May, 2020

article thumbnail

Five Crucial Steps Solopreneurs Need to Reset to Thrive Post COVID-19

Norita Omar

The world is slowly getting back to the new normal. It is the new normal because we are getting back to normal but it is not entirely the “normal” that we are used to. People are slowly getting back to their jobs and some businesses are opening their shops. I’m not sure where you’re from but here in Western Australia, the restrictions are slowly being lifted.

article thumbnail

Disaster Tip of The Week: Prepare to Adapt to Changes In Your Life

Disaster Preparedness

Sometimes, life causes us to make changes. One's we didn't really plan for. In the last few years I have had to change my plans and the way I prep. I went from being a Bug-Out person to one of Bugging-in. Let me share the story. I started “prepping” when I was quite young. Around the age of seven I believe. Back then we would go to the Otsego County fair in upstate NY.

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adapting in an uncertain world 

Crisis Response Journal

Evie Whatling and Gareth Black from Ricardo write that adaptive capacity, business recovery and long-term planning are going to be crucial in our changing world, and announce how to access their free webinar on living with Covid-19.

Capacity 100
article thumbnail

Reality bites: Data privacy edition

Behavior Group

May 25th is the second anniversary of the General Data Protection Regulation (GDPR) and data around compliance with the regulation shows a significant disconnect between perception and reality. Data privacy Only 28% of firms comply with GDPR; however, before GDPR kicked off, 78% of companies felt they would be ready to fulfill data requirements. While… Continue reading.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Emergency Preparedness Planning - How Can We Plan for Emergencies More Effectively?

Virtual Corporation

Virtual Corporation is joining Varian Medical Systems in a webinar to discuss perspectives on emergency preparedness. Join Virtual Corporation's Vice President of Professional Services, Shane Mathew, MPH, CBCP to learn about how to help make your organization resilient during an emergency.

More Trending

article thumbnail

Marks out of 100 for Easyjet’s Cyber Incident Response

Plan B Consulting

Charlie scores Easyjet’s response to their recent cyber attack out of 100. “Thankfully, we now live in a world where it is accepted that data breaches happen, and organisations are more comfortable disclosing that they have been victim to an attack. However, with this welcome move away from victim blaming, organisations are now being judged more on how well they manage a breach.

article thumbnail

The Link between Business Continuity & Organizational Culture

Stratogrid Advisory

The link between Business Continuity and Organizational Culture? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Organizational culture is an often-overlooked factor in the long-term viability of Business Continuity Management (BCM) Programs. Many organizations understand the importance of Business Continuity Planning processes, such as Risks Assessment or a Business Impact Analysis (BIA).

article thumbnail

After Covid-19: Assessing domestic and international drivers of conflict 

Crisis Response Journal

Abigail Watson from the Oxford Research Group (ORG) assesses how Covid-19 contributes to the domestic and international drivers of instability in weaker or conflict-affected states as their governments enforce challenging restrictions.

article thumbnail

New Malware Variant Can Steal Data from Browsers and Cryptocurrency Wallets

Behavior Group

A Reason Labs research team has discovered a new variant of the Raccoon malware family. Initially discovered back in 2019, the Raccoon malware family is used to steal confidential data and browser information. New Malware Variant Can Steal Data from Browsers According to the Reason Security report, the new variant masquerades itself as legit, known… Continue reading.

Malware 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

The lookalike

arunpraka shray

We had checked into a guestroom towards the end of a pathway in the club founded in 1863, Meerut Cantonment. A clean room with a creaky bed & a dark, large bathroom. An ancient tree overlooking the veranda. Nonetheless, we settled our luggage there and quickly walked up to the dining room to meet our relatives. My wife & I were there, to attend a cousin’s wedding.

52
article thumbnail

Cloud Server

BCP Builder

Is a Cloud Server the best solution to decrease the time to recovery for small and medium businesses? How reliable a solution is the cloud? With so many people working from home due to the coronavirus pandemic, many companies will be moving their data onto a cloud server. From a security, operational and legal perspective – what issues does the cloud raise?

BCP 52
article thumbnail

Marks out of 100 for Easyjet’s Cyber Incident Response

Plan B Consulting

Charlie scores Easyjet’s response to their recent cyber attack out of 100. “Thankfully, we now live in a world where it is accepted that data breaches happen, and organisations are more comfortable disclosing that they have been victim to an attack. However, with this welcome move away from victim blaming, organisations are now being judged more on how well they manage a breach.

article thumbnail

The Link between Business Continuity & Organizational Culture

Stratogrid Advisory

The link between Business Continuity and Organizational Culture? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 4 minutes. Organizational culture is an often-overlooked factor in the long-term viability of Business Continuity Management (BCM) Programs. Many organizations understand the importance of Business Continuity Planning processes, such as Risks Assessment or a Business Impact Analysis (BIA).

