04:45 PM
Nancy Feig
Nancy Feig
Connect Directly

Mississippi Bank's Disaster Recovery Plan Stepped Up With New Technology Center

While FEMA is no better prepared for a major hurricane today than it was when Katrina struck in September 2005, one bank has taken it upon itself to be prepared for future crises.

While FEMA is no better prepared for a major hurricane today than it was when Katrina struck in September 2005, one bank has taken it upon itself to be prepared for future crises.On the second anniversary of Hurricane Katrina, Gulfport, Miss.-based Hancock Bank dedicated a new state-of-the-art technology center. The 37,390-square foot self-sustaining center safeguards Hancock's critical operations.

Hancock learned its lesson the hard way during Katrina, when it's former technology center was destroyed. The bank has poured $16 million and nine months into building this new center. More importantly, it moved it 10 miles inland and built eight-inch thick reinforced concrete exterior walls. The building can now withstand winds of more than 200 mph, the bank says.

Following Katrina, many of the affected banks' efforts to get up and running were hampered by the fact that their back-up sites were located too close to their primary locations. As a result, the FFIEC recommended that banks reevaluate their backup site locations.

Prior to Katrina, banks were required to have disaster recovery plans in place, but as we witnessed, many of these plans were merely documents that didn't transfer into realistic strategies during the crisis. It's good to see a bank setting an example. While a robust, self sufficient data center is only one part of a complete post-Katrina disaster recovery plan, it's a huge step that banks, both inside and outside of the Katrina affected areas, should be pursuing.

With the new technology center, Hancock seems to have taken steps to ensure that it will be prepared for the next disaster when it arrives. Other emergency features include:

• A high-tech command center for monitoring storms with real-time national and international reports.

• Two cooling units, an 8,000-gallon chilled water tank, and a redundant continuous-flow pump system that regulate ideal temperatures for a computer room and network operations center resting on 5,400 square feet of raised flooring.

• A back-up system comprising 120 continuously monitored 20-year batteries generating 360 kilowatts of power and a three-phase, continuously online solid-state uninterruptible power system (UPS) operate in conjunction with the building's standard electrical system to ensure constant conditioned power for critical systems if commercial utilities fail.

• A doubled-lined 25,000-gallon tank equipped with a continuous recycler and emergency alarm fuels dual 820-kilowatt stand-by generators designed for automatic operation during power failures lasting almost a month.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This is a secure windows pc.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.