Orange County NC Website
24 <br /> • Secure off-site storage of backup media <br /> • Server-level virus protection <br /> These components have been developed in ad hoc response to various <br /> emerging threats. The need for an overarching security plan is acute. <br /> Orange County IT must evolve its security policy which accommodates growth <br /> of applications, access and user needs, while anticipating the growing <br /> sophistication of threats. <br /> Disaster Recovery and Business Continuity <br /> While several initiatives have been undertaken to react to a variety of disasters <br /> (see section titled, Business continuity on page 15), there is no comprehensive <br /> plan for ensuring critical technology systems are available during and after <br /> disasters. <br /> The IT organization must continue work with the Emergency Services <br /> department to: <br /> • conduct an audit of critical systems <br /> • determine current exposure for ensuring availability of critical systems <br /> during: <br /> o short and long-term electrical failure <br /> o short and long-term interruptions in internet availability <br /> o relocation of services to emergency facilities <br /> • determine plan for remote storage and retrieval of critical County <br /> information <br /> • evaluate methods for addressing the above findings, including: <br /> o cost information <br /> o partnerships with peer governments for support during localized <br /> emergencies <br /> o partnerships with vendors capable of providing interim solutions <br /> during emergencies <br /> Information Technologies should bring in an external security auditing firm, as <br /> well as security consultants to enact network changes and policies to ensure the <br /> evolution of security in proportion to growing security threats. <br /> Enterprise Wide OCIT Standards <br /> With the exception of the PC Replacement Program, Orange County's historical <br /> approach to upgrading technology has been largely reactive. In addition, <br /> application selections have involved IT as a final step in the purchasing process, <br /> providing little influence other than an approval/disapproval for even large scale <br /> applications. <br />