March, 2019

article thumbnail

Emergency management course offers flexibility and innovative experiential learning 

Crisis Response Journal

Emergency management course offers flexibility and innovative experiential learning By Rob Fagan

article thumbnail

4 Must-Have Emergency Notification Message Templates

Alert Media

The post 4 Must-Have Emergency Notification Message Templates appeared first on AlertMedia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Virtualized Calls a Top Threat for ATO Attacks

Behavior Group

According to the 2019 State of the Call Center Authentication report (…), one of the most exploited areas in a company’s security chain is the call center. call centers, virtualized calls a top threat, ATO attacks, cybersecurity Companies may be investing more in their cybersecurity defenses, but fraudsters are evolving in their tactics. As such,… Continue reading.

article thumbnail

A reactive mindset is today’s biggest threat to data security

SRM

What constitutes a cyber-mature organisation? Here’s a clue: it has nothing to do with size or age, sector or niche specialism, whether it is online or has a physical shop presence. It has everything to do with the corporate mindset. The cyber mature organisation is one with full board-level buy in. But, above all, its approach to data security is proactive rather than reactive.

article thumbnail

Supply Chain Resilience Checklist

Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m

article thumbnail

Using Dark Websites for Crisis Communication – Three Case Studies

Plan B Consulting

Charlie discusses the use of dark websites for crisis communication. I thought this week I would discuss the use of dark websites for crisis communication. When you hear about a crisis on the news, I always suggest you take a look at the organisation’s website and see how they are portraying the incident. A dark website is a website which is hidden from existing users and only deployed when an incident occurs.

More Trending

article thumbnail

Our public private lives – external and internal conflict 

Crisis Response Journal

Larissa Sotieva looks at how, in the process of giving up our online privacy, we are actually in danger of making ourselves more prone to manipulation, and examines this paradox within the context of regions affected by violent conflict.

100
100
article thumbnail

Finding the Best Emergency Notification System Vendor: Tips for Your Evaluation Process

Alert Media

The post Finding the Best Emergency Notification System Vendor: Tips for Your Evaluation Process appeared first on AlertMedia.

article thumbnail

OIG: NASA’s Poor Cybersecurity is Operational Threat

Behavior Group

Government inspectors have uncovered serious deficiencies in NASA’s information security program which they claim could threaten operations. NASA’s Poor Cybersecurity, threat, information security The findings come from the latest Office of the Inspector General (OIG) review of the space agency for fiscal year 2018, under the Federal Information Security Modernization Act of 2014 (FISMA).

article thumbnail

Improved agility and speed: Veritas Resiliency Platform can do that

VOX Veritas

At its most basic definition, IT resilience is ensuring your company can recover from both planned and unplanned disruption.

article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Using Dark Websites for Crisis Communication – Three Case Studies

Plan B Consulting

Charlie discusses the use of dark websites for crisis communication. I thought this week I would discuss the use of dark websites for crisis communication. When you hear about a crisis on the news, I always suggest you take a look at the organisation’s website and see how they are portraying the incident. A dark website is a website which is hidden from existing users and only deployed when an incident occurs.

article thumbnail

Optimizing Your Multi-Tier Recovery Strategy

Business Resilience Decoded

Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Massive online open course in humanitarian essentials looks at risks, security and wellbeing 

Crisis Response Journal

Distance and online education change as quickly as the technology, pedagogy and adult education that support such learning morphs from one system to the next, writes Robert Fagan.

