GDPR). They believe these are going to feel the most pain come 25 May 2018, if they do not implement GDPR by then. We are trying our best to help avoid this situation by providing advice.

How to Kick the GDPR Ball into Play

The Irish Information Commissioner?s Office has produced a toolkit regarding where?s best to start. They suggest beginning with an information security assessment to determine the gaps companies need to close. Once quantified, this leads naturally to a plan of action, and resources needed to fulfil it. Here?s how to go about it:

1. Start by assessing your current ability to identify, assess, and manage threats to customer data security. Have you done anything at all to date? You must be holding some customer information surely, and it is highly likely the GDPR applies to you.

2. Next, review your company?s current customer data security policies. Are they documented and approved, or do new employees discover them sitting next to Nellie? Rate yourself on a scale where ten is successful implementation.

3. Now consider how well you have pinned responsibilities on individuals to implement policies and take the lead on GDPR. The latter should be the business owner, or a board member with clout to make things happen.

4. By now, you should have a grasp of the scale of work ahead of you, remembering the EU deadline is 25 May 2018. If this sounds overwhelming, consider outsourcing to your accountant or a specialist provider.

5. Under the General Data Protection Regulation you have only 72 hours to report a breach of customer data security to the Information Commissioner?s Office. Do you have a quality assurance mechanism to oversee this?

Tangible Things to Bring Your Own People on Board

With all the changes going on, there is a risk of your employees regarding GDPR as ?another management idea going nowhere.? Thus, it is important to incorporate the new EU regulations in staff training, particularly with regard to data security generally. They may fully come on board only once they see tangible signs of progress. You should in any case put the following measures in place unless you already have them:

1. A secure area for your servers and for any paperwork your customers provided. This implies access control on a need-to-know basis to protect the information against loss, damage, and theft.

2. A protocol for storage media and record disposal when you no longer require them or something supersedes them. You are the custodian of other people?s information and they deserve nothing less.

3. Procedures to secure customer data on employee mobile devices and computers: This must extend to work done at home, at consultant sites, and by remote workers.

4. Secure configuration of all existing and new hardware to minimise vulnerability and storage media crashes. These quality assurance measures should extend to removable media and remote backups.

So Is This the Worst of the Pain?

We are at the heart of the matter, although there is more to tell in future articles. You may be almost there, if you already protect your proprietary information. If not, you may have key company information already open to malware.We should welcome the EU General Data Protection Regulation as a notice that it is time to face up to the challenges of data protection and security generally. The age of hacking and malware is upon us. The offender could be a disgruntled employee, or your competition just down the street. It is time to take precautions.

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK
Mobile Security

Today’s advanced enterprises make extensive use of mobile devices in order for team members to exchange information, collaborate, and carry out business whenever and wherever they need to. BlackBerries, iPhones, Google Phones, and other smartphones as well as PocketPCs and PDAs are now allowed wireless remote access to the enterprise network.

As a result, they introduce additional vulnerabilities into the system.

  • Bluetooth exploits and unencrypted passwords can allow malicious individuals to gain access to private information.
  • Various wireless technologies that have substantially simplified the task of transferring data have provided openings for malicious code. In addition, the diversity of these wireless technologies combined with the constrained environments of these devices have made it difficult to come up with an all-in-one solution.
  • All PocketPCs, PDAs and smartphones can be synchronised with PCs and laptops, giving malware an entry point into computers and networks. Memory cards are guilty of this too.
  • VoIP, which are usually unencrypted, allow other people to perform unauthorised capture and recording of private conversations.

Mobile security is still an emerging discipline. Because of this, many organisations that allow members’ mobile phone access into the network don’t actually have a specific security policy for such devices.

That’s why we’re here to help. We’ll conduct a thorough evaluation of your security policies and systems in relation to mobile devices and seal gaps we spot along the way. If you don’t have the needed policies or if what you have needs an overhaul, we’ll set everything up (including the needed applications and infrastructure) for you.

Once we’ve got everything in place, you won’t have to worry about the vulnerabilities mentioned earlier. In addition to that, your organisation will already be capable of preventing the following:

  • Access to company information when the phone ends up in the hands of anyone other than the authorised user.
  • Being billed for phone usage due to virus activity
  • Unauthorised phone activity monitoring through spyware
  • Other disruptions caused by mobile-based malware

Other defences we’re capable of putting up include:

5 Numbers showing why the Time to Invest in eCommerce in the UK is Now

A decade or two ago, you might have already had the urge to invest in eCommerce. But astute as you are, you must have decided to wait for the right time and perhaps the right place to do it. That time has come. And the right place to do it? Try the United Kingdom.

Here’s why:

1. ?100 billion worth to the UK economy

A report conducted by US-based BCG (Boston Consulting Group) showed that Internet-based business in the UK reached ?100 billion in 2009. That translated to 7.2% of the country’s GDP that year, making it bigger than industries like construction, education, and health & social work, and even slightly bigger than agriculture, hotels & restaurants, and mining, combined. Click here to see the comparison shown as a graph.

?100 billion?is certainly huge, but?the market potential of the Internet in UK is even made more evident if you also look at the numbers based on amount spent per capita…

2. # 1 in per capita spending

According to IMRG (Interactive Media in Retail Group), “the UK’s per capita spend of ?1333 (?1108) per annum” is number one in the world. This shows that people from the United Kingdom are more willing to buy goods from the Internet than other people on the planet. And this alone should tell you why UK is the best place for e-commerce.

But while you’re still pondering whether now is really the best time to invest, bear in mind that competitors who have gone to the Internet before you are already thinking of expanding …

3. 1.5 million workers in Internet retailing by 2015

Last year (2011), the number of people employed in UK e-businesses was about 730,000. While conducting its second annual e-Jobs index in 2011, IMRG (Interactive Media in Retail Group) found out that it was largely due to a rise in employment in 63% of e-businesses. The study also showed that 60% of e-businesses were also planning to beef up their employees within a year’s time.

While other sectors are shrinking their ?workforce, businesses on the Internet are growing theirs. Were they just speculating? Perhaps not…

4. 50% of parsels during 2016 pre-Christmas peak will come from e-commerce

Last year (2011), parcels coming from e-commerce accounted for 37% of all items sent through UK couriers during the November-December stretch. That volume from e-commerce was 15% higher than the previous year. This remarkable climb, which was reported by Global Freight Solutions (GFS), shows the growing confidence of customers when it comes to buying products online.

If this rate continues, items from e-commerce will easily comprise 50% of parcels by 2016. Chances this rate will continue? Let’s go to number 5 and you be the judge.

5. 66% of all adults made online purchases in 2011

A statistical bulletin published by the ?Office for National Statistics revealed that 32 million people made online purchases in 2011. That actually comprises 66% of all adults in the UK. Significant as that may seem, what is really striking is that that figure used to be 62% in 2010. So again, this proves that the number of people who buy products and services online is steadily growing.

If you really think about it, these statistics should not be surprising. The smartphone is now practically the default mobile device of anyone who owns a mobile phone. And then of course there are laptops and tablets.

With these devices on hand, coupled with the ever growing number of WiFi hotspots and telecommunications bandwidth, gaining access to the Web has never been easier.?It can be done practically anytime, anywhere.

This makes it so easy for people to search for products, compare competing brands, and eventually make a purchase from home, the office, on the terminal, or on the train.

Related post:

Integrated e-commerce ? The right way to do extend your business online

Contact Us

  • (+353)(0)1-443-3807 – IRL
  • (+44)(0)20-7193-9751 – UK

Ready to work with Denizon?