article thumbnail

2016 Incident Landscape: Changes and Challenges

Plan B Consulting

I think these changes are going to affect us in 2016 and for several years to come. So what are the new challenges we are going to face in 2016? Review again your vulnerability to flooding. Review your vulnerability and put plans in place for loss of critical transport infrastructure. The incidents continue.

article thumbnail

2016 Incident Landscape: Changes and Challenges

Plan B Consulting

I think these changes are going to affect us in 2016 and for several years to come. So what are the new challenges we are going to face in 2016? Review again your vulnerability to flooding. Review your vulnerability and put plans in place for loss of critical transport infrastructure. The incidents continue.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Resilience is an illusion

Emergency Planning

Secondly, and more importantly, vulnerability, risk, impact and their controlling factors are all trending. I recommend going back to vulnerability and endeavouring to identify, understand and reduce it. Put bluntly, in disaster risk reduction, these days the goalposts are moving faster than the players. What can we do instead?

article thumbnail

4 Components of an Effective IoT Security Strategy

Behavior Group

By BizTech on 19 December 2016 IoT Security, information security, threat prevention Recent breaches have shown the vulnerability of the Internet of Things, but IT departments can defend against hackers with a multifaceted approach to security. While driving a Jeep Cherokee through downtown St.

article thumbnail

SIA New Member Profile: Resecurity

Security Industry Association

Gene Yoo : Resecurity was founded in 2016 out of a need for advanced threat intelligence and risk management in the industry. The researchers from Resecurity HUNTER team have identified critical vulnerabilities in software of major IT giants including Apple, Microsoft, Oracle, TP-Link and ASUS. Tell us the story of your company.

article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

In 2016 I began my developing my patent, USPTO #11125537 B2, essentially an active shooter interdiction system. I taught the teachers how to use these systems, taught the principals how to manage these systems and instructed county employees on how to maintain these systems. Even some newer schools are designed and built “campus-style.”

article thumbnail

Matrix Ransomware

Disaster Recovery

The Matrix ransomware was first detected in 2016, since when it has expanded its sphere of influence to dangerous proportions through a series of mutations and updates. RDP enabled computers that run on Windows are particularly vulnerable. Carry out frequent vulnerability scans and penetration tests. Preventive Measures.