article thumbnail

Book Review: Case Studies in Disaster Recovery

Recovery Diva

However, it is also constrained by the community’s resource availability, adaptability, and existing vulnerability among other things. and government (a critique of FEMA disaster assistance programs). Section III covers the topic of planning for recovery.

article thumbnail

Why Crisis Management Planning Should Be On Your To-Do List

Bernstein Crisis Management

In contrast, when Capital One experienced a data breach in 2019, they quickly identified and fixed the vulnerability, clearly communicated what happened and what customers could do, and offered free credit monitoring to affected customers. Their prompt and transparent response helped preserve customer trust and confidence.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Foresight

Emergency Planning

The cascade is a result of the progression of a shock through different kinds of vulnerability. As an example, consider the impact of the Fukushima Dai’ichi nuclear release in Japan in 2011 on nuclear energy policy in other countries (Wittneben 2012,Kim et al. Conversely, local events can have repercussions around the world.

article thumbnail

Double trouble: When climate change and cyber crime collide

everbridge

During disasters, distracted, weakened, and vulnerable businesses and individuals are easy targets for cyber criminals. Additionally, the vulnerability of critical infrastructure like power grids, communication networks, and transportation systems during times of crisis makes them prime targets for state-sponsored cyberattacks.

Malware 52
article thumbnail

Book Review: Constructing Risk

Recovery Diva

Reviewed by Donald Watson, editor of the website theOARSlist.com , Organizations Addressing Resilience and Sustainability, editor of Time-Saver Standards for Urban Design (McGraw-Hill 2001), and co-author with Michele Adams of Design for Flooding: Resilience to Climate Change (Wiley 2011). He has served as consultant for United Nations, U.S.

article thumbnail

Detecting and Confronting Procurement Fraud

Risk Management Monitor

This figure dwarfs other areas such as corporate tax avoidance, where HMRC estimates that $94 billion (£70 billion) was avoided between 2011 and 2015. Here are three ways to help your business become less vulnerable to fraudulent activity: 1. It is estimated that over $2 trillion (£1.6 What Can Be Done?

article thumbnail

World Backup Day Quotes from Experts for 2025

Solutions Review

” Corey Nachreiner – CISO at WatchGuard Technologies “In a digital environment where 80 percent of organizations are vulnerable to ransomware attacks, implementing regular data backups across your organizations critical components is key to your cybersecurity strategy. If threat actors can reach them, they will destroy them.

Backup 59