Education 100
article thumbnail

Boeing is doing crisis management all wrong – here’s what a company needs to do to restore the public’s trust

Marketpoint Recall

In a crisis, time is not on your side. A crisis creates a vacuum, an informational void that gets filled one way or another. The longer a company or other organization at the center of the crisis waits to communicate, the more likely that void will be filled by critics. That’s exactly what’s happening to Boeing. On March 10, Ethiopian Airlines flight ET302 crashed outside Addis Ababa shortly after takeoff, killing all 157 passengers on board.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Breaches and Leaks Soared 424% in 2018

Behavior Group

Nearly 15 billion identity records circulated in underground communities in 2018, a 71% increase over the year as hackers targeted smaller organizations more widely, according to a new report (…). breaches and Leaks, breaches, leaks, hackers, cybercrime, cybersecurity, cyber-criminals The identity intelligence company scanned the surface, social, deep and dark web for identity related breaches… Continue reading.

article thumbnail

Common Misconceptions about Disaster

Emergency Planning

Myth 1: Disasters are truly exceptional events. Reality: They are a normal part of daily life and in very many cases are repetitive events. Myth 2: Natural disasters are an inevitable result of Mother Nature's fury. Reality: The triggering phenomena are natural, and virtually nothing can be done to stop earthquakes, floods or tropical storms, for example.

article thumbnail

An Old Threat Returns

Plan B Consulting

Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.

article thumbnail

Optimizing Your Multi-Tier Recovery Strategy

Business Resilience Decoded

Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link].

article thumbnail

Emergency Preparedness: Active Shooter Tabletop Exercise

April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.

article thumbnail

LORCA digs deeper to understand industry’s need for cybersecurity incident management 

Crisis Response Journal

The mission of the London Office for Rapid Cybersecurity Advancement (LORCA) is to scale the most promising companies that can help ensure the UK is the safest place to be online, writes Lydia Ragoonanan By Lydia Ragoonanan

article thumbnail

Returning fighters Part II: Speak No Evil 

Crisis Response Journal

The second part of this series discusses updates in some pertinent cases of returning ISIS members and examines the implications of statements surrounding the issue made by leading political figures, specifically in how they affect government policy – and By Casey Brunelle

article thumbnail

5 Key Skills Every Incoming CISO Should Have

Behavior Group

CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are… Continue reading. The post 5 Key Skills Every Incoming CISO Should Have appeared first on Behaviour Portugal.

article thumbnail

An Old Threat Returns

Plan B Consulting

Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

The Incident Response Approach to Cybersecurity

Behavior Group

In 2017, Merck, a pharmaceutical company, was one of many companies targeted by a ransomware attack, known as “WannaCry.” incident response, cybersecurity, cyberattack, ransomware Reuters reported that this attack “disrupted production of some Merck medicines and vaccines,” at a high cost for the company. In addition, work was disrupted for a huge number of the… Continue reading.

article thumbnail

New Vulnerabilities Found in Top Password Managers

Behavior Group

Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study (…). password managers, password, malware attacks, security 100 percent of the products that ISE analyzed failed to provide the security to safeguard… Continue reading.

article thumbnail

8 Cybersecurity Risks That May Impact Organizations in 2019

Behavior Group

Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey. cybersecurity risks, cybersecurity, threat,vulnerabilities “In 2018 we witnessed that a proactive approach to cyber preparation and planning paid off for the companies that invested in it, and in… Continue reading.

article thumbnail

Ten Years of Teaching the CBCI Certification Course – What Has Changed?

Plan B Consulting

Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.

Banking 40
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Ten Years of Teaching the CBCI Certification Course – What Has Changed?

Plan B Consulting

Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.

Banking 40
article thumbnail

Cyber Playbooks – Updated & Revisited

Plan B Consulting

Charlie discusses developing a new kind of playbook which could help you plan for different types of cyber-attack. This week I have had a bit of an epic journey. I started off in Shetland and ended the week in Abu Dhabi, having spent a couple of days in Riyadh, Saudi Arabia. I only visited one company in Saudi, but their business continuity was pretty impressive.

article thumbnail

Cyber Playbooks – Updated & Revisited

Plan B Consulting

Charlie discusses developing a new kind of playbook which could help you plan for different types of cyber-attack. This week I have had a bit of an epic journey. I started off in Shetland and ended the week in Abu Dhabi, having spent a couple of days in Riyadh, Saudi Arabia. I only visited one company in Saudi, but their business continuity was pretty impressive.