May, 2021

article thumbnail

How a children’s book saved my life

DisasterDoc

My story begins in the Midwestern United States during the mid-1960s with My Weekly Reader, a weekly educational magazine designed for children. Kids in schools throughout the United States (over. The post How a children’s book saved my life appeared first on DisasterDoc.

Education 246
article thumbnail

Practicing Restraint of Pen, Tongue and Send Button

Bernstein Crisis Management

A critical crisis prevention best practice. That darn Send button. It’s much too easy to click the Send button on any communications device and just as easy for whatever you send to be (a) misunderstood; (b) shared with others along with the recipient’s personal opinions; and, (c) posted widely online in places you never expected. We all know that but, factually, if more people practiced restraint of pen, tongue and Send button, we’d have less business.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Training with the National Centre for Disaster Preparedness 

Crisis Response Journal

CRJ Advisory Panel member, Rob Fagan describes the virtues of a comprehensive online package put together for disaster preparedness and emergency management by the NCDP

article thumbnail

Four steps to build a more transparent and resilient supply chain through risk management

IBM Business Resiliency

Today’s supply chains are high-performing, globalized machines. With leaner supply chain management techniques and approaches like outsourcing, offshoring, just-in-time inventory and vendor managed inventory, disruption has worldwide consequences. Optimizing inventory based on internal systems and operations isn’t as effective as external disruptions continue to test supply chains. .

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

How Backup and Disaster Recovery Protects South Florida Businesses

LAN Infotech

How Backup and Disaster Recovery Protects South Florida Businesses. Many South Florida businesses operate with a sense of unrealistic optimism when it comes to data loss and disaster recovery. However, the reality can be quite different and can negatively affect your business if you’re not vigilant. As the rate of digitalization increases, so does the risk of data loss.

More Trending

article thumbnail

Tornado Risk Reduction – An American Success Story

DisasterDoc

The US experiences more tornadoes than any other country on earth, with an average of over 1,000 tornadoes recorded each year. (Canada is a distant second, with around 100. The post Tornado Risk Reduction – An American Success Story appeared first on DisasterDoc.

article thumbnail

Premeditated Stupidity

Bernstein Crisis Management

University of South Carolina President Plagiarizes Speech. If you have any doubt about whether stupidity has any relationship to IQ or education, the answer is clearly “no” as exemplified by the University of South Carolina’s president, Retired Army Lt. Gen. Robert Caslen, who was outed for plagiarism by local media whose reporting went viral immediately.

Internet 161
article thumbnail

How to Create a Fire Evacuation Plan for Your Business

Alert Media

The post How to Create a Fire Evacuation Plan for Your Business appeared first on AlertMedia.

article thumbnail

Checking It Twice: The Corporate Risk Mitigation Checklist

MHA Consulting

In recent posts, we’ve been talking about how important it is for organizations to reassess their risks as the economy opens up. Today, we provide a tool to help in … The post Checking It Twice: The Corporate Risk Mitigation Checklist appeared first on MHA Consulting.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Combating Fraudulent COVID Unemployment Claims

Risk Management Monitor

As federal and state officials scramble to send unemployment and stimulus funds to help people hit hard by COVID-19 business shutdowns, it has become a perfect storm for cyber fraud. The payments are an easy target for cybercriminals as hackers and cyber gangs around the world have started to file unemployment claims use stolen identities. Some criminals claim benefits in the names of dead or incarcerated people, while others set up shell companies, “hiring and firing” fictitious employees to co

Alert 75
article thumbnail

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack 

LAN Infotech

Lessons Your Business Can Learn from Colonial Pipeline Cyberattack. On May 7, 2021, a ransomware attack happened to one of the biggest businesses in the United States, the Colonial Pipeline. The cyberattack created a crisis for the country, with the affected company shutting down its operations over the weekend. This led to a shortage of gasoline across 16 states.

article thumbnail

Tornado Preparedness

DisasterDoc

A tornado is one of the last things you ever want to encounter in your life. hey are dangerous and leave a visible impact on the communities which they affect. The post Tornado Preparedness appeared first on DisasterDoc.

173
173
article thumbnail

Hazardous Conditions: Mitigation Planning and Pandemics

National Center for Disaster Prepardness

The COVID-19 pandemic has demonstrated the importance of coordinated responses among emergency management and other stakeholders to implement an effective strategy for handling a long and complex disaster. Due to a number of factors , pandemics are more likely to occur in the future. Thus, identifying and planning for the risks of potential disasters, such as a pandemic, is the first step to ensuring that communities and regions are prepared for them.

Hazard 64
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities

Alert Media

The post Duty of Care: An Employer’s Guide to Legal and Moral Responsibilities appeared first on AlertMedia.

article thumbnail

Get Out the Map: Why Your BCM Program Needs a Roadmap

BCM METRICS

Too many business continuity management programs are reactive rather than proactive. Good BCM programs exist in a permanent posture of executing on a roadmap, their custom-crafted plan for the future that is focused on reducing risk and increasing compliance with standards. Missing: A Coherent Set of BCM Program Goals From my perspective as […].

