article thumbnail

The Intersection of Traditional PR and Crisis Management

Bernstein Crisis Management

It’s all about relevant content and strategic communication. There are shared principles: communicate clearly, maintain authenticity, and protect the organization’s image. Self-publishing has opened up a tremendous array of options to tell your own story that simply weren’t available before.

article thumbnail

Reputation Management in Seussville

Bernstein Crisis Management

Better recognized under the pseudonym Dr. Seuss, the author published over 40 books and sold more than 600 million copies during his lifetime. Next, Mudd suggested that organizations “allow those cultures and communities to share feedback and input” in an authentic manner.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security Industry Association and SecureIDNews Announce Winners for the 2021 Women in Biometrics Awards

Security Industry Association

In its seventh year, the Women in Biometrics Awards adds two distinguished professionals to the list of 25 previous awardees,” said Chris Corum, publisher of SecureIDNews. SecureIDNews is an industry-leading source for enterprise and government identity, credentialing and security markets published by AVISIAN. About SecureIDNews.

article thumbnail

Security Industry Association Announces Winners for the 2022 Women in Biometrics Awards

Security Industry Association

Gena Alexa has held key technical and management roles in the delivery of strategic government biometrics programs for more than 20 years. AVISIAN Publishing produces a suite of online titles focused on the identity and security markets. Securing our identity has become mission critical in the world we live in today. About AVISIAN.

article thumbnail

Security Posture: Definition and Assessments

Reciprocity

In the United States, the National Institute of Standards and Technology (NIST) has published numerous widely used security frameworks. After completing your risk assessment, implement security controls, including network segregation, encryption, anti-malware, anti-ransomware software, firewall configuration, and multi-factor authentication.

article thumbnail

14/03/14 Business Impact Analyses

Plan B Consulting

The following article was published on the Microsoft website and written by Nick Saalfeld of Wells Park Communications. ” Similarly, in the tech world, think something like “if the server isn’t available, we can’t authenticate users. It’s been a sobering start to the year for many businesses.

article thumbnail

14/03/14 Business Impact Analyses

Plan B Consulting

The following article was published on the Microsoft website and written by Nick Saalfeld of Wells Park Communications. ” Similarly, in the tech world, think something like “if the server isn’t available, we can’t authenticate users. It’s been a sobering start to the year for many businesses.