January, 2021

article thumbnail

Make Data Privacy a Priority, Every Day

Scott R. Davis

( Read on IoTSSA | Read on CHANNELe2e | Read on Liongard.com ). Securing data has become a critical requirement for organizations around the globe. Governments and industries are modernizing existing consumer protection and breach notification laws while establishing new standards of security. . The last twelve months has seen records shatter in not only the volume of successful data breaches but the average cost of a breach as well.

Internet 130
article thumbnail

The Major Things I am Doing Now To Up My Preparedness

Disaster Preparedness

Food Storage for Preparedness. In the last month, I have stepped up my preparedness efforts in a major way. I have always been well prepared. I keep a nice stock of many things. From Food, Water, Medicine, and other items. Below are the major things I am doing now to up my preparedness for my family. Here is what I did to increase my efforts: I purchased several more food grade storage containers (doubling what I already had – plus one).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Global Risks ReportĀ 2021

Crisis Response Journal

In 2020, the risk of a pandemic became reality and governments, businesses, and societies are now seeking to respond and plan the recovery from Covid-19 By Roger Gomm

Pandemic 100
article thumbnail

Data Privacy Day: one resolution for 2021

Synology

When it comes to keeping your personal information secure, donā€™t take anyone at their word ā€” use encryption. Since the first Data Privacy Day back in 2007, online privacy threats have multiplied. On top of more traditional threats like phishing ā€” which has been around since at least the early 1990s ā€” users today face […].

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

A brief guide to cyber security risk assessments

IT Governance BC

Cyber security risk assessments are essential for organisations to protect themselves from malicious attacks and data breaches. After all, itā€™s only once youā€™re aware of the ways youā€™re vulnerable that you can put appropriate defences in place. But what exactly does a risk assessment do? Essentially, it helps you answer these three questions: Under what scenarios is your organisation under threat?

More Trending

article thumbnail

6 Winter Storm Preparations Every Business Should Make

Alert Media

The post 6 Winter Storm Preparations Every Business Should Make appeared first on AlertMedia.

Security 114
article thumbnail

3 Rā€™s to Build Business Resilience in 2021

Talkingpoint

Learn 3 key areas on which to focus to build business resilience in 2021; read the recap from our recent webinar. The post 3 R’s to Build Business Resilience in 2021 appeared first on TierPoint.

article thumbnail

Counter-drone strategies

Crisis Response Journal

A new book on drone technologies, co-authored by CRJā€™s Advisory Panel member Andrew Staniforth and Garik Markarian, has been published.

article thumbnail

Modern space exploration will transform the world of work

IBM Business Resiliency

In the 80s and early 90s, few people could imagine the impact the World Wide Web would one day have. The idea that it would be an integral, ubiquitous part of our business and personal lives seemed laughable. From the 50s onward, people have viewed space exploration similarly. People find it fascinating, but most still perceive it as an arena for aerospace engineers and scientists and not the average person.

Tourism 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: youā€™ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect thereā€™s something going on that training canā€™t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Improving Critical Event Outcomes through Collaboration

Ready for Anything

Managing a critical event often requires a coordinated effort between multiple agencies and partner organizations. Yet all too often these entities arenā€™t able to connect, communicate and collaborate effectively ā€“ and the result has an impact on the people theyā€™re working to assist. What are leading organizations doing about it? And what is the outcome for the people who need their support?

article thumbnail

Successful Technology Transformations Must Consider the Human Side of Change

Donyati

The dawn of a new decade has sparked an era of technological transformation, as companies in all industries race to implement reinvent and transform their business. Yet, 70-to- 87% of digital transformation efforts fail to materialize benefits over recent years. The technology itself is not solely to blame: the core challenges that threaten ambitious initiatives are often people related.

article thumbnail

AlertMedia Again Named One of Austinā€™s Best Places to Work

Alert Media

The post AlertMedia Again Named One of Austin’s Best Places to Work appeared first on AlertMedia.

72
article thumbnail

How Backup and Disaster Recovery (and DRaaS) Work Better Together

Talkingpoint

Hereā€™s a look at where backups fit into disaster recovery planning and how DRaaS can help ensure your plan is optimized to the needs of your business and your budget. The post How Backup and Disaster Recovery (and DRaaS) Work Better Together appeared first on TierPoint.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Weā€™ve all been there. Youā€™ve been given a pile of dry content and asked to create a compelling eLearning course. Youā€™re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this ā€œboringā€ content and create something relevant and engaging? Many instructional designers will say, ā€œBoring in means boring out.

article thumbnail

60% of companiesā€™ IT modernization programs not ready for the future

Behavior Group

Many corporate IT leaders say their organizations are not prepared for the future IT needs of the business and nearly all are moving to advance their transition to cloud infrastructure, according to an IBM survey of leaders at mid-sized and large companies in the United States and United Kingdom. IT modernization, future IT modernization program… Continue reading.