BCM 63
article thumbnail

Cybersecurity Experts Prioritize Data Protection in 2021

Donyati

Last year’s sudden (and nearly synchronized) shift out of the office and onto the cloud was immediately followed by the start of an unending stream of high-profile data breaches. For companies across the board, the alarm has sounded on the escalating threat of these cybersecurity events. The public, too, has taken notice: consumer information, including sensitive data such as healthcare records.

article thumbnail

Predicting Cloud Computing Trends: 2021 Edition

Talkingpoint

During this past year of the pandemic, IT teams have had to reimagine the corporate network. Remote workforces could no longer use their office networks to connect with enterprise applications. Overnight, cloud computing became essential for getting employees back online. Many IT […]. The post Predicting Cloud Computing Trends: 2021 Edition appeared first on TierPoint.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

An Introduction to Tornadoes

DisasterDoc

A tornado is a violently rotating column of air that reaches from a storm system down towards Earth’s surface. The most notable appearance of a tornado comes from its spinning. The post An Introduction to Tornadoes appeared first on DisasterDoc.

163
163
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Colonial Pipeline Hack: Failure in Risk Management. Colonial Pipeline Hack: Introduction. Colonial Pipeline, a major U.S. energy company, was hit with a ransomware cyberattack on May 7th, 2021, which forced it to halt all operations on its major pipeline that delivers roughly 45% of all fuel consumed on the east coast. Why was this a case of negligence?

article thumbnail

SIA New Member Profile: Business Protection Specialists, Inc.

Security Industry Association

New Security Industry Association (SIA) member Business Protection Specialists, Inc. (BPS) is a security consulting firm that helps clients assess risk, design, specify and implement the proper state-of-the-art security measures for their facilities. The company has administrative offices in Victor, New York, and Raleigh, North Carolina, with employees working virtually up and down the East Coast.

Audit 52
article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

How To Protect Your Enterprises’ Sensitive Information

Assurance IT

With data and information being the most valuable asset in the world, how are you protecting your enterprise’s digital footprint? In this blog, we review the types of information that need to be protected and how to protect your enterprise’s sensitive information. What is Considered Sensitive Information? Sensitive enterprise information is any data or information that could be a risk to the company if it is stolen or released to a competitor or the public.

Banking 52
article thumbnail

CMMI certifications: A complete guide

CIO Governance

The Capability Maturity Model Integration (CMMI) helps organizations streamline process improvement and encourage behaviors that decrease risks in software, product, and service development. The model provides businesses with a framework for developing better products and services, starting with a series of appraisals of process and service development, service establishment and management, and product and service acquisition.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

This article is also available in Portuguese and Spanish. As part of our Latin America focus for this edition of FS-ISAC Insights, we spoke with Homero Valiatti, Superintendent of Information Security at Itaú, Brazil's largest bank and the largest financial institution in the southern hemisphere. What is your take on cyber and regulatory maturity in the region?

article thumbnail

What Does a Business Continuity Plan Typically Include? [Complete Guide]

LogisManager

What Does a Business Continuity Plan Typically Include? [Complete Guide]. Introduction. A business continuity plan (BCP) is your first line of defense against any challenge that threatens the core functionalities of your organization’s operations. When disaster strikes, your BCP should be there to reduce the time it takes to get things back up and running as usual again – as quickly as possible.

article thumbnail

Three Access Control Sessions at ISC West That You Can’t Miss

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations related to access control.

article thumbnail

Isle of Coll Fire – A view from the frontline

Plan B Consulting

This week I talk about the recent fire on the remote island of the Isle of Coll. I discuss how the professionals and community responded and how this incident compares to others he has read about. I tell people how to manage disasters not actually take part in one! As a consultant, I tell people how to manage disasters and incidents, but rarely do I get caught up in one, nor am I involved in the response.

article thumbnail

What The Pipeline Oil Ransomware Attack TAUGHT Us

Assurance IT

With global news reporters all over the world talking about the USA Colonial Pipeline ransomware attack, you must have questions about what happened. What happened on May 7th, 2021 to the oil pipeline? Who is responsible for it? Did they pay the ransom? In this blog, we answer all of your questions and review what the pipeline oil ransomware attack taught us.

article thumbnail

How do I select a DLP solution for my business?

Behavior Group

Data loss prevention (DLP) has become even more important in the last year. Since the pandemic has made companies shift to a remote workforce model, cybersecurity threats have become increasingly complex and data security even more fragile. Companies need to adapt their DLP strategies to the new normal and harden their defense. To select a… Continue reading.

article thumbnail

Non-Financial Risks are Increasingly Financial

FS-ISAC

Banks around the world are used to quantifying financial risks such as market, credit, and liquidity risks. We have known how to measure them for centuries. Because large numbers are involved, it is largely possible to predict the future based on the past. But in a digital finance world that is quickly advancing into uncharted territory, non-financial risks – operational risk, fraud prevention, IT risk, and cybersecurity – are increasingly critical to the business.

Banking 52