February, 2018

article thumbnail

Disaster Recovery & Business Continuity Up & Comer: Nuveric’s PetaGys Powered by Oracle’s Solaris

ChannelBloom

The PetaGys Powered by Oracle Solaris integrates correctly-sized hardware and data protection software into a complete onsite backup, offsite cloud, and business continuance solution. The appliance enables a fast and hassle-free setup of a comprehensive disaster recovery environment. The all-in-one solution fits perfectly for midsize IT environments with a strong support of virtualization.

article thumbnail

Best Practice Planning and Exercising from Ragtag Misfits

Alternative Resiliency Services Corp

What do David Lindstedt, Mark Armour, Telly Savalas, Charles Bronson and Lee Marvin have in common? What are the most effective ways to do Business Continuity (or Cyber or Crisis) planning and training? David Lindstedt and Mark Armour are spearheading Adaptive Business Continuity , a framework that brings flexible, pragmatic and iterative approaches, much like traditional 'waterfall' software development has been supplanted by Agile scrums and sprints.

BCP 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

KFC – A management c**k-up? 

Crisis Response Journal

David Rubens examines the supply chain disruption caused by Kentucky Fried Chicken (KFC) switching distributors in its UK operations, while Emily Hough makes some initial notes on how the company's social media handled the crisis By David Rubens

article thumbnail

Why Are Millennials Top Cybercrime Targets ?

Behavior Group

Millennials Top Cybercrime Targets The millennials are among those groups of people who are most adversely impacted by cybercrime. Data seems to point to poor awareness of basic security habits as the main reason millennials have been hit so hard. To mention just a few of their poor security habits, members of this generation tend… Continue reading.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

S2, Episode 3 - Fiona Davidge

The Business Continuity Podcast

Fiona Davidge is the Enterprise Risk Manager at the Wellcome Trust and this episode is a little different. We’re examining disruption and crisis management from another angle – the relationship between risk and business continuity functions. Fiona Davidge is the Enterprise Risk Manager at the Wellcome Trust and this episode is a little different. We’re examining disruption and crisis management from another angle – the relationship between risk and business continuity functions.

More Trending

article thumbnail

Building a Channel Presence.? Why You Need to Hire This Guy.

ChannelBloom

When building out a channel program, having the right strategy and go to market plan is critical. Having the right people to deliver that strategy is the most crucial part. Where several companies fail in the channel is having a balance of both ingredients. Having a dynamic channel executive that can lead and execute that plan is sometimes difficult to find.

article thumbnail

Dynamic Businesses need Resilient Applications

VOX Veritas

Ensure business applications are up and running…no matter what

article thumbnail

Beyond hacking – the human threat of business email compromise scam emails 

Crisis Response Journal

Despite the continued focus in organisations on cyber security and the technical methods to prevent breaches, the simple fact remains that too many people still think that the threat is purely technology-based, writes David Stewart.

article thumbnail

Why Deleted Files Can Be Recovered, and How You Can Prevent It.

Behavior Group

Files Can Be Recovered, protect deleted data Files can be recovered. When you a delete a file, it isn’t really erased – it continues existing on your hard drive, even after you empty it from the Recycle Bin. This allows you (and other people) to recover files you’ve deleted. If you’re not careful, this will… Continue reading. The post Why Deleted Files Can Be Recovered, and How You Can Prevent It. appeared first on Behaviour Portugal.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

S2, Episode 2 - Vicki Gavin

The Business Continuity Podcast

Vicki Gavin is Head of Business Continuity for The Economist and is a returning contributor from season one. In this episode we discuss some of the major incidents she has handled and how to deal with the natural, human fight-or-flight response called ‘panic’. Vicki Gavin is Head of Business Continuity for The Economist and is a returning contributor from season one.

article thumbnail

Russell Hume Production Shutdown – Some Observations

Plan B Consulting

Charlie looks at the Russell Hume meat scandal, including the organisation’s response and the implications of having a single supplier for one of your key products. This week I thought I would take a break from promoting 3gBC and provide some observations on the Russell Hume meat scandal. Although the incident took place last month, the implications are still being felt throughout the food industry.

