article thumbnail

Disaster Response and Equity: Reflecting on the Racial Disparities in Texas Power Outages

National Center for Disaster Prepardness

This February marked two years since Texans were hit with widespread power outages during the deep freeze of 2021. The state’s energy supply chain was unable to withstand the sustained low temperatures, as generation resources were strained due to cold weather tripping units, natural gas supply curtailments, and wind power generation outages.

Outage 52
article thumbnail

The Retro Revolution:  Why Manual Workarounds  Are a BC Must 

BCM METRICS

Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. The scenario was, “A regional internet outage has occurred; you have no internet access to the outside […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Retro Revolution:  Why Manual Workarounds  Are a BC Must 

MHA Consulting

Because technology is vulnerable to disruption—and disruptions are on the rise—every organization should devise manual workarounds for its critical business processes. The scenario was, “A regional internet outage has occurred; you have no internet access to the outside world. I wish them the best.

Outage 52
article thumbnail

Overcoming the Challenges of Contact Center Data

Pure Storage

Simplified integrations with other as-a-service tools and technologies, including AI and even the internet of things (IoT). The Vulnerability of Customer Data. Support is AI-driven, so issues can be resolved before they become outages. Newfound access to disruptive solutions to improve customer service.

article thumbnail

Information Security vs. Cybersecurity: Main Differences

Reciprocity

Cybersecurity frameworks and practices aim to protect these assets from cyber threats that originate from or via the Internet. All organizations are vulnerable to cyber threats and attacks, such as phishing, malware (malicious software), ransomware, man-in-the-middle (MitM) attacks, and distributed denial of service (DDoS) attacks.

article thumbnail

Gone With the Wind: 12 BCM Practices That Have Become Outdated 

MHA Consulting

A partial list would include: the 9/11 terrorist attacks, the rise of the internet and cell phones, the spread of cybercrime, globalization and the lengthening of supply chains, the COVID pandemic, the growing impact of climate change, growing international tensions, the shortening of attention spans, and the rise in cloud computing.

BCM 84
article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

Major cybersecurity breaches have historically led to standards and legislation across the globe aimed at preventing similar incidents, up to and including the recent announcement from the White House about a new cybersecurity labeling program for Internet of Things (IoT) devices. The response to Mirai from both the U.S.