article thumbnail

8 Cybersecurity Risks That May Impact Organizations in 2019

Behavior Group

Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey. Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey.

article thumbnail

Book Review: Constructing Risk

Recovery Diva

While dense in some parts and requiring familiarity with definitions and acronyms of UN and related climate policy documents (a list of abbreviations is provided), a careful reading is rewarded by lessons learned and to be learned in the emerging field of disaster risk management.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Duty of Care for Business Travelers

everbridge

Download our white paper on our “Building a Successful Travel Risk Management Program” by Anvil, an Everbridge Company. In today’s changing world, businesses need to be risk resilient across their operations – and that includes business travel. While overall travel numbers are down, risks continue to threaten business travelers.

Travel 75
article thumbnail

Towards a Taxonomy of Disasters

Emergency Planning

While not independent of the magnitude of physical forces involved, it is not linearly related to them because it depends on the nature and size of the vulnerabilities that the physical forces act upon. Necci 2019. International Journal of Disaster Risk Reduction , Article 101163 Marulanda, M.C., UNDRR 2019. Girgin and A.

article thumbnail

The Pros and Cons of Outsourced Vs In-House IT Disaster Recovery

Erwood Group

Objective Perspective: Unbiased Analysis: External consultants offer an unbiased perspective, identifying gaps and vulnerabilities that internal teams might overlook due to familiarity or internal politics. This objective analysis leads to more robust and effective recovery plans.

article thumbnail

The Ocado fire – when disaster recovery becomes real

IT Governance BC

Although share prices showed signs of recovery within a couple of days, more than £1 billion was wiped off the stock market value of the firm, as investors worried that retailers may be less keen to buy into the automated warehouse technology having seen that there is a potential vulnerability.*. Business continuity management.

article thumbnail

The evolution of cyber crime

SRM

A recent example of this was the spyware injected into a vulnerability within WhatsApp. One particularly ingenious type of phishing attack first appeared in 2017 but is still being used because it preys successfully on the unsuspecting and (potentially) vulnerable. A reactive mindset is today’s biggest threat to data security.