article thumbnail

Flu Pandemic Planning 2006 and What Really Happened!

Plan B Consulting

This week, Charlie discusses pandemic plans that were suggested back in 2006, and how they compare to the actions that were taken during the height of the COVID pandemic. I came across the booklet ‘Flu Pandemic Guidelines for Businesses’ produced by Survive when we were moving our office. Productivity and motivation.

article thumbnail

Flu Pandemic Planning 2006 and What Really Happened!

Plan B Consulting

This week, Charlie discusses pandemic plans that were suggested back in 2006, and how they compare to the actions that were taken during the height of the COVID pandemic. I came across the booklet ‘Flu Pandemic Guidelines for Businesses’ produced by Survive when we were moving our office. Productivity and motivation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Flu Pandemic Planning 2006 and What Really Happened!

Plan B Consulting

This week, Charlie discusses pandemic plans that were suggested back in 2006, and how they compare to the actions that were taken during the height of the COVID pandemic. I came across the booklet ‘Flu Pandemic Guidelines for Businesses’ produced by Survive when we were moving our office. Productivity and motivation.

article thumbnail

Resiliency Is Top Priority in 2023 White House Cybersecurity Strategy

Pure Storage

FIPS or SOC 2 Type II ) The government is also exploring the possibility for a cyber insurance “backstop” fund to help with catastrophic security events. As you review the key objectives and recommendations, ask yourself: Is my security architecture resilient?

article thumbnail

33 Data Privacy Week Comments from Industry Experts in 2023

Solutions Review

The pandemic accelerated the digitalization of customer interactions by several years, and there’s no turning back: we now live in an era of digital. With higher levels of digitalization, the volume of data has greatly expanded– which, in turn, has attracted new types of cybercrimes and attacks.