January, 2019

article thumbnail

Do you have a data breach response plan?

IT Governance BC

This blog has been updated to reflect industry updates. Originally published 6 August 2018. The EU GDPR (General Data Protection Regulation) requires organisations to respond to serious data breaches within 72 hours of detection. This places a significant burden on organisations: taking the appropriate measures to comply with the law while simultaneously dealing with the collateral impact of a breach is not a picnic!

article thumbnail

Here's some brand advice - Stop asking people to post their love 

Crisis Response Journal

Why would a high-profile company think it was a smart idea to launch a hashtag asking customers and the public to share photos and messages about how much they love the brand?

Media 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2018 Set a New Record for Security Vulnerabilities

Behavior Group

With more than 16,500 known security vulnerabilities being catalogued, 2018 set a new record over last year’s previous record of 14,714. CEOs and security teams of all businesses should take note of this issue, given the recent enforcement of the General Data Protection Regulation (GDPR), which penalizes corporate data/privacy breaches of EU citizens with staggering… Continue reading.

article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 4 minutes Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.

Audit 52
article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

NFPA 1600: What It Is and Why You Need It

Alert Media

The post NFPA 1600: What It Is and Why You Need It appeared first on AlertMedia.

More Trending

article thumbnail

The Seeker

arunpraka shray

‘Gharib Nawaz se mera jhagda hain (I have a row with Gharib Nawaz)’ when I asked him about his performances at the Ajmer Sharif Dargah. A young, hungry Ghulam (Not the one, the iconic Sufi Qawwal we know of today) was loitering in the lanes of Ajmer. He had finished off his last few Indian rupees that very morning while buying a small breakfast of puri-sabzi, he hadn’t eaten well for the last few days.

article thumbnail

Online learning – Ready Calgary: Community preparedness 

Crisis Response Journal

Robert Fagan looks at another free emergency preparedness resource for the Crisis Response Journal. Happy New Year!

100
100
article thumbnail

Cybercrime Could Cost Companies $5.2 Trillion Over Next Five Years

Behavior Group

Companies globally could incur $5.2 trillion in additional costs and lost revenue over the next five years due to cyberattacks, as dependency on complex internet-enabled business models outpaces the ability to introduce adequate safeguards that protect critical assets. cybercrime, cybercrime cost Based on an Accenture survey, the report —Securing the Digital Economy: Reinventing the Internet… Continue reading.

article thumbnail

Not another BCM Program audit?

Stratogrid Advisory

Not another BCM Program audit? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 4 minutes. Another Business Continuity Management (BCM) Program audit. Again? Some organizations think of audits as tedious, and often unnecessary, accounting procedures, rather than as a powerful business tool that can be used to improve the organization’s capabilities.

Audit 52
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

6 Steps To an “Organized” Emergency

Alert Media

The post 6 Steps To an “Organized” Emergency appeared first on AlertMedia.

article thumbnail

Preparing for Brexit

Plan B Consulting

In preparation of Brexit, Charlie looks at how we can start to identify areas of exposure within our organisation. I imagine a lot of us haven’t yet prepared for Brexit, and our organisations have continued on quite happily doing what they do. The problem is what to prepare for, as there seems to be a different flavour of Brexit every day. Are we heading towards a Canada-plus, a Customs Union, a Norway deal (plus or minus), no deal or the Prime Minister’s plan A – she doesn’t really

article thumbnail

Aligning Cyber Incident Response Planning with Your BC/DR Program

eBRP

Cyber disruptions – and their impact on both reputations and profitability – have risen to the top of nearly every recent risk study. These increasing concerns weigh heavily on Executive Suites and Boards. In the IT realm, CIO’s and CISO’s now focus their efforts on mitigating those risks, and planning responses to potential data breaches, malware and other cyber threats.

article thumbnail

Calculating the cost of inaction 

Crisis Response Journal

Too often when deciding whether to make changes or not, we only see the cost of action and ignore the cost of inaction.

100
100
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

What does service management really cost?

Behavior Group

It can be challenging to accurately estimate the full cost to deploy and operate a service management solution. This requires taking a clear, comprehensive look at how an organization currently operates, and what that really costs. service management According to a 2018 Forrester report, many companies are moving from IT Service Management (ITSM) to Enterprise… Continue reading.

article thumbnail

Risk Assessment – Is it worth the time and effort?

Stratogrid Advisory

Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.

article thumbnail

AlertMedia Announces New $25 Million Investment

Alert Media

The post AlertMedia Announces New $25 Million Investment appeared first on AlertMedia.

52
article thumbnail

5 Business Continuity Predictions for 2019

Plan B Consulting

This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

Machine learning for proactive support: Veritas Predictive Insights can do that

VOX Veritas

Bolstered by hundreds of millions of telemetry data points, Predictive Insights is able to deliver compelling, data-driven IT guidance so customers experience improved ROI on Veritas appliances.

40
article thumbnail

When is the right time for corporate social activism? 

Crisis Response Journal

Customers and employees say they want companies to take a stand on high-profile social and political issues. But that can come with a costly downside, says Dr Tony Jaques.

article thumbnail

Prove Cybersecurity’s Value to Build a Culture of Cybersecurity

Behavior Group

If you want senior executives to buy into cybersecurity, you need to prove the value cybersecurity brings to the core business. Read your organization’s annual reports, corporate governance documents, shareholder statements and the like. These documents will give you a better sense for what drives your organization and, in turn, what your executives are thinking… Continue reading.

article thumbnail

Risk Assessment – Is it worth the time and effort?

Stratogrid Advisory

Risk Assessment – Is it worth the time and effort? Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. Should your organization execute a Risk Assessment? Is it worth the time and effort? It is often a long and complicated process, which may discourage some organizations from fully committing to it. This article will address the importance of the Risk Assessment as a general business tool, as well as in the context of Business Continuity Planning.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Vendor Malpractice

Business Resilience Decoded

Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 14: "Vendor Malpractice" with Vicky McKim of Aureon Consulting. Contact Vicky McKim at: [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

5 Business Continuity Predictions for 2019

Plan B Consulting

This week Charlie shares his business continuity predictions for 2019. Happy new year to all readers. I hope you have had a good Christmas and New Year. For the first bulletin of the year, I am going to be bold and make five business continuity predictions for 2019. We can then revisit them at the end of the year and see if they come true! Volatility globally is going to get worse.

article thumbnail

Cost-effective DR with AWS and Resiliency Platform

VOX Veritas

View this video to see how Veritas Resiliency Platform and AWS provide cost-effective recovery.

article thumbnail

Why the terrorist threat level is still 'Severe' 

Crisis Response Journal

The current threat level for international terrorism in the UK is Severe and has not been below this level since August 2014. Roger Gomm asks: Is it still justified?

100
100
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Hacker leaks data on Angela Merkel and hundreds of German lawmakers

Behavior Group

A hacker has targeted and released private data on German chancellor Angela Merkel and other senior German lawmakers and officials. The data was leaked from a Twitter account, since suspended, and included email addresses, phone numbers, photo IDs and other personal data on hundreds of senior political figures. Hacker leaks data, According to a government… Continue reading.

article thumbnail

Remote working may boost productivity, but also leave you vulnerable to attack

Behavior Group

New flexible working practices could pose a security risk to small businesses, with one in five of employees (21%) stating they are most productive when working in public spaces like a cafe or library, but only 18% concerned with the security implications this could have. SMBs therefore face the challenge of keeping their business secure,… Continue reading.

article thumbnail

Automate recovery of VMware workloads with Resiliency Platform

VOX Veritas

Watch this video to discover how Resiliency Platform and VMware work together to automate recovery of VMware workloads.