Sat.May 18, 2024 - Fri.May 24, 2024

article thumbnail

Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare Breach

DRI Drive

With healthcare providers like Ascension hindered by cyberattacks, the Cybersecurity and Infrastructure Security Agency (CISA) offers guidance for these at-risk organizations. In early May, Ascension, a major U.S. healthcare network, was hit by a ransomware attack that impacted hospitals across 19 states. This forced the organization to revert to “downtime procedures” – meaning paper records […] The post Cybersecurity Guidance for High-Risk Nonprofits on the Heels of the Latest Healthcare

article thumbnail

The Executive Function: The Crisis Leader’s Edge

Disaster Zone Podcast

Emergency management and crisis leadership demand more than technical skills and knowledge in today’s fast-paced and complex world. To better access information on demand, make appropriate decisions, and lead most effectively, it is essential to understand how the brain works. A critical cognitive skill set known as executive function (EF) is at the heart of effective decision-making in high-pressure situations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FEMA’s Streamlined Disaster Relief in TX

Recovery Diva

From Fox News in Houston TX: FEMA disaster relief: New aid, streamlined application process for storm victims. “…For the thousands of people who have been devastated by this month’s floods and storms, new help is available from the Federal Emergency Management Administration. This year, FEMA announced its biggest changes in 20 years to create more flexibility for people who need financial assistance after a disaster.

article thumbnail

Cars, Code, and Over-the-air Connectivity: A Look at AutoTech 2024 

Pure Storage

Cars, Code, and Over-the-air Connectivity: A Look at AutoTech 2024 by Pure Storage Blog It’s been almost a year since my blog on the highlights of AutoTech: Detroit 2023. Time flies, and now we’re getting ready for AutoTech: Detroit 2024 , on June 5-6, 2024, in Novi, MI. It promises to be another fascinating event showcasing all the latest technology impacting the automotive industry.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Camden Dalrymple Named 2024 SIA School Safety Advocate Award Winner

Security Industry Association

Dalrymple, student manager for the Montgomery Area School District’s broadcasting program, was recognized for his leadership in encouraging the effective use of technology to enhance school security. SILVER SPRING, Md. – The Security Industry Association (SIA) has recognized Camden Dalrymple as the 2024 winner of the SIA School Safety Advocate Award.

Education 105

More Trending

article thumbnail

Bridging the Gap: Understanding the Difference Between Business Continuity and Disaster Recovery

KingsBridge BCP

When it comes to protecting your business in the face of unexpected disruptions, having a solid plan in place is essential. However, understanding the difference between Business Continuity and Disaster Recovery is often a challenge. In this article, we aim to bridge that gap and provide clarity on these crucial concepts. Business Continuity focuses on […] The post Bridging the Gap: Understanding the Difference Between Business Continuity and Disaster Recovery appeared first on KingsBridge

article thumbnail

Choosing NAID AAA Certified Paper Shredding Services

Prism International

Written By: Jason Keller, CSDS of United Electronic Recycling (Coppell, TX, USA) Every business assumes risk, and a good amount of these risks are foreseeable and therefore relatively preventable. Other risks are more formidable. When news outlets are reporting data breaches from top global brands regularly; it poses the question: can any business manage the risk of data security?

Audit 98
article thumbnail

SIA New Member Profile: Antaira Technologies

Security Industry Association

New Security Industry Association (SIA) member Antaira Technologies is a developer and manufacturer of high-quality industrial networking and communication product solutions. The company is headquartered in Brea, California, with additional offices in Taiwan and Europe. SIA spoke with Joe Cook, national sales manager – security and transportation vertical markets at Antaira Technologies, about the company, the security industry and working with SIA.

article thumbnail

100 Years Later, U.S. Foreign Service Is Still on the Front Lines of Diplomacy

The Rand Blog

As the modern Foreign Service marks its 100th anniversary, 15,600 Americans serve in embassies, consulates, and missions around the globe. They rarely make the front pages in the media, but their work is vital to the long-term success of American foreign policy.

