Featured on mml.org
Terrorism and Information Technology
As a portion of a growing concern regarding terrorism within the United States, the following has been excerpted from a larger communication warning governmental units about the potential of cyber-terrorism.
Attacks on critical infrastructure may take the form of cyberterrorism to disrupt information and communications technology systems rather than physical destruction caused by chemical, biological, nuclear, incendiary or explosive weapons of mass destruction. Many local jurisdictions and private sector organizations developed emergency response and business continuity plans nearly two years ago in preparation for possible disruptions during the Y2K rollover. Those plans remain valuable. They should be dusted off, reviewed and updated.
In addition to the suggested Y2K remediation plan dust-off, I would suggest the following steps be performed:
You may think this doesnt pertain to you - but it does. We all need to be as prepared as we can be. This has been brought home to us recently both in terms of the Sept. 11 event, but also the recent series of very invasive and destructive viruses of unknown origin.
For more information email Roberta Estes at firstname.lastname@example.org.