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Calling all emergency planners! 

Crisis Response Journal

The Crisis Response Journal has highlighted the crucial role of emergency planners several times over the last few weeks – their foresight and expertise are invaluable at times like these and we must remember to include them in our thanks, along with the By Stewart Mashiter

100
100
article thumbnail

Thunderspy, New Attack Method, Allows Hackers to Steal Data in Less than 5 Minutes

Behavior Group

Eindhoven University of Technology researcher Björn Ruytenberg revealed the details of a new attack method he’s calling Thunderspy – which targets devices with a Thunderbolt port. New Attack Method Allows Hackers to Steal Data Thunderbolt, explains Ruytenberg, is a high-bandwidth interconnect promoted by Intel and included in laptops, desktops, and other systems.

article thumbnail

How to Reopen Your Business Safely [+4 Questions to Ask Before You Do]

Alert Media

The post How to Reopen Your Business Safely [+4 Questions to Ask Before You Do] appeared first on AlertMedia.

article thumbnail

Cloud Server

BCP Builder

Is a Cloud Server the best solution to decrease the time to recovery for small and medium businesses? How reliable a solution is the cloud? With so many people working from home due to the coronavirus pandemic, many companies will be moving their data onto a cloud server. From a security, operational and legal perspective – what issues does the cloud raise?

BCP 52
article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Use Cloud with Confidence: Maximize Uptime and Performance for SAP Applications in Microsoft Azure

VOX Veritas

Veritas InfoScale makes it easy to provide high availability and disaster recovery for SAP workloads with customized agents for Azure, NetWeaver, S/4HANA, and SAP HANA databases.

article thumbnail

Top reasons why Business Continuity Planning is ignored!

Stratogrid Advisory

Top reasons why Business Continuity Planning is ignored! Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 4 minutes. We all know this. The business is always busy, and because of this, it comes up with a myriad of justifications for ignoring Business Continuity Planning efforts. Some of the reasons are more reasonable than others, but none are excusable at the end of the day.

article thumbnail

 Covid-19: Evidence of ‘What Works’ in an effective multi-agency response. Part II

Crisis Response Journal

This is the second report that aims to understand the current challenges faced by Local Resilience Forums (LRFs) during the Covid-19 pandemic in the UK.

Pandemic 100
article thumbnail

Flaws in Cybersecurity Software Expose Hundreds of Networks to Cyberattacks

Behavior Group

Cybersecurity flaws have been exposed in cybersecurity provider Cyberoam’s security products. Flaws in Cybersecurity Software, Cyberattacks According to a vpnMentor report, the first vulnerability was reported in late 2019, while the second was shared with vpnMentor by an anonymous ethical hacker at the beginning of 2020. After confirming their findings, the vpnMentor team discovered a… Continue reading.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

How Hurricane Categories Can Help Businesses Prepare for Damage

Alert Media

The post How Hurricane Categories Can Help Businesses Prepare for Damage appeared first on AlertMedia.

article thumbnail

Business Impact Analysis Example

BCP Builder

Business Impact Analysis Example – How do you prioritize different processes in a Business Impact Analysis? Some processes being unavailable will be of high impact during a certain period and after that will only have a negligible impact. Feeback from BCP Builder Community on LinkedIn : Process Prioritization Prioritize on recovery time objective and re-prioritize on the day on urgency.

article thumbnail

Ransomware Recap – May

Managecast

Welcome to our May Ransomware Recap! In this monthly series, we discuss a few of the biggest ransomware stories. Let’s jump in. Ransomware Attacks and Demands Increase in 2019. According to new data from Group-IB, ransomware attacks increased by 40% with ransom demands jumping from $6,000 to $84,000 from 2018-2019. Some of the most common methods of infiltrating systems were found to be external remote services and phishing.

article thumbnail

20/20 Vision: Comments on Exercise Cygnus (UK’s pandemic exercise in 2016)

Plan B Consulting

Today Charlie discusses how Exercise Cygnus, the UK’s pandemic exercise in 2016, holds up against the ongoing outbreak of COVID-19. UK the “most prepared country”? The UK government has had a lot of criticism in the press about them being unprepared to respond to COVID-19, despite the 2019 Global Health Security Index Report in which we were rated as one of the ‘most prepared countries’.

article thumbnail

Housing Protections are an Essential Part of COVID-19 Response and Recovery

National Center for Disaster Prepardness

As the United States enters its second month of widespread closure in response to the COVID-19 pandemic, state and local governments across the country continue to rely on stay-at-home orders to stem the spread of the virus. However, for the millions of Americans who lack access to safe , stable , and affordable housing, staying at home is not that simple.