Media 110
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

AI and phishing: A toxic pair

Acronis

The most common AI-fueled phishing attacks abuse generative AI tools such as Chat GPT and Google Gemini (formerly Google Bard). But there are also unsuspecting ways adversaries are using AI that MSPs and business should know about. Alexander Ivanyuk, Senior Director of Technology, Acronis, shares two common ways and two “rare but possible” methods threat actors use to cultivate AI-based attacks.

article thumbnail

Can GraphRAG finally solve the Kendrick & Drake dispute?

Advancing Analytics

Following on from Part 1 where I introduced GraphQL and it’s popularity let’s take that a step further and look at how we can include a GraphQL service like neo4j into a RAG implementation using OpenAI’ GPT-4o and how it improves the contextual RAG responses. Introduction In the vibrant landscape of hip-hop, feuds are not just battles of words but also of narratives and public perceptions.

Media 59
article thumbnail

Security Industry Association Names Leire Arbona Puértolas and Arielle Thomas as 2024 SIA Industry Advocate Award Honorees

Security Industry Association

Arbona Puértolas and Thomas were honored for their leadership and support of SIA’s government relations initiatives at the 2024 SIA GovSummit conference in Washington, D.C. SILVER SPRING, Md. – The Security Industry Association (SIA) has recognized two industry leaders – Leire Arbona Puértolas and Arielle Thomas – as the 2024 winners of the SIA Industry Advocate Award.

article thumbnail

Biden’s Catch-22 in Ukraine

The Rand Blog

If Ukraine is to regain the momentum it has lost in its fight against Russia, it will need to go on the offensive—and that involves some degree of escalation risk.

111
111
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Emerging trends in ransomware: What to expect in 2024?

Acronis

If you’re a managed service provider (MSP) or stakeholder in an organization that wishes to protect itself from cybercrime, it behooves you to anticipate the emerging tactics employed by cybercriminals in the year 2024.

article thumbnail

Storage and Data Protection News for the Week of May 24; Updates from Catalogic Software, HYCU, Infinidat & More

Solutions Review

Solutions Review Executive Editor Tim King curated this list of notable storage and data protection news for the week of May 24, 2024. Keeping tabs on all the most relevant storage and data protection news can be a time-consuming task. As a result, our editorial team aims to provide a summary of the top headlines from the last week, in this space. Solutions Review editors will curate vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy

Backup 52
article thumbnail

FTC Bans Noncompete Agreements, Lawsuit Ensues: How the Rule Impacts Security Businesses

Security Industry Association

On April 23, 2024, after a 3-2 vote in favor, the Federal Trade Commission (FTC) announced a rule which will put a ban on all noncompete agreements nationwide beginning Sept. 4, 2024. Once this new ruling goes into effect, existing noncompetes for most of the workforce will be null and no longer enforceable, and notably, the rule will preempt existing state laws on noncompetes.

article thumbnail

How to Win in Ukraine: Pour It On, and Don't Worry About Escalation

The Rand Blog

There is good reason to think Russia has little intention of acting on threats meant to dissuade increased U.S. support to Ukraine. Increased support from the United States and NATO could give Ukraine the advantage it needs to enable a Ukrainian victory.

99
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Lessons learned from the UnitedHealthcare cyberattack

Acronis

The February 12, 2024 ransomware attack on U.S. health care conglomerate UnitedHealth Group is a vivid reminder of how basic failures in cyber resilience can have hugely costly and destructive consequences.

article thumbnail

Cyber Incidents Involving MSPs: Six Lessons from the CTS Cyber Incident

Plan B Consulting

In this week’s bulletin, Charlie looks at the role of MSPs in a cyber incident and gives an insight into how they can work with organisations to be prepared for a potential incident. In a couple of weeks, I am doing a presentation at a ScotlandIS event in Glasgow which will be attended by MSPs, so I thought I would share with you some lessons I have learned from my research in preparing for the presentation.

