article thumbnail

Reflections on the Turkish-Syrian Earthquakes of 6th February 2023: Building Collapse and its Consequences

Emergency Planning

Source: Wikimedia Commons An interesting map was published by the US Geological Survey shortly after the Turkish-Syrian earthquakes. [1] Most of them are highly vulnerable to seismic forces. An experienced civil engineer could evaluate some of that by eye, but much of the rest is hidden and only exposed once the building collapses.

article thumbnail

A brief guide to cyber security risk assessments

IT Governance BC

After all, it’s only once you’re aware of the ways you’re vulnerable that you can put appropriate defences in place. Our ISO22301 BCMS Documentation Toolkit features a risk assessment template to help you evaluate your organisation’s level of security and measure your risk appetite. But what exactly does a risk assessment do?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

SSDF ensures that password complexity, authentication, encryption, software updates, and vulnerability management occur throughout a product’s life cycle. SSDF provides software developers with a set of practices that, when implemented, help reduce vulnerabilities. Consider the operating system of a camera or audio device, for example.

article thumbnail

Storage and Data Protection News for the Week of September 22; Updates from Alcion, Arcserve, Veeam & More

Solutions Review

Arcserve Drops New Research on Healthcare Data Protection The findings reveal gaps, vulnerabilities, and misconceptions in the healthcare sector, potentially hindering its ability to effectively safeguard and recover data in the event of malicious attacks and accidental data outages stemming from human error or natural events.

Malware 59
article thumbnail

Product’s Perspective: True Risk: Why External Vendor Ratings are Only Half the Picture

LogisManager

It’s no question that they’ve got a lot to share, so we’ll be publishing these insights to our blog to help you make more informed business decisions. Services are available to collect and review key vendor documents like contracts and SOC 2s, and they can even evaluate a vendor’s financial statements against its industry peers.

article thumbnail

New GLBA Safeguards For CPA Firms

LAN Infotech

The Federal Trade Commission (FTC) recently published a new safeguards regulation incorporating most of the recommended revisions to the 2002 GLBA guidelines for safeguarding client information, on 10th January 2022. Risk assessment is meant to evaluate possible vulnerabilities to client data that might result in an illegal breach.

article thumbnail

Minimizing Dependencies in a Disaster Recovery Plan

AWS Disaster Recovery

For the end-to-end DR simulation, we’ve published an AWS samples repository on GitHub that you can use to deploy. This evaluates Route 53 ARC capabilities if both Route 53 and IAM control planes aren’t accessible. In the context of multi-Region DR, these techniques can help challenge assumptions and expose vulnerabilities.