0%

Book Description

Protect your company’s finances in the event of a disaster 

In the face of an environmental or man-made disaster, it’s imperative to have a contingency plan that’s mapped out your corporation’s strategy to minimize the impact on the daily functions or life of the corporation. Successful planning not only can limit the damage of an unforeseen disaster but also can minimize daily mishaps—such as the mistaken deletion of files—and increase a business's overall efficiency.

Faster Disaster Recovery provides a 10-step approach for business owners on creating a disaster recovery plan (from both natural and man-made events). Each chapter ends with thought-provoking questions that allow business owners to explore their particular situation.

  • Covers natural events such as earthquakes and floods
  • Provides guidance on dealing with man-made events such as terrorist attacks
  • Offers worksheets to make your contingency plans
  • Includes several examples throughout the book

There’s no time like the present to develop a business contingency plan—and this book shows you how. 

Table of Contents

  1. Cover
  2. Preface
  3. Chapter 1 Business Disaster Defined
    1. Disaster Timing and Size
    2. Disaster Types
    3. Notes
  4. Chapter 2 Why You Need a Plan
    1. Disasters Occur . . . a Lot
    2. Disasters Happen Quickly
    3. Disaster Response Is Expensive
    4. Impaired Response
    5. Some Industries Require Them
    6. Your Reputation and Value Are at Stake
    7. Additional Reasons
    8. Why Businesses Fail to Plan
    9. Notes
  5. Chapter 3 Business Continuity Planning
    1. The Five-Step Business Continuity Cycle
    2. The Business Continuity Planning Process
    3. Getting Started
    4. Note
  6. Chapter 4 Step 1: Obtain Management Support
    1. Management’s Role
    2. Obtaining Management Support and Approval
    3. Note
  7. Chapter 5 Step 2: Assemble a Planning Team
    1. Role of the Planning Team
    2. Who to Include
    3. Organization of the Team
    4. The First Meeting
  8. Chapter 6 Step 3: Collect Data
    1. Identify Your Mission-Critical Functions
    2. Department Evaluations
    3. Policies and Procedures
    4. Regulatory Codes and Requirements
    5. Useful Documents
    6. Sample Forms
  9. Chapter 7 Step 4: Evaluate Operations
  10. Chapter 8 Step 5: Identify and Evaluate Risks
    1. Risk Assessment Process
    2. Three Risk Assessment Methods to Consider
    3. Assign a Chief Risk Officer
  11. Chapter 9 Step 6: Determine Recovery Strategies
    1. Prevention
    2. Incident Response
    3. Business Continuation
    4. Communications During a Disaster
  12. Chapter 10 Steps 7–10: Create, Communicate, Test, and Regularly Update Your Written Plan
    1. A Complete Business Continuity Plan
    2. A Basic Business Continuity Plan
    3. After the Plan Is Written
    4. Practice Your Plan
  13. Chapter 11 Insurance Coverage
    1. Predisaster Financial Planning
    2. Basic Types of Insurance
    3. Understanding Your Coverage
    4. Concepts to Know
    5. Filing an Insurance Claim
    6. Insurance Adjuster versus Public Adjuster
    7. Notes
  14. Chapter 12 Computer Systems: Disaster Prevention and Recovery
    1. Causes and Costs of IT Disasters
    2. IT Disaster Prevention
    3. Laptop and Cell Phone Protection
    4. Network Security
    5. Operating in the “Cloud”
    6. Creating an IT Disaster Recovery Plan
    7. Cyber Insurance
    8. Notes
  15. Chapter 13 Special Disaster Issues
    1. Power Outage
    2. Fire
    3. Hazardous Materials Spill
    4. Flood
    5. Hurricane
    6. Earthquake
    7. Tornado
    8. Winter Storm
    9. Heat Wave
    10. Flu
  16. Conclusion
  17. Appendix A Insurance Coverage Worksheet
  18. Appendix B Risk Analysis Worksheet
  19. Appendix C Damage Assessment Form
  20. Appendix D Summary of Communication Systems
  21. Appendix E Emergency Communications Summary
  22. Appendix F Business Continuity Plan Outline
  23. Appendix G Schedule of Training and Testing
  24. Appendix H List of U.S. Privacy Laws
  25. Appendix I IT Backup and Testing Log
  26. Appendix J Sample Computer Network Map
  27. About the Authors
  28. Index
  29. End User License Agreement
3.141.35.60