article thumbnail

20/20 Vision: Comments on Exercise Cygnus (UK’s pandemic exercise in 2016)

Plan B Consulting

Today Charlie discusses how Exercise Cygnus, the UK’s pandemic exercise in 2016, holds up against the ongoing outbreak of COVID-19. The post 20/20 Vision: Comments on Exercise Cygnus (UK’s pandemic exercise in 2016) appeared first on PlanB Consulting. UK the “most prepared country”?

article thumbnail

20/20 Vision: Comments on Exercise Cygnus (UK’s pandemic exercise in 2016)

Plan B Consulting

Today Charlie discusses how Exercise Cygnus, the UK’s pandemic exercise in 2016, holds up against the ongoing outbreak of COVID-19. Exercise Cygnus was a command post exercise carried out by NHS England in October 2016 in order to estimate the impact of a hypothetical H2N2 influenza pandemic on the United Kingdom. Lack of a plan.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

One of SIA’s top advocacy priorities and an issue area that impacts nearly all of us to some degree is that of school safety and security. What is your background in the security industry, and how did you come to be involved in school security specifically?

article thumbnail

How Secure is Your Data?

Online Computers

How Secure is Your Data? It seems that every advancement we make with data security, hackers are able to find a way through. In this blog, we will discuss the importance of keeping your data secure. This may include your social security number, address, phone number, banking information, and a lot more. Of course not!

article thumbnail

4 Components of an Effective IoT Security Strategy

Behavior Group

By BizTech on 19 December 2016 IoT Security, information security, threat prevention Recent breaches have shown the vulnerability of the Internet of Things, but IT departments can defend against hackers with a multifaceted approach to security. While driving a Jeep Cherokee through downtown St.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021) You can see from Table 1 that there is a wide variety of different industries, processes attacked, countries affected, methodologies used for the attack. Physical Security – Some systems may be secure within the plant.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021). Physical Security – Some systems may be secure within the plant. Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed.