July, 2021

article thumbnail

Why does US policy ignore disaster prevention?

DisasterDoc

Wouldn’t it be great if the US had a policy for preventing the kinds of tragedies that just occurred in Florida? Wouldn’t it be great if “the whole community—from community. The post Why does US policy ignore disaster prevention? appeared first on DisasterDoc.

187
187
article thumbnail

Pandemic effects on crisis responders and emergency planners 

Crisis Response Journal

The pandemic has affected all of us and uncertainty is mentally and emotionally uncomfortable. The last 18 months have been uncertain on a life and death coin toss for some.

Pandemic 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

21st Century Land Mobile Radio (LMR) Systems

Disaster Zone Podcast

Land Mobile Radio (LMR) systems remain the backbone of communications for first responders across the spectrum of agencies and disciplines. In this Disaster Zone Podcast Todd Perdieu , Vice President of Products and strategy with L3Harris provides information on how LMR systems function. He goes into more depth about the challenges of coordinating radio spectrum issues in the design of new systems.

article thumbnail

Kaseya VSA Security Alert

Scott R. Davis

Updated 7/2/2021 - 17:51 ET. Shortly after 2PM on Friday July 2, 2021 administrators of the Kaseya VSA (Remote Monitoring and Management) Software as a Service began to experience issues where users were locked out and customer agents were receiving scripts to deploy ransomware. By 3PM Kaseya had shut down and placed all cloud servers in maintenance mode and has put out communication for all self-hosted VSA partners to shut down their servers.

Alert 130
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

The Key to Modern Access Control: How Biometric Solutions Can Offer Both Security and Convenience

Security Industry Association

Maria Pihlström, senior global marketing manager, Fingerprints. Meeting the security challenges of modern office environments is a complex and long-standing issue for many organizations. Businesses use a range of enterprise technologies to boost productivity, connect employees, and accommodate a more distributed and flexible workforce. However, with greater flexibility come increasing security demands – both in and outside the office.

More Trending

article thumbnail

Reduce the Risk from Digital Transformation

Pure Storage

If you’re like most IT professionals, your digital transformation journey has accelerated in the last year. Whether you’re a CIO tasked with managing complex resources; part of the DevOps team that’s leading cultural change; or an application architect specifying compute, storage, and networking requirements; you’re putting data at the center of your business. .

article thumbnail

Rising sea levels: Relocating indigenous people in Panama 

Crisis Response Journal

July 2021: CRJ Partner, PIX4D explains how drone mapping helped an overpopulated island threatened by climate change off the Panama coast

100
100
article thumbnail

Building for Disaster Resilience

Disaster Zone Podcast

Building for disaster resilience requires a concerted effort to build disaster resilient buildings with new building materials and siting buildings in the right location to limit the impact of natural hazards. Evan Reis , Executive Director for the US Resiliency Council shares how they are working to improve building codes and construction methods and processes.

article thumbnail

Getting to Know Us: The Summer Internship Program

Donyati

Eager to recruit the best, Donyati opens its arms every year to aspiring interns. The Summer Internship Program, a key recruiting channel, has grown in just three years from one to 10 interns – and has led to four full-time hires. Running from May to August, the Program offers professional networking, career advancement and guided discovery opportunities.

97
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

7 Reasons Why Cybersecurity Fails

NexusTek

READ TIME: 5 MIN. July 28, 2021. 7 Reasons Why Cybersecurity Fails. Too often cybersecurity is viewed as an IT cost rather than a business requirement. But the problem with that is: Cybersecurity, and the impacts of a lackluster implementation, is everyone’s problem. The consequences of a successful cyberattack can include: An expensive data breach The average cost was $3.86 million in 2020.

article thumbnail

MSPs Gain a New Voice with the National Society of IT Service Providers

Acronis

Today was a pivotal day in the history of the service provider channel. The inaugural meeting of the National Society of IT Service Providers (NSITSP) was held to bring the MSP community together and begin the regulation discussion that will help shape the channel for years to come.

article thumbnail

The Main Types of Workplace Violence and 6 Steps to Mitigate Risks

Alert Media

The post The Main Types of Workplace Violence and 6 Steps to Mitigate Risks appeared first on AlertMedia.

article thumbnail

When it all goes wrong, at least get the response right 

Crisis Response Journal

July 2021: There are so many ways a kidnapping can go wrong for the victim and the victim’s family, writes Stephen Grossman, so it is vitally important to involve people who have experience in this field

100
100
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Media’s Use of Drones

Disaster Zone Podcast

One segment of our community that is using drones more and more includes the television media. This podcast is an interview with Greg Thies, News Operations Manager at King Television in Seattle, a NBC affiliate. In this podcast we learn about what the safety and operational protocols are in use to provide the safe operation of drones by the media. There is also information on how they approach working with first responders when they arrive on a disaster site.