Media 52
article thumbnail

The safety of children and young adults 

Crisis Response Journal

As regular readers of CRJ will be aware, we have often reported on how young people have been exploited by criminal and terrorist groups.

article thumbnail

Crisis communication as part of resilience planning 

Crisis Response Journal

David Stewart says he has seen a number of posts on various online sites recently about the importance of having a crisis communication strategy and plan.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Data and decision-making potential in Fire and Rescue Services 

Crisis Response Journal

Fire and Rescue Services (FRS) have changed enormously over the last 10 to 20 years and yet, in some ways, have not moved on at all, says Ian Houseman. How can data and decision-making technology be of assistance?

article thumbnail

How human performance improvement can reduce accidents and improve resilience 

Crisis Response Journal

The field of human performance is relatively unknown outside large, high hazard organisations in many parts of the world, but it can help to predict human error and its consequences, playing a vital role in resilience, says Teresa Mullen By Teresa Mullen

article thumbnail

How to pass the CISSP exam: Ways to get a good score

Behavior Group

CISSP exam Want to become a CISSP? Here’s everything you need to know, such as how difficult the exam is, tips for studying, what’s needed to obtain a passing score and more. Everything you’ve heard about what it takes to pass the CISSP exam is true. It’s both disarmingly easy and bewilderingly difficult; at once… Continue reading.

article thumbnail

Why do we need a risk-based approach to authentication?

Behavior Group

authentication 20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe. Today, however,… Continue reading.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

‘Third Generation Business Continuity’

Plan B Consulting

Charlie shares his notion of ‘Third Generation Business Continuity’ and the reasons why you shouldn’t employ a BC contractor to develop your business continuity. This week I travelled to London to attend a meeting with a new client who we are conducting a gap analysis for, based on their present level of business continuity. They felt what they had in the way of business continuity was too complex; they didn’t really understand what they had and wanted to simplify their documen

article thumbnail

‘Third Generation Business Continuity’

Plan B Consulting

Charlie shares his notion of ‘Third Generation Business Continuity’ and the reasons why you shouldn’t employ a BC contractor to develop your business continuity. This week I travelled to London to attend a meeting with a new client who we are conducting a gap analysis for, based on their present level of business continuity. They felt what they had in the way of business continuity was too complex; they didn’t really understand what they had and wanted to simplify their documen

article thumbnail

Millennials are Lax on Passwords; More Comfortable with Biometrics

Behavior Group

millennials lax passwords, millennials comfortable biometrics A new (…) Security study has found that people now prioritize security over convenience when logging into applications and devices. Generational differences also emerged showing that younger adults are putting less care into traditional password hygiene, yet are more likely to use biometrics, multifactor authentication and password managers to… Continue reading.

article thumbnail

3gBC – Slimming your plans…

Plan B Consulting

In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

3gBC – Slimming your plans…

Plan B Consulting

In the third instalment of 3gBC, Charlie advises BC professionals how to make their plans slimmer, both immediately and radically. I thought for this week’s bulletin I would continue sharing my ideas on Third Generation BC (3gBC), by looking at how to make your plans slimmer and more agile. Apologies to the two Julie’s who asked for an article on the KFC incident, I will try and write about it next week, as it seems the situation is still on-going.

article thumbnail

3gBC – Sending the BIA to FatFighters

Plan B Consulting

Following on from his concept of ‘Third Generation Business Continuity’, Charlie provides us with his thoughts on how to reduce your BIA and the advantages of doing so. In the words of Marjorie Dawes from Little Britain, “You is fat! You one big fatty thing!” For many, this is an apt description of their BIA. It is a series of interconnected spreadsheets, which capture a significant amount of information.

article thumbnail

3gBC – Sending the BIA to FatFighters

Plan B Consulting

Following on from his concept of ‘Third Generation Business Continuity’, Charlie provides us with his thoughts on how to reduce your BIA and the advantages of doing so. In the words of Marjorie Dawes from Little Britain, “You is fat! You one big fatty thing!” For many, this is an apt description of their BIA. It is a series of interconnected spreadsheets, which capture a significant amount of information.