- The software flaw that could beam out passwords by DNS read more
- Equifax data breach defense: the latest updates read more
- PCI Issues Security Awareness Guidance read more
- OWASP Testing Guide V4 released September 17th. 2014 read more
- Want to Limit PCI DSS Scope? Use Tokenization read more
NEWS:
- Check back later for more events
EVENTS:
Disaster Recovery Services

An unfortunate reality is that no matter how well prepared one might be, disasters do happen, most often due to forces out of one’s control. Defense Lock has a team that has been through disasters first hand, from the 9/11 tragedy to paralyzing storms. Our team, which includes advisors from the NYC Police department as well as Home Land Security, has had to tackle these disasters first hand, and come through it all the stronger and wiser.
Our service (based around NIST standards) includes seven progressive steps, which are designed to be integrated into each stage of the system development life cycle:
- Develop a policy statement for contingency planning
- Conduct a Business Impact Analysis (BIA)
- Identify preventive controls and measures
- Create a strategy for unforeseen events
- Develop an IS contingency plan
- Ensure testing, training, and exercises of all plans
- Ensure continuance of all plans
Information system (IS) contingency planning is a multi-faceted strategy that involves both physical and technological measures to enable the fastest resumption of IS operations and data after an incident. This planning would typically include one or more of the following approaches:
- Restore information systems via prepared or pre-planned backup equipment
- Perform some or all of the affected business processes using alternate (e.g., manual) means (typically valid in the instance of short-term disruptions);
- Resuming or recovering IS operations at an alternate location (typically valid in the instance of long–term disruptions or those physically impacting the facility); and
- Implement contingency planning controls as a result of varying levels of impact on the security of an IS infrastructure