October, 2018

article thumbnail

Phishing Attacks up by 297 Percent in Q3 2018

Behavior Group

A report illustrates how cyber criminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue opportunities. Phishing Attacks “The Retail and eCommerce Threat Landscape Report (October 2018), notes a 297 percent rise in the number of false retailer websites designed to “phish” for customer… Continue reading.

article thumbnail

Effects of Stress on Incident Teams

Plan B Consulting

This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Marketpoint Recall & Recall Results. a powerful partnership for global coverage

Marketpoint Recall

An increasing number of recalls that appear in the media these days have one common factor: the companies involved just weren’t ready. A product recall can be one of the most detrimental events for a company and can have overwhelming consequences for both the company, its customers and the brand. That is why having an experienced partner, a robust, up-to-date recall plan, and access to global communication channels, is so critically important in a crisis situation.

Media 52
article thumbnail

Business Impact Analysis could be Challenging for some Organizations

Stratogrid Advisory

Why the Business Impact Analysis is Challenging for an Organization with Constant Changes Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Location, Location, Location: 3 Ways to Leverage Location Data

Alert Media

The post Location, Location, Location: 3 Ways to Leverage Location Data appeared first on AlertMedia.

More Trending

article thumbnail

75% of Employees Could Cost a Business $7.91 Million

Behavior Group

Seventy-five percent of professionals pose a moderate or severe risk to their company’s data, says (…) third-annual State of Privacy and Security Awareness Report, which also found that workers in the financial sector are more likely to be a risk with 85 percent of survey respondents falling into one of the two risk categories. Employees… Continue reading.

article thumbnail

Effects of Stress on Incident Teams

Plan B Consulting

This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.

article thumbnail

Growing Up In Disaster Recovery with Bob Arnold

Business Resilience Decoded

Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Business Impact Analysis could be Challenging for some Organizations

Stratogrid Advisory

Why the Business Impact Analysis is Challenging for an Organization with Constant Changes. Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

What to Look For in a Small Business Communication System

Alert Media

The post What to Look For in a Small Business Communication System appeared first on AlertMedia.

article thumbnail

From GITEX 2018: Muhammad Tahir on jump starting your organization's approach to recovery

VOX Veritas

In this presentation from GITEX Technology Week 2018, Muhammad Tahir shares guidance on jump starting your organization's approach to recovery.

article thumbnail

Cyberattacks that Target the C-Suite on the Rise

Behavior Group

Whaling, impersonating CEOs and compromising executives’ business emails are all ways that hackers are targeting those at the top. Cyberattacks, impersonation attacks, whaling attack Phishing is big business for criminals. But as targeted phishing campaigns, known as spear-phishing, continue to evolve, hackers don’t seem to be satisfied with small fish, aiming more often than ever… Continue reading.

article thumbnail

Does an Authoritarian Nation State Dictate Your Crisis Communications?

Plan B Consulting

This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Growing Up In Disaster Recovery with Bob Arnold

Business Resilience Decoded

Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link].

article thumbnail

What Will It Take to Close the Cybersecurity Talent Gap?

Behavior Group

Security talent is in high demand, but it doesn’t have to stay that way. Cybersecurity is top of mind for organizations everywhere, yet the talent pool to fill these much-needed positions just isn’t there. In fact, according to a 2017 survey by ISACA’s Cybersecurity Nexus, only 13 percent of organizations surveyed received more than 20… Continue reading.

article thumbnail

How To Check If Your Facebook Account Got Hacked—And How Badly

Behavior Group

AT THE END of last month, Facebook made a bombshell disclosure: As many as 90 million of its users may have had their so-called access tokens—which keep you logged into your account, so you don’t have to sign in every time—stolen by hackers.Friday, the company put the actual number at 30 million. Here’s how to… Continue reading. The post How To Check If Your Facebook Account Got Hacked—And How Badly appeared first on Behaviour Portugal.

article thumbnail

The GDPR and Privacy: What Security Leaders Need to Know

Behavior Group

If You Think the GDPR Doesn’t Affect You, Think Again. The European Union’s new General Data Protection Regulation (GDPR) came into effect in May of this year. While many in North America believe that since they are not located within the European Union the regulation does not apply to their operations, the territorial scope of… Continue reading.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

New Zealand Customs Control Requires Your Phone Password

Behavior Group

A new law in New Zealand means that travelers can be fined thousands of dollars if they refuse to allow border officials access to their phone. Phone Password, New Zealand Customs Control Under the Customs and Excise Act 2018, which came into force this week, officials will be able to demand travelers unlock any electronic… Continue reading. The post New Zealand Customs Control Requires Your Phone Password appeared first on Behaviour Portugal.

Travel 52
article thumbnail

How to Work with Hackers to Make Your Company More Secure

Behavior Group

For most ethical hackers, including myself, hacking doesn’t feel like work. We’re a community of puzzle-solvers – curious and eager to share the vulnerabilities we uncover that can have repercussions for your company and your customers. Hackers to Make Your Company More Secure, hacker community repercussions for your company and your customers. Many major enterprises… Continue reading.

article thumbnail

Does an Authoritarian Nation State Dictate Your Crisis Communications?

Plan B Consulting

This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.

article thumbnail

The Importance of Cybersecurity in Modern Video Surveillance Environments

Behavior Group

For organizations to identify security threats and vulnerabilities, mitigate risk, ensure operational compliance and combat fraud, a comprehensive and innovative security approach is necessary. With today’s evolving risk landscape and the increasing complexity and severity of cyber threats, we must take advantage of emerging technologies, strong internal operator and process policies, and advanced analytics must… Continue reading.

article thumbnail

You Are On Your Own Mate…

Plan B Consulting

Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.

Alert 40
article thumbnail

You Are On Your Own Mate…

Plan B Consulting

Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.

Alert 40
article thumbnail

Franklin Mint FCU Improves Reliability With AlertMedia

Alert Media

The post Franklin Mint FCU Improves Reliability With AlertMedia appeared first on AlertMedia.

article thumbnail

How to Protect Your Lone Workers In 5 Steps

Alert Media

The post How to Protect Your Lone Workers In 5 Steps appeared first on AlertMedia.

article thumbnail

Introducing the DRJ Fall 2018 Podcast Recordings

Business Resilience Decoded

Episode 5 - "Introduction" with Vanessa Vaughn of Asfalis Advisors and Jon Seals of Disaster Recovery Journal. This is the first release of episodes recorded at DRJ Fall 2018 in Phoenix. We had several technical difficulties for our first set of face-to-face interviews so the audio quality isn't nearly as good as we had hoped. (Please bear with us. We already have new equipment ready to go for the next face-to-face interviews in March.).

article thumbnail

Building An Engaging Program with Tracey Forbes Rice of Fusion Risk Management

Business Resilience Decoded

Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Introducing the DRJ Fall 2018 Podcast Recordings

Business Resilience Decoded

Episode 5 - "Introduction" with Vanessa Vaughn of Asfalis Advisors and Jon Seals of Disaster Recovery Journal. This is the first release of episodes recorded at DRJ Fall 2018 in Phoenix. We had several technical difficulties for our first set of face-to-face interviews so the audio quality isn't nearly as good as we had hoped. (Please bear with us. We already have new equipment ready to go for the next face-to-face interviews in March.).

article thumbnail

Building An Engaging Program with Tracey Forbes Rice of Fusion Risk Management

Business Resilience Decoded

Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link].

article thumbnail

Independent Analysis on Veritas Resiliency Platform

VOX Veritas

Resiliency Platform offers features that simplify data protection for enterprise customers.