article thumbnail

Why Crisis Management Planning Should Be On Your To-Do List

Bernstein Crisis Management

In contrast, when Capital One experienced a data breach in 2019, they quickly identified and fixed the vulnerability, clearly communicated what happened and what customers could do, and offered free credit monitoring to affected customers. Their prompt and transparent response helped preserve customer trust and confidence.

article thumbnail

Reflections on the Turkish-Syrian Earthquakes of 6th February 2023: Building Collapse and its Consequences

Emergency Planning

Most of them are highly vulnerable to seismic forces. It is a mixture of simple errors, lax procedures, ignorance, deliberate evasion, indifference to public safety, untenable architectural fashions, corruption and failure to enforce the codes. It is these that collapse. Journal of Performance of Constructed Facilities 31(3): Korkmaz, K.A.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

When it came, in 2009, it was less deadly than expected, but that does not negate the possibility of a highly contagious disease with a case fatality rate equivalent to that of SARS in 2003, namely 10%. For example, civil aviation is particularly vulnerable. Therefore, the world community must take action immediately."

Pandemic 130
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. The final chapter looks at the morality of the attack. Parts of the generator were found 80 feet away!

Malware 52
article thumbnail

‘Countdown to Zero Day’ By Kim Zetter – Book Review

Plan B Consulting

The book also covers the vulnerability of PLC controllers and SCADA systems to cyber attacks, the attacks that have been conducted to date and how attacks can be executed on various systems. The final chapter looks at the morality of the attack. Parts of the generator were found 80 feet away!

Malware 52
article thumbnail

Using Budget Principles to Prepare for Future Pandemics and Other Disasters

National Center for Disaster Prepardness

At the same time, we see widening inequalities in who has access to recovery resources, and disparities in vulnerability that are too often predictable by socioeconomic status, race and ethnicity. In an era of threats and vulnerabilities that are increasing in complexity we need to simplify the process.

article thumbnail

Defending Your Data with Veeam Ransomware Protection

OffsiteDataSync

And while companies should take every feasible measure they can to secure their systems against a ransomware attack, the sad reality is that cybercriminals only have to find a single vulnerability to exploit to succeed, and vulnerabilities are not in short supply. Vulnerabilities Can Go Unnoticed. The real kicker?