b"osioessIUanagement Emergency Preparedness By Tom Knight, in behalf ofMRCA Business Management Committee the (NOTE:Thisispartfour of amaintained. four-partseriesonEmergency Be sure any security measures do not adversely impact airor quality Planning)fire safety. InIll of this series, we dis 2.Develop and practice shut-downforHVAC system. Partproceduresthe entry poincussed the importance of reviewing3.Secure outdoor air intakes. HVAC systems can be ant and insurancecoveragesaswellasmeans of distributing biological,micaliological che and rad threats. preparing for utility disruptions and Limit access to air intakelocations to protect the peoplein a side securingfacilities,buildingsandbuilding from airborne th ts. Air intakes at or below ground rea level plants. In this last part of theare most vulnerable because anyone can gain easy access. series, we'll focus afurther on buildConsider relocating or extending an exposed air intake, but do nlittleot ingairprotection,andthevitalperman seal it. ently importance of cyber security4.Determine ifcan feasibly upgrade the building's filtration system. .should askyou you Increasing filter efficiency is one of the few things that can be done in yourselffollowingAssess Building Air Protectionadvance to consistentlytectinside ailding from b logthepro peoplebu ioquestions:AmIIn someemergenciesmicro ical and some other airborne threats. scopic particlesmaybereleasedCarefully consider theltration e iency th will workh highest fi ffic atwitprepared to relocateinto thea Forexample,earth a bu ing's HVAC system. ir.ildquakes often can release dust and4.HEPA (High Efficiency Particulate Arrester) Filter Fans. These individual temporarily? Whatdebrisintotheair.A biologicalu have highly efficient filters that can cap retiny particles, nitstu very myattack may release germs that canincluding many biological agents. Once trapped within a H Alter, EP fiwould happen if make you sick. And abombcon tsget into your body andyou sick. While dirtytaminan cannotmakethese suppliers shut down?canspreadradioactiveparticles.filters are excellent at filtering dander, dust,lds, smoke,bicJ mo many Many of these things can only hurtlogical agents a other contaminants,they willnot stopchemicDo my employeesnda, youif they get into your body.Agases. know what to dobuildingcanprovideabarrier betweencontaminatedair o idelmprove Cyber Security inanutscase ofandpeopleinside,butthereareThe U.S. Chamber of CommerceInternet Security Alliance have and the emergency?ways to improve building air pro published anCommon Sense Guide to Cyber Security tor excellentSmall tection.Business. Dependingonthesizeof theYoucanaccessanddownloadthisguidefrom:http://www.usbuilding and theand layoutcert.gov/reading_room/CSG-smdesignall-business.pdf of the Heating, Ventilating and Air P tecting your data and information technology systems may require roConditioning (HVAC) system, therespecialized expertise. Dependingthe particular industry and the size and on may be simple steps building own scope of the business, cyber security can be very complicated. However, ers and managers can take toevensmallest business can be better preparhelptheed. protect people from some airborneE computer can be vulnerable to attack. The consequences of such an very threats.If yourentor leaseyourattack can range from simpleonvenience to financial catastrop . inc he While space, speakthe building ownersacan only steal o cara time, a s gle hackernu damage to tothiefneatin ca ca se and managers about HVAC mainte anumber of computer n and can wreak havoc on both largeetworksyour nance. Ask if there are options forbusiness and the nation's critical infrastructure. improving building air protection.Start with these simple steps: 1.Know theHeating,Ventilating1.Use anti-virus software and keepu to-date. itp-andAir-Conditioning(HVAC) Activatefeature toyour cyber secuthe software's auto-updateensure system.rity is always up-to-date. Think of it as aflu shot for yourregularcomBuildingownersorman puter to stop viruses in their tracks! agers,employers should2.Don email from unknown sources. and't open take alook at the site's Be suspicious of u emails that include attachments whethe closenexpected systemandbesureitisthey arem aor not. fro known source working properly and is well Continued on8 page"