With the recent electrical attack, I have been receiving questions from various employees about what we would do in the instance of an emergency, especially one that could involve our computer networks. So, in response, I have formulated a strategy for the various types of catastrophes we could encounter, from a natural disaster to a full-on cyber attack.
By combining the procedural know-how of our D.J.s, the administrative prowess of our traffic coordinators, and the legal acumen of our upper management with my technical know how, we can confidently stay ahead of any potential calamity.
In any potential instance of emergency, we need detailed and practiced response procedures. These will primarily consist of confirming the security of our assets, namely our music vaults and commercial logs. Typically this procedure will be the same, in the instance of cyber attack, data breach, or even a building fire that incapacitates the server room or studio. So please draft a list of appropriate steps to take for your respective department to submit for approval and potential revision.
Furthermore, we should develop a call list, in the instance of emergency. Naturally, everyone included on this email will be contacted, but other interested parties may include, victims of any leak in personally identifiable information, including contest winners and prior or current employees, appropriate authorities if applicable, and even though we have our staff trained and prepared for any foreseeable catastrophe, we should call a trusted expert in incident response and get a quote for our current situation. In the event of escalation, it’s good to have an open line of communication with a professional that deals with this manner of incident regularly.
And moreover, we need to be practiced in other environments.
Due to the redundancy we’ve constructed in our multiple studios, our jobs can be conducted from many different locations, and we should take full advantage of that. Regularly should we be changing our routines, recording and broadcasting in different rooms or at different locations.
Once we have a set protocol, we should definitely do a dry run to make sure the theory works in practice. Afterwards we can rehash our successes and failures and potentially revise our strategies. Once we have a smooth procedure, we can attempt drills in different locations and different times, until the act of transitioning, evacuating, and backing up data can be performed with little to no interruption of our radio broadcast, which I don’t think would be considered unreasonable at all.
As we are vested in the security of our mission here at The Point, we intend to incentive members of the Security Incident Response Team, so as heads of departments, you are the optimal candidate for this position, it is your prerogative to appoint a deputy or representative for your department.
Members of the Security Incident Response Team will receive overtime pay for any training, drills, documentation, or planning they do related to incident response. As you can see, we are seriously about security and eager to begin preparations. Please respond immediately with a confirmation, or the appointment of a departmental deputy to fulfill the requisite duties. Have a great day, and stay safe!