Disaster Tips For A Digital World

AxcessPoints, an online planning resource that organizes critical personal, medical and financial information to minimize the impact of a natural disaster, recently announced a tech-savvy checklist to help Americans prepare for a catastrophe.

Coinciding with the launch of National Preparedness Month in September by the federal Department of Homeland Security, AxcessPoints' Top 10 outlines how the Internet, laptops, cell phones, social networking and other breakthroughs can vastly improve disaster preparedness, while expediting the recovery process.

"The ability to retrieve critical financial and personal information after a catastrophe is key to expediting the recovery process," said AxcessPoints CEO Karlyn Carnahan. "Top 10 Disaster Tips For A Digital World is a short survival guide that shows how technology can help minimize the financial and psychic losses resulting from a catastrophic event."

Top 10 Disaster Tips For A Digital World

1. Use the Internet to understand and evaluate the types of natural disasters that are most likely to affect you. Post Hurricane Katrina, 44 percent of Americans report that they have not done more to prepare for a disaster because they do not know what to do.

2. Store personal, financial, and medical information online with a reputable third-party repository. The ability to retrieve bank and brokerage account numbers, insurance policy information, and medical histories is one of the surest ways to expedite the recovery process.

3. Register for services that provide real-time weather and Homeland Security information and send periodic reminders to update emergency kits. Tune in to NOAA, a nationwide network of radio stations broadcasting continuous weather information directly from the nearest National Weather Service office.

4. Prevent financial fraud by signing up for an identity theft protection service. After a disaster, people are most vulnerable to identity theft. Identity theft protection services guard against unauthorized financial transactions, and monitor credit reports.

5. Make a video of all personal possessions and then store a copy on a computer, an external hard drive or an online back-up company. In case of loss, a video of personal possessions, including cars, pets and all household belongings, will enable insurance companies act quickly on your behalf.

6. Update your cell phone address book. Having the numbers of children, friends and extended family in your digital phone book is critical in case your home phone book is destroyed or inaccessible.

7. Make sure you have the home and cell phone numbers and e-mail addresses of your supervisors, and vice versa. The passage of Sarbanes-Oxley requires larger employers to develop and execute contingency plans when a disaster strikes. Knowing how to reach employees is a key part of that plan.

8. Protect your computer and electronic devices with surge protectors. Power surges and drops can damage electronic equipment that can prevent your ability to retrieve information. Surge protectors are inexpensive insurance.

9. Micro chip your pets. Each year, thousands of pets are orphaned after a disaster. If each pet is micro chipped, the humane society or veterinarians can quickly reunite them with their owners.

10. Back up computer data regularly, either through a third-party service provider or on an external hard drive. Information on your computer is likely to be extremely valuable for one purpose or another.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3