March, 2019

article thumbnail

Common Misconceptions about Disaster

Emergency Planning

Myth 1: Disasters are truly exceptional events. Reality: They are a normal part of daily life and in very many cases are repetitive events. Myth 2: Natural disasters are an inevitable result of Mother Nature's fury. Reality: The triggering phenomena are natural, and virtually nothing can be done to stop earthquakes, floods or tropical storms, for example.

article thumbnail

Massive online open course in humanitarian essentials looks at risks, security and wellbeing 

Crisis Response Journal

Distance and online education change as quickly as the technology, pedagogy and adult education that support such learning morphs from one system to the next, writes Robert Fagan.

Education 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Virtualized Calls a Top Threat for ATO Attacks

Behavior Group

According to the 2019 State of the Call Center Authentication report (…), one of the most exploited areas in a company’s security chain is the call center. call centers, virtualized calls a top threat, ATO attacks, cybersecurity Companies may be investing more in their cybersecurity defenses, but fraudsters are evolving in their tactics. As such,… Continue reading.

article thumbnail

A reactive mindset is today’s biggest threat to data security

SRM

What constitutes a cyber-mature organisation? Here’s a clue: it has nothing to do with size or age, sector or niche specialism, whether it is online or has a physical shop presence. It has everything to do with the corporate mindset. The cyber mature organisation is one with full board-level buy in. But, above all, its approach to data security is proactive rather than reactive.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Boeing is doing crisis management all wrong – here’s what a company needs to do to restore the public’s trust

Marketpoint Recall

In a crisis, time is not on your side. A crisis creates a vacuum, an informational void that gets filled one way or another. The longer a company or other organization at the center of the crisis waits to communicate, the more likely that void will be filled by critics. That’s exactly what’s happening to Boeing. On March 10, Ethiopian Airlines flight ET302 crashed outside Addis Ababa shortly after takeoff, killing all 157 passengers on board.

More Trending

article thumbnail

S3, Episode 2 - How to tackle diversity in Business Continuity

The Business Continuity Podcast

The call for greater diversity in people of different genders, race, sexual orientation and disability is dominating our conversations. The Business Continuity profession is no different. How do we hire the best people, who may not fit the traditional types usually associated with Business Continuity? The call for greater diversity in people of different genders, race, sexual orientation and disability is dominating our conversations.

article thumbnail

Our public private lives – external and internal conflict 

Crisis Response Journal

Larissa Sotieva looks at how, in the process of giving up our online privacy, we are actually in danger of making ourselves more prone to manipulation, and examines this paradox within the context of regions affected by violent conflict.

100
100
article thumbnail

OIG: NASA’s Poor Cybersecurity is Operational Threat

Behavior Group

Government inspectors have uncovered serious deficiencies in NASA’s information security program which they claim could threaten operations. NASA’s Poor Cybersecurity, threat, information security The findings come from the latest Office of the Inspector General (OIG) review of the space agency for fiscal year 2018, under the Federal Information Security Modernization Act of 2014 (FISMA).

article thumbnail

Finding the Best Emergency Notification System Vendor: Tips for Your Evaluation Process

Alert Media

The post Finding the Best Emergency Notification System Vendor: Tips for Your Evaluation Process appeared first on AlertMedia.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Optimizing Your Multi-Tier Recovery Strategy

Business Resilience Decoded

Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Using Dark Websites for Crisis Communication – Three Case Studies

Plan B Consulting

Charlie discusses the use of dark websites for crisis communication. I thought this week I would discuss the use of dark websites for crisis communication. When you hear about a crisis on the news, I always suggest you take a look at the organisation’s website and see how they are portraying the incident. A dark website is a website which is hidden from existing users and only deployed when an incident occurs.

article thumbnail

Improved agility and speed: Veritas Resiliency Platform can do that

VOX Veritas

At its most basic definition, IT resilience is ensuring your company can recover from both planned and unplanned disruption.

article thumbnail

LORCA digs deeper to understand industry’s need for cybersecurity incident management 

