Remove Continuity Professionals Remove Malware Remove Security
article thumbnail

BCPcast Episode 3 - We're All Human, We're All Vulnerable

The Business Continuity Podcast

In episode 3 of the BCPcast, we take a look at a comparatively new source of risk that has landed in the lap of many already-overworked continuity professionals: cyber. In episode 3 of the BCPcast, we take a look at a comparatively new source of risk that has landed in the lap of many already-overworked continuity professionals: cyber.

article thumbnail

A BC Consultant’s View of the Risks of Generative AI

MHA Consulting

They are, in order of importance, data security, functionality, and risks related to the tools’ language-generation capabilities, including improved phishing attacks and the dangers associated with misinformation. Data security. How can you as a business continuity professional help protect your organization against these threats?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

This week I thought I would talk about the vulnerability of water systems to cyber-attacks and some ideas of what, as business continuity professionals, we can do about this. The biggest security threat was someone stealing a laptop and then using it to cause chaos within the system.

article thumbnail

Beware of the self-wiggling mouse – Water industry & Cyber

Plan B Consulting

This week I thought I would talk about the vulnerability of water systems to cyber-attacks and some ideas of what, as business continuity professionals, we can do about this. The biggest security threat was someone stealing a laptop and then using it to cause chaos within the system. Water industry 1995.