Trending Articles

article thumbnail

The First Line of Defense: Customer Service as a Crisis Prevention Tool

Bernstein Crisis Management

The First Line of Defense: Customer Service as a Crisis Prevention Tool By Michelle Sinning, APR In an age where reputations can rise and fall in a single tweet, customer service isnt just about resolving problemsits about preventing a crisis. Too often, companies treat customer service as the final step in the customer journey: a reactive department that kicks in only when something goes wrong.

article thumbnail

Erwood’s Laws of Business Continuity and IT Disaster Recovery

Erwood Group

ERWOODS LAWS Erwoods Laws of Business Continuity and IT Disaster Recovery Executive Summary: Erwoods Laws of Business Continuity and IT Disaster Recovery Erwoods Laws of Business Continuity and IT Disaster Recovery , authored by Keith Erwood and inspired by Murphys Laws of Combat, delivers a sharp, pragmatic perspective on the realities of managing business crises.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Healthcare and Crisis Teams Harness PagerDuty to Stay Ready and Resilient by Nisha Kadaba

PagerDuty

PagerDuty.orgs Latest Impact Cohort of Nine Organizations Improves Urgent Health Outcomes Globally For organizations providing vital mental health assistance, safety crisis services and delivering critical humanitarian support when disaster strikes, reliable digital infrastructure is essential. Whether connecting individuals to crisis counselors via text or coordinating face-to-face healthcare support, these digital services must operate seamlessly.

article thumbnail

New Report on How States Can Build Disaster-Ready Budgets

Recovery Diva

New report from PewTrusts: How States Can Build Disaster-Ready Budgets Strategies for reducing fiscal risks in the face of rising costs “Policymakers at every level of government are grappling with the rising costs of storms, floods, wildfires, and other natural disasters and how best to aid affected communities. As disasters have grown in frequency and severity, so too has the strain on public finances and the urgency to update budgeting practices, especially in the states, to help public

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery

Pure Storage

6 Customer-proven Best Practices for Cyber-resilient Backup and Recovery by Pure Storage Blog Summary From the 3-2-1-1-0 framework to indelible data to faster threat detection, cyber resilience best practices can help organizations safeguard their operations and recover quickly and confidently when the worst happens. Cyber threats have evolved. What started as opportunistic ransomware has escalated into destructive wiperware and nation-state attacks.

More Trending

article thumbnail

Security Industry Advocacy Achieves Major Wins on State “Right to Repair” Policies

Security Industry Association

New measures signed into law last week in Washington and Oregon ensure security manufacturers will not be required to disclose sensitive technical information regarding their products, protecting the integrity of security and life safety systems and the lives of those who depend on them. On May 22, 2025, Oregon Gov. Tina Kotek signed into law SB 959 , which added an exemption omitted in the states right to repair measure applicable to consumer and household electronics enacted in 2024, as part o

article thumbnail

Expect Record-Breaking Heat and Many Hurricanes this Summer

Recovery Diva

From Grist: Homeland Security News Wire: Coming This Summer: Record-Breaking Heat and Plenty of Hurricanes. Forecasters are predicting higher temperatures across the U.S. and up to 10 hurricanes. Cutting federal programs could leave people even more vulnerable.

article thumbnail

T-SQL REST API Integration in SQL Server 2025: Streamlining T-SQL Snapshot Backups

Pure Storage

T-SQL REST API Integration in SQL Server 2025: Streamlining T-SQL Snapshot Backups by Pure Storage Blog Summary This article takes you through the steps for using a T-SQL script to create application-consistent snapshots on FlashArray from within SQL Server, without needing any external tools or scripts. This article originally appeared on Anthony Nocentinos blog.

