article thumbnail

Covid-19: Elements of a Scenario

Emergency Planning

It is now more than ten years since there was a general push to induce countries to plan for pandemics (WHO 2005). US Homeland Security Council 2005, UK Government 2008), while in others it did not. That was at a time when an influenza pandemic with devastating consequences was greatly feared.

Pandemic 130
article thumbnail

An Old Threat Returns – Terrorist Attacks in Europe?

Plan B Consulting

I noticed a report from Morgan Stanley stating that ‘After virtually halting during the COVID-19 pandemic, business trips are rebounding, even surpassing pre-pandemic levels’. In light of the possibility of attacks in Europe, I think it is advisable to review and update our travel security plans and responses.

Travel 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Year in Review: Key Trends in Critical Event Management

everbridge

Throughout the year, we’ve witnessed escalating geopolitical tensions, a surge in security threats encompassing both physical and cyber domains, and growing concerns over the intensifying impacts of climate change-induced severe weather events. This strategic move aimed to safeguard both online and offline assets effectively.

article thumbnail

Cyberrisk Management Tips for Businesses Amid the Russia-Ukraine War

Risk Management Monitor

According to experts ranging from independent cybersecurity professionals to officials at the Cybersecurity and Infrastructure Security Agency (CISA), organizations at greatest risk right now include critical infrastructure , banks and other financial services firms, and of course key service providers in Ukraine or Russia.

article thumbnail

Helpful tips for New Jersey remote workers to stay HIPAA-compliant

Online Computers

It has always been challenging for companies and individuals to stay compliant with the privacy standards of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). That meant addressing the many privacy and security risks in a remote work setup. Make sure your network is secure.

article thumbnail

Combating Fraudulent COVID Unemployment Claims

Risk Management Monitor

For example, cyber gangs in Nigeria have stolen millions in benefits from multiple states using hacked names, Social Security numbers and other information sold for as little as two dollars each on the dark web. The threat will continue beyond the pandemic. In New York, a man was charged with filing more than $1.4 According to U.S.

Alert 75
article thumbnail

Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy

Pure Storage

As you review the key objectives and recommendations, ask yourself: Is my security architecture resilient? Key Pillars and Objectives to Note Here are the objectives I believe will be most relevant for C-suite leaders and IT decision-makers as they build more resilient infrastructures and harden data security policies: 1.