Crisis Response Journal

The mission of the London Office for Rapid Cybersecurity Advancement (LORCA) is to scale the most promising companies that can help ensure the UK is the safest place to be online, writes Lydia Ragoonanan By Lydia Ragoonanan

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Breaches and Leaks Soared 424% in 2018

Behavior Group

Nearly 15 billion identity records circulated in underground communities in 2018, a 71% increase over the year as hackers targeted smaller organizations more widely, according to a new report (…). breaches and Leaks, breaches, leaks, hackers, cybercrime, cybersecurity, cyber-criminals The identity intelligence company scanned the surface, social, deep and dark web for identity related breaches… Continue reading.

article thumbnail

4 Must-Have Emergency Notification Message Templates

Alert Media

The post 4 Must-Have Emergency Notification Message Templates appeared first on AlertMedia.

article thumbnail

Optimizing Your Multi-Tier Recovery Strategy

Business Resilience Decoded

Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 17: "Optimizing Your Multi-Tier Recovery Strategy" with Joseph George of Sungard Availability Services. Contact Joseph George at: [link] [link] [link].

article thumbnail

An Old Threat Returns

Plan B Consulting

Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Returning fighters Part II: Speak No Evil 

Crisis Response Journal

The second part of this series discusses updates in some pertinent cases of returning ISIS members and examines the implications of statements surrounding the issue made by leading political figures, specifically in how they affect government policy – and By Casey Brunelle

article thumbnail

Emergency management course offers flexibility and innovative experiential learning 

Crisis Response Journal

Emergency management course offers flexibility and innovative experiential learning By Rob Fagan

article thumbnail

5 Key Skills Every Incoming CISO Should Have

Behavior Group

CISO roles – both full-time and fractional – are on the rise. Their skills can help a growing organization enhance its security program, keep it on track, and guide in times of crisis and change. However, finding the right CISO can be tricky business, especially if this role is new to your organization. Here are… Continue reading. The post 5 Key Skills Every Incoming CISO Should Have appeared first on Behaviour Portugal.

article thumbnail

An Old Threat Returns

Plan B Consulting

Charlie looks at the latest spate of parcel bombs and why now might be a good time to review your plans, procedures and awareness. This week I was down in London delivering the Managing and Preparing for Cyber Incidents course. I noticed in the news at lunchtime that parcel bombs had been sent to Heathrow Airport, Waterloo Station and London City Airport.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha

article thumbnail

The Incident Response Approach to Cybersecurity

Behavior Group

In 2017, Merck, a pharmaceutical company, was one of many companies targeted by a ransomware attack, known as “WannaCry.” incident response, cybersecurity, cyberattack, ransomware Reuters reported that this attack “disrupted production of some Merck medicines and vaccines,” at a high cost for the company. In addition, work was disrupted for a huge number of the… Continue reading.

article thumbnail

New Vulnerabilities Found in Top Password Managers

Behavior Group

Top password manager products have fundamental flaws that expose the data they are designed to protect, rendering them no more secure than saving passwords in a text file, according to a new study (…). password managers, password, malware attacks, security 100 percent of the products that ISE analyzed failed to provide the security to safeguard… Continue reading.

article thumbnail

8 Cybersecurity Risks That May Impact Organizations in 2019

Behavior Group

Aon’s 2019 Cyber Security Risk Report features eight risks that may impact organizations in the next 12 months, no matter where they are on their digital journey. cybersecurity risks, cybersecurity, threat,vulnerabilities “In 2018 we witnessed that a proactive approach to cyber preparation and planning paid off for the companies that invested in it, and in… Continue reading.

article thumbnail

Ten Years of Teaching the CBCI Certification Course – What Has Changed?

Plan B Consulting

Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.

Banking 40
article thumbnail

Ten Years of Teaching the CBCI Certification Course – What Has Changed?

Plan B Consulting

Charlie looks at how the CBCI Certification Course (GPG) has changed over the last ten years. Just before I start this week’s bulletin, our thoughts are with the people of New Zealand after the attack on the two mosques today. This week I have been teaching the CBCI Certification Course (GPG) in Glasgow and I found myself thinking about how the course and the Good Practice Guidelines (GPG) has changed over time.

Banking 40