article thumbnail

Why the Business Continuity Plan Must Be a Living Document

Diligent

The business continuity plan ā€“ sometimes known as a disaster recovery plan ā€“ is an essential document for all organizations, designed to ensure their operations can continue with minimal interruption in the event of an unexpected disruption. Many organizations already have such a plan. The danger is that itā€™s all too easy to make the development of a business continuity plan (BCP) a one-off event, a tick-box exercise that sees the resulting plan filed away in a drawer (literally or virtually) an

article thumbnail

The skiing bug

Oz's Business Continuity Blog

Seasoned readers of my blog will know that the Osbornes are keen skiers (see ‘A white Christmas‘, ‘Ski boots and celery‘, ‘Piste again‘ and ‘Snow bother‘). Sadly, current events have prevented us from going this year, so I thought Iā€™d […].

article thumbnail

Documentation - Data Classification Policy

The Morning Breach

We also continue our series today on improving your organizations cyber security documentation. We have looked at Vendor Security Questionnaires and the Acceptable Use Policy, today we are going to start the process of data classification. A Data Classification Policy is in place to detail why data classification should be done, and to establish a framework for classifying data based on its sensitivity, value, and criticality to the organization.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos ā€“ Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency

Alert Media

The post How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency appeared first on AlertMedia.

article thumbnail

Webinar:Ā How 2020 Changed My View on ā€œTraditionalā€ Business Continuity

Virtual Corporation

Is your BIA effective? Or are you using it ineffectively? How 2020 Changed My View on "Traditional" Business Continuity.

article thumbnail

A hackerā€™s predictions on enterprise malware risk

Behavior Group

2020 has ended with a stunning display of nation-state cyber capabilities. The Kremlinā€™s SVR shocked the cybersecurity industry and U.S. government with its intrusions into FireEye and the U.S. Office of the Treasury by way of SolarWinds, revealing only traces of its long-term, sophisticated campaigns. hackerā€™s, malware, risk These breaches are reminders that no organization… Continue reading.

Malware 52
article thumbnail

Communication Is a Critical Function of Disaster Response

Business Continuity Today

Behind the scenes during disasters, scores of public information officers in state and local government agencies working 24-hour a day. They are frantically fielding facts and phone calls, rushing to get information to the news media and the public. While this work may not seem as critical to life safety, it is essential. Efficient, rapid, and accurate information flow during an emergency can save lives, especially during complex, evolving events like Hurricane Dorian.

article thumbnail

Discussion With an IT Leader in a Healthcare System

Business Resilience Decoded

Episode 61: David Snyder of The Ohio State University Wexner Medical Center Contact David Snyder at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 61: David Snyder of The Ohio State University Wexner Medical Center Contact David Snyder at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link]

article thumbnail

Laptop or Device Lost or Stolen - Proactive and Reactive Steps to secure data

The Morning Breach

Laptops and other portable devices (such as phones, tablets, usb drives, and other devices) are frequently stolen or lost. Within your acceptable use policy, employees should be required to report immediately when one of these devices goes missing, so every company at some point is going to need to deal with a missing device. It is being reported that during the breach of the United States Capitol building, that a laptop belonging to House Speaker Nancy Pelosi was stolen.

article thumbnail

Improving Employee Safety During a Pandemic: Q&A with Epidemiologist Mark Stibich

Alert Media

The post Improving Employee Safety During a Pandemic: Q&A with Epidemiologist Mark Stibich appeared first on AlertMedia.

article thumbnail

Upcoming FEMA Webinar- Jan 26

Disasters and Faith-Based Organizations

Houses of Worship Continuity Planning. Tuesday, January 26, 2021 11:00:00 AM EST – 12:30:00 PM EST.

article thumbnail

Why you should make cyber risk a business gain, not a loss

Behavior Group

As companies continue to respond to the global pandemic, millions of their employees are working remotely, often from home. While this is the recommended response, itā€™s also creating new cyber risks. More specifically, organizations face four daunting challenges today that significantly increase their risk exposure: Distributed workforce: Organizations have created a distributed workforce on an… Continue reading.

article thumbnail

Communication Is a Critical Function of Disaster Response

Business Continuity Today

Behind the scenes during disasters, scores of public information officers in state and local government agencies working 24-hour a day. They are frantically fielding facts and phone calls, rushing to get information to the news media and the public. While this work may not seem as critical to life safety, it is essential. Efficient, rapid, and accurate information flow during an emergency can save lives, especially during complex, evolving events like Hurricane Dorian.

article thumbnail

Discussion With an IT Leader in a Healthcare System

Business Resilience Decoded

Episode 61: David Snyder of The Ohio State University Wexner Medical Center Contact David Snyder at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 61: David Snyder of The Ohio State University Wexner Medical Center Contact David Snyder at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link].

article thumbnail

Documentation - Acceptable Use Policy

The Morning Breach

Continuing on our journey to improve your business documentation we are going to target the Acceptable Use Policy or AUP, which every business should have and it should be part of the hiring process and reviewed annually by all of your employees. . The purpose of an AUP is to outline the acceptable use of technology including data for your employees.

article thumbnail

Winter Safety Stats and Resources to Keep Your Team Safe From Winter Threats

Alert Media

The post Winter Safety Stats and Resources to Keep Your Team Safe From Winter Threats appeared first on AlertMedia.