Apr 2, 2019 in Memo

A memorandum, more commonly known as a memo, is a short message or record used for internal communication in a business. Once the primary form of internal written communication, memorandums have declined in use since the introduction of email and other forms of electronic messaging; however, being able to write clear memos certainly can serve you well in writing internal business emails, as they often serve the same purpose.

MEMORANDUM

TO:


FROM:


DATE:


SUBJECT: Cyber Security DR/BCP


Dear Sir/Madam,

I wish to present a brief summary of the information that I have covered under the two concepts of disaster recovery and business continuity plans. It has emerged that the two concepts are intertwined, since they operate under the same line in enhancing cyber security. They both play vital roles in enhancing individuals and businesses to prepare for future issues in cyber security. They help in formulating recovery measures and prevention practices. However, it has become clear that BCP has an ability to cover more comprehensive issue than DR, especially in the long-term.

I have proposed three major solutions under these categories. The major technological problem experienced by the business is virus attack that led to various related problems. One of the proposed solutions is back up solution by Acronis. Acronis provides solutions for data recovery and in this case, it will assist in ensuring security and privacy, as well as solving the issue of destroyed data recovery system. The other solution is cloud computing provided by NetApp. It will assist the business to easily integrate its systems, in order to enhance easy monitoring to solve the issue of unauthorized intrusion. The third solution provided is server virtualization in order to enhance non-repudiation by ensuring masking of server resources from the client.

In other words, DR/BCP solutions are effective in solving issues that come along with advancing technology. In this case, the main challenge has been the virus attack that has affected all the five pillars of information systems, including confidentiality, authenticity, availability, non-repudiation and integrity. Restoring these pillars into the business’s information system requires key attention on the three solutions, whose websites are clear and easily accessible by IT experts, as well as those who are not experts in the same.

Best regards

Related essays