article thumbnail

The Importance of a School Security Standard: A Q&A With Danor Services’ Bob Ordan

Security Industry Association

One of SIA’s top advocacy priorities and an issue area that impacts nearly all of us to some degree is that of school safety and security. It’s important to promote a safe learning environment for every student and protect the teachers, staff and visitors in our schools, and SIA appreciates the many talented security professionals who are working diligently each day to enhance the safety and security of our schools and mitigate active shooter threats.

article thumbnail

Getting Serious About Taiwan

The Rand Blog

Taiwanese President Lai Ching-te's inauguration offers a logical turning point in the United States–Taiwan relationship. If Taiwan is meant to be a partner worth fighting for, then it is certainly a partner worth taking—and treating—seriously.

82
article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

Defeating email security threats: Essential tips to protect your client's inbox 2024

Acronis

Unquestionably, it is difficult to keep employees and business leaders secure from nefarious content, and this challenge also spans to files and documents shared in collaboration applications that are prevalent targets of phishing attacks. AI-powered phishing and business email compromise (BEC) attacks are gaining notoriety worldwide and have gotten exponentially more sophisticated in recent years.

article thumbnail

Damage and contamination caused by Lithium Ion Vehicle Fires

Resilience Association

The following paper is written by Jeff Charlton an industry recognised expert in decontamination, disaster recovery and business continuity. Former chair of BCI- BDMA and expert in CBRN.(www.BuildingForensics.co.uk) info.

article thumbnail

Unitrends Endpoint Backup with Disaster Recovery: Now Supporting Linux

Unitrends

As workplaces and IT infrastructures transform, organizations must ensure the protection and recovery of all critical server workloads, regardless of their physical location. Although installing a dedicated backup infrastructure within a data center is generally uncomplicated, setting up similar systems in remote locations, harsh environments or distributed sites, such as oil rigs, retail stores, restaurant […] The post Unitrends Endpoint Backup with Disaster Recovery: Now Supporting Linux

article thumbnail

Ukrainian Echoes From America's War for Independence

The Rand Blog

Ukraine's fight for freedom has significant echoes from America's war for independence that could help Americans better understand and assess the war in Ukraine.

75
article thumbnail

Fargate vs. EC2

Pure Storage

Fargate vs. EC2 by Pure Storage Blog Amazon Web Services (AWS) offers an extensive range of tools and software development and deployment services on the cloud. This includes container technologies like Fargate and compute services like EC2. Fargate is a serverless platform that abstracts away the underlying infrastructure, while EC2 provides virtual machines (VMs) that you can use to manage yourself.

article thumbnail

The role of AI in email security enhancement

Acronis

Discover how AI in email security revolutionizes protection for MSPs. Learn about the integration of artificial intelligence in email security systems to combat sophisticated threats, enhance real-time defenses, and improve overall cybersecurity posture with our expert insights on email security AI.

article thumbnail

What is Data Protection as a Service (DPaaS)?

Unitrends

As cyberthreats continually evolve and rapidly grow in complexity and number, organizations face significant challenges in safeguarding their critical data. The recent surge in cyberthreats like ransomware and phishing attacks underscores the increasing need for organizations to adopt robust data protection strategies. On that front, Data Protection as a Service (DPaaS) offers a cost-effective and […] The post What is Data Protection as a Service (DPaaS)?

52
article thumbnail

Enable Two-Factor Authentication (2FA) to Add an Extra Layer of Security to Your Accounts

Erwood Group

Enable Two-Factor Authentication (2FA) to Add an Extra Layer of Security to Your Accounts Enable Two-Factor Authentication (2FA) to Add an Extra Layer of Security to Your Accounts Securing online accounts has never been more critical. With cyber threats constantly evolving, a password by itself is no longer enough to protect sensitive information. This is where Two-Factor Authentication (2FA) comes into play.