Backup 84
article thumbnail

Your Observability Platform Has a Blind Spot: Don’t Risk Your Operations on Bolt-on Incident Response Modules by Cristina Dias

PagerDuty

Observability platforms want to do it allfrom data collection to incident response. Their pitch is appealing: one platform to eliminate context switching and reduce overhead. But when critical systems failand they will fail, add-on incident management modules won’t save you. You need an end-to-end system built specifically for high-stakes incident management.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

From Tariffs to Turmoil: Spot Supply Chain Risk Before It Spreads

LogisManager

From Tariffs to Turmoil: Spot Supply Chain Risk Before It Spreads Last Updated: May 6, 2025 Everything is connected. A delay in one region can derail a production schedule on the other side of the world. A cyber incident at a vendor can escalate into a full-blown regulatory crisis. Supply chains are no longer just a logistics concern; they touch every part of the business.

article thumbnail

BCAW+R 2025 – Some Thoughts

Plan B Consulting

In todays bulletin, Charlie discusses the webinars that were showcased by the BCI during BCAW and gives an insight into this years theme, Empowering Resilience with AI. This week, I was asked to write my bulletin on BCAW+R 2025 (Business Continuity & Resilience Awareness Week). With two days dedicated to cyber training and the other two spent preparing for and conducting a major exercise, I havent had much opportunity to watch many of the webinars.

article thumbnail

Some Signs of Life at FEMA

Recovery Diva

From CNN: FEMA makes late push to bolster hurricane preparedness, but effort may be too little, too late, officials say “In a series of internal memos issued this week and obtained by CNN, Homeland Security Secretary Kristi Noem, whose department oversees the disaster relief agency, approved requests by FEMA to reopen several training facilities and lengthen contract extensions for thousands of staffers who deploy during natural disasters.

Security 100
article thumbnail

Your Cyber Resilience Wish List for 2025—and How to Achieve It

Pure Storage

Your Cyber Resilience Wish List for 2025and How to Achieve It by Pure Storage Blog Summary Mounting cybersecurity threats are putting IT teams under increased pressure. Taking a holistic approach to cyber resilience can help your organization be ready and keep running smoothly in the event of an attack. Cybersecurity challenges are bigger than ever, and IT professionals are under pressure to ensure their organizations can handle and recover from an increasing number of threats.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

How to create a crisis communication plan

everbridge

When a crisis hits, the success of an organization often hinges on how effectively it communicates. Misinformation, delayed responses, and unclear messaging can amplify the impact of an already turbulent situation, damaging reputation, trust, and business continuity. This is why having a robust crisis communication plan is critical. It ensures that your organization can respond calmly, clearly, and effectively when faced with unexpected challenges.

article thumbnail

Download: Separation of Duties (SoD) Checklist

LogisManager

Download: Separation of Duties (SoD) Checklist Why SoD Matters: Implementing Separation of Duties (SoD) is a critical practice for organizations seeking to strengthen their internal controls. It involves dividing responsibilities among multiple individuals to ensure that no single person has the ability to execute conflicting tasks. By doing so, organizations can significantly reduce risks related to fraud, errors, and non-compliance.

Audit 52
article thumbnail

The Enabling Functions That Make Resilience Actually Work

BryghtPath

Strong plans arent enough. Clear roles arent enough. Even aligned domains business continuity, crisis, DR, comms, cyber arent enough on their own. You can have all the right capabilities and still watch your response fall apart when it matters most. Thats because resilience doesnt succeed with good content. It succeeds with good systems. … The post The Enabling Functions That Make Resilience Actually Work appeared first on Bryghtpath.

article thumbnail

Another Hurdle for States Seeking Emergency Preparedness Funding

Recovery Diva

From HS Today: Multiple Attorney Generals Sue DHS to Protect Emergency Preparedness and Disaster Relief Funding “New York Attorney General Letitia James and 19 other attorneys general have filed a lawsuit challenging new U.S. Department of Homeland Security (DHS) conditions that link emergency management and disaster relief funding to state immigration enforcement policies, as stated in a press release on May 13.