Media 130
article thumbnail

The Year That Changed Security: How the Pandemic Shaped the Use of Technology in 2020 and Going Forward

Security Industry Association

Alan Stoddard, president, Cognyte Software North America. To say that the year 2020 was challenging is a huge understatement. In March of last year, the COVID-19 pandemic disrupted life around the world. Regular business operations and the economy came to a halt. Businesses such as those in retail, stadiums, casinos, hotels and restaurants were particularly hard hit.

article thumbnail

Customer Value Story: Planning for the Unexpected

LogisManager

Customer Value Story: Planning for the Unexpected. The pandemic has disrupted operating models of businesses across the globe. Since the beginning of 2020 – and since the launch of our company in 2006 – LogicManager has been working with our clients to help them pivot and prepare. We have over 15 years of experience under our belt of helping customers avoid all sorts of risks and scandals.

BCP 94
article thumbnail

Facebook Prophet and the Stock Market (Part 1)

Advancing Analytics

Using Facebook’s Prophet library to forecast the FTSE 100 index. By Dan Lantos. Photo by Maxim Hopman on Unsplash This article (part of a short series) aims to introduce the Prophet library, discuss it at a high level and run through a basic example of forecasting the FTSE 100 index. Future articles will discuss exactly how Prophet achieves its results, how to interpret the output and how to improve the model.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

4 Steps to Conduct a Business Threat Assessment

Alert Media

The post 4 Steps to Conduct a Business Threat Assessment appeared first on AlertMedia.

article thumbnail

Protecting livestock in hurricanes 

Crisis Response Journal

Continuing her blog series, Lyzi Cota outlines the dangers for livestock during hurricane season, as well as the potential subsequent floods, and she provides steps for safeguarding animals

100
100
article thumbnail

New Cellular Service Opportunities for First Responders

Disaster Zone Podcast

T-Mobile is now the second largest wireless carrier in the United States. Their recent merger with Sprint has given them some significant advantages in coverage and emergency and disaster capabilities. This interview is with Craig Martinez, a public safety advisor to T-Mobile with a long background in law enforcement. In the interview we discuss the many strong attributes that T-Mobile now has to support first responder agencies, police and fire—including being able to provide free cellular serv

article thumbnail

SIA New Member Profile: Credo Cyber Consulting LLC

Security Industry Association

New Security Industry Association (SIA) member Credo Cyber Consulting LLC specializes in cyber and physical security consulting and training, helping organizations build comprehensive security programs rooted in their business objectives. The company is headquartered in the New York metropolitan area and works with regional, national and global accounts.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Cyber Security: 8 Steps to Cyber Resilience

NexusTek

READ TIME: 4 MIN. July 7, 2021. Cyber Security: 8 Steps to Cyber Resilience. You’ve heard of cyber security, but have you heard of cyber resiliency? Let’s start with definitions: Cybersecurity includes the technologies and measures utilized to thwart cyber threats. Cyber resilience is the ability to maintain business operations despite a cyber attack or breach.

article thumbnail

Who Are Ransomware Attackers and What Are They After?

Pure Storage

Over July 4 weekend, perhaps the largest global ransomware incident occured. Behind the attack: REvil, a ransomware cyberhacking collective operating out of Russia. The attack hit at least 17 countries and impacted thousands of businesses. Their demand? $70 million in Bitcoin to de-encrypt all the companies’ data at once. . REvil is just one example of today’s sophisticated hackers.

article thumbnail

Run Hide Fight: Pros and Cons

Alert Media

The post Run Hide Fight: Pros and Cons appeared first on AlertMedia.

article thumbnail

Using blockchain technology to build supply chain resilience 

Crisis Response Journal

Charles Masser says that organisations must rethink how supply chain management can be brought into the 21st Century, using innovative tools to improve resilience

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha