Information Management Magazine and Insurance Networking News both report that there was significant growth in the Health Care field in the number of IT jobs available. Much of this is due to the requirement that all medical records (EHR) are required to be mechanized and new compliance requirements for the Affordable Health Care Act (aka Obama-care).
It is estimated that the Health Care IT spending will increase by up to 25% in the next two years. Spending last year for Health Care software was was close to $7 billion and is expected to grow by over $1 Billion in the next year. Much of that spending will be in the “small practice” physician and “small hospitals”. The question is how protected will they be from business interruptions and security attacks.
Do have any comments on this?
Disaster Recovery plans that depend on outsourcers face significant additional risk
What if your were in Florida and the Hurricane season was in full swing and your provider decided to go out of business. Would you have the time to move to a new provider and test your solution before you need to execute your plan?
For example, earlier in the year Google decided to close its Message Continuity service. Google gave most clients a reasonable timescale to find an alternative supplier. This allowed existing Message Continuity contracts to run until their contacts expired. What if that was the communication solution you had selected for communicating with your staff? Would you be able to implement a new one on time.
Another example was the news that Doyenz, the US-based supplier of rCloud, a service which offers disaster recovery for physical and virtual servers, had decided to pull the plug on its UK operations. Clients were given not weeks or months but days to respond and to find a new supplier.
CIOs and IT managers all need to consider all of the possibilities and have alternative solutions in place and tested.
FEMA conference videos which discuss tools and services available in the disaster and business continuity processes.
We are looking for people who can help us find typo’s and poor grammar on our sites. We are offering incentives like major discounts on our products or free copies of selected products.
When a security breach or business interruption occur, the life cycle from the start to the end are the same. First and foremost you must be prepared and have a plan in place. Included in that plan is a being able to know that the event or incident has occurred. Then react to what has happened and get back to normal operations as quickly as possible.
After everything is back to the way it should be there should always be a post event analysis to find out what worked, what did not, and what could be done better.
6 Ways to Utilize Social Media Before a Disaster Strikes
by Adam Crowe
When creating a disaster recovery plan include social media. Simple things like having a predefined hash tag (#companynameBC) will make the recover process easier and provide a quick way to get back in business. In addition utilize sites like youtube.com to have instructions on what and how to do it in the recovery process.
Business Continuity Services Video
Business continuity video is good overview of what IBM thinks about this