Security 100
article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

SQL Server 2025: Enterprise AI without the Learning Curve

Pure Storage

SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.

article thumbnail

Software Buyers Beware: SaaS is About to Get Weird

Solutions Review

Software-as-a-Service (SaaS) is poised for a significant shift driven by market consolidation and heightened buyer vigilance. The post-pandemic surge in digital transformation, fueled in large part by venture capital, is giving way to an era of financial prudence and strategic realignment. This shift is driven by companies intensifying their focus on the efficiency and effectiveness of their tech stacks, a trend highlighted by notable contractions in the average SaaS portfolio.

B2B 52
article thumbnail

What Is a Risk Register, and How to Create One

LogisManager

What Is a Risk Register, and How to Create One Last Updated: May 6, 2025 Managing risk without a clear system in place can be challenging. Confusion, missed opportunities and costly surprises are just some of the consequences that may follow. However, a risk register can turn things around. With a well-designed risk register in place, you get more than just a documentation tool.

article thumbnail

AI Is the Latest Step in Video Analytics

Security Industry Association

Brian Karas, director of marketing and Eastern region sales at Actuate, is a member of SIA’s AI Advisory Board. Surveillance video implements many cool technologies to enable us to prevent or solve crimes. If you think about the whole system end to end, we have cameras that take in photons, turn them into electrons, which are carried across a variety of networks and come out the other end as photons from a monitor.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

New GAO on FEMA Guidance for Individual Assistance

Recovery Diva

From the GAO: Disaster Assistance: Updated FEMA Guidance Could Better Help Communities Apply for Individual Assistance New report released on May 14th.

100
100
article thumbnail

SQL Server 2025: Enterprise AI without the Learning Curve

Pure Storage

SQL Server 2025: Enterprise AI without the Learning Curve by Pure Storage Blog Summary Microsoft SQL Server 2025 offers AI capabilities that are directly integrated into T-SQL, enabling organizations to leverage their existing investments in SQL Server infrastructure, skills, and processes. This blog initially appeared on Anthony Nocentinos blog. It has been republished with the writers credit and consent.

article thumbnail

Reflections on Qlik Connect 2025

NexusTek

Reflections on Qlik Connect 2025 May 14, 2025 Jay Cuthrell Chief Product Officer Live blogging I’ll be living blogging this week from Qlik Connect 2025 in Orlando, Florida. This article will be updated throughout the week of May 13-15, 2025. Qlik Connect brings together an enviable community of passionate practitioners to share their stories, business goals, and journey to command of data for the AI which fuels business outcomes.

article thumbnail

7 Questions You Should Be Asking Your IT Provider Every Quarter (But Probably Aren’t)

LAN Infotech

If youre only talking to your IT provider when you renew your contract, youre doing it wrong. Technology isnt a set it and forget it part of your business. Its constantly evolving, and so are the threats that come with it. Thats why quarterly IT check-ins are nonnegotiable if you want your business to stay protected, productive and competitive. But heres the thing: Most business owners dont know what to ask.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The Future of Decision Making in Security

Security Industry Association

Daniel Reichman, Ph.D., is the CEO and chief scientist at Ai-RGUS and a member of the SIA AI Advisory Board. Artificial intelligencehas become the buzzword for innovationin the security industry, and it is now integratedinto many solutions. The reception to AI hasbeen mixed; some people excitedly embrace new applications,whileothers are more cautious.Before evaluating whether to implement this new technology,itsessential to emphasizeone point:AI is not here to replace human intelligence itshere

article thumbnail

WashPost Editorial re Natural Disasters

Recovery Diva

From the WashPost Editorial Page: America is Becoming Less ready for Natural Disasters. “The President is destroying programs that help communities prepare for climate effects.

100
100
article thumbnail

Encrypted Replication from FlashArray to Pure Cloud Block Store 

Pure Storage

Encrypted Replication from FlashArray to Pure Cloud Block Store by Pure Storage Blog Summary Released in Purity version 6.6.7, encrypted replication provides end-to-end encryption with TLS 1.3, enhances the security of replicated data, and is optimized for minimal impact. Encrypted replication has been available since Purity version 6.6.7, where we introduced over-the-wire encryption with asynchronous replication (async and ActiveDR ).