This text is replaced by the Flash content.


Survival Tips

En Español

Did You Know That...

1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.

Galveston TX Hurricanes

Average Brushed or hit every 2.94 years
Average Direct hit every 8.63 years

The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents
Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000

The 1915 Storm, August 17th, Category 4 @ 135 mph
42    people dead in the Galveston area
$60 - 1915 million dollars in damage

Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States
Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.

Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars

Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history

Nuclear Issues

Chernobyl, An Experiment Gone Wrong

On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded.
Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.

Five U.S. nuclear reactors in earthquake zones

Status of the Nuclear Reactors at the Fukushima Daiichi Power Plant

How a Reactor Shuts Down and What Happens in a Meltdown

Hazards of Storing Spent Fuel

Timeline: Nuclear Plant Accidents

Why the Fukushima disaster is worse than Chernobyl

In graphics: Fukushima nuclear alert

Fukushima victims: homeless, desperate & angry

Japan Panel: Fukushima nuclear disaster "man-made"

More, Did You Know That


File Formats Help:
File Formats Frequently Used on the Survival Insights Portal

Products - Services

Business Continuity: The Internet, a Dangerous Place for Businesses
Posted on Thursday, December 18 @ 11:38:40 PST by editor

Technology allows us to do things on the internet that were never possible before. Conducting business through email has become ordinary course worldwide. A staggering 200 million messages are delivered daily.

This technology may be a double-edged sword. With the convenience comes a certain amount of risk every time you connect to the internet. “Malware” targeting personal computers and electronic communications continue to grow in sophistication and pose a significant risk to your company and your personal information. Regular email correspondence is “available” for anyone with the proper tools to see.

McAfee, the security software developer, estimates that approximately 90% of the email traffic navigating the internet today is spam. Additionally, approximately 250 to 300 new viruses, trojans, worms and other malware are appearing daily.

Spoofing and Phishing are proliferating. These scams ask recipients to verify computer logon credentials, update personal information or activate online features directing the recipient to fraudulent websites that deceivingly resemble the legitimate ones.

The Internet has become the playground for thieves.

According to current trends, your networks and electronic communications information will continue to be exposed to increased security vulnerabilities. Must-have mobile devices are even more vulnerable and add complexity to an already unmanageable situation.

Reducing the risk is a major headache, placing additional burdens on strained IT staffs, draining resources and budgets at many organizations trying to manage and maintain security to keep the “bad guys” at bay.

Companies must secure sensitive information across the Internet. To secure such information will require encryption. However, it is the responsibility of internet service providers (ISPs) to ensure the information is clean when it is sent as well as when it is received by the user.

Historically, only heavily regulated industries and government have implemented encryption and are mandated to protect sensitive information, money transfer and financial systems.

Encryption is difficult to deploy, complex to manage and maintain, requires in-house expertise. It is often outsourced and is expensive. Outsource services are available providing real-time scanning of your messages sending and/or receiving

For now, maintaining secure password policies, performing regular backups of your data, implementing antitheft and antivirus software, keeping firewalls up-to-date, implementing device encryption and utilizing private networks (VPNs) are strategies that may help your organization stay above the fray.

All it takes is one hole in the environment - one weak link in the chain, for malware to infiltrate your computers and cause damaging security problems for your business.

Related Links
· More about
· News by editor

Most read story about :
May 2009 Tip of the Month

Article Rating
Average Score: 5
Votes: 1

Please take a second and vote for this article:

Very Good


Associated Topics

Business Continuity PlanningInformation TechnologyTerrorism

Home  ::  Search  ::  Feedback  ::  Top 10  ::  Contact Us © 2007 • Privacy PolicyTerms Of Use