1948 years ago in AD 63 an earthquake in southern Italy by the gulf of Naples seriously damaged the ancient city of Pompeii causing an undetermined number of deaths and spread out destruction, but the locals went to work rebuilding in the same spot until they were buried by the eruption of the Vesuvius volcano 16 years later in AD 79.
Galveston TX Hurricanes
Average Brushed or hit every 2.94 years Average Direct hit every 8.63 years
The Great Storm of 1900 - Sep 8th 1900 - Pop: 42,000 residents Category 4 @ 135 mph -Great loss of life between 6,000 and 12,000 individuals – officially 8,000
The 1915 Storm, August 17th, Category 4 @ 135 mph 42 people dead in the Galveston area
$60 - 1915 million dollars in damage
Ike Sep 13th 2008 - The third most destructive hurricane to ever make landfall in the United States Final landfall in Galveston Texas as a strong cat 2 with cat 5 equivalent storm surge winds extended 120 miles from the center.
Blamed for at least 195 deaths – 74 in Haiti and 112 in the USA 300 still missing. - Damages estimated at 24 billion (2008) US Dollars
Resulted in the largest evacuation in the state of Texas history and the largest search and rescue operation in US history
Chernobyl, An Experiment Gone Wrong
On Saturday, April 26th, 1986 at 1:23 am, one of the reactors at the Chernobyl nuclear power plant exploded. Ironically, the experiment consisted in testing how the power plant would respond in the event of an accident. The operators at the plant wanted to bring down the power output of the reactor to 25%, but over-confidence, poor training and poor knowledge of how a reactor works caused them to overdo it, and they ended up bringing down the power output to 1%. When they then tried to bring it up to 25%, the reactor overheated and exploded causing the worst nuclear accident in history.
Technology allows us to do things on the internet that were never possible before. Conducting business through email has become ordinary course worldwide. A staggering 200 million messages are delivered daily.
This technology may be a double-edged sword. With the convenience comes a certain amount of risk every time you connect to the internet. “Malware” targeting personal computers and electronic communications continue to grow in sophistication and pose a significant risk to your company and your personal information. Regular email correspondence is “available” for anyone with the proper tools to see.
McAfee, the security software developer, estimates that approximately 90% of the email traffic navigating the internet today is spam. Additionally, approximately 250 to 300 new viruses, trojans, worms and other malware are appearing daily.
Spoofing and Phishing are proliferating. These scams ask recipients to verify computer logon credentials, update personal information or activate online features directing the recipient to fraudulent websites that deceivingly resemble the legitimate ones.
The Internet has become the playground for thieves.
According to current trends, your networks and electronic communications information will continue to be exposed to increased security vulnerabilities. Must-have mobile devices are even more vulnerable and add complexity to an already unmanageable situation.
Reducing the risk is a major headache, placing additional burdens on strained IT staffs, draining resources and budgets at many organizations trying to manage and maintain security to keep the “bad guys” at bay.
Companies must secure sensitive information across the Internet. To secure such information will require encryption. However, it is the responsibility of internet service providers (ISPs) to ensure the information is clean when it is sent as well as when it is received by the user.
Historically, only heavily regulated industries and government have implemented encryption and are mandated to protect sensitive information, money transfer and financial systems.
Encryption is difficult to deploy, complex to manage and maintain, requires in-house expertise. It is often outsourced and is expensive. Outsource services are available providing real-time scanning of your messages sending and/or receiving
For now, maintaining secure password policies, performing regular backups of your data, implementing antitheft and antivirus software, keeping firewalls up-to-date, implementing device encryption and utilizing private networks (VPNs) are strategies that may help your organization stay above the fray.
All it takes is one hole in the environment - one weak link in the chain, for malware to infiltrate your computers and cause damaging security problems for your business.