November, 2019

article thumbnail

Scenario of the Month: An Ice-Storm Wrecks Havoc

Disaster Preparedness

Melted Fiber-optic Cable. It is Mid-November. After a week of above-average temperatures and some heavy rain. A massive cold front has moved into your area causing an ice-storm and covering everything in layers of ice. The Mayor has declared a local State-of-Emergency and has asked everyone to stay home and off the roads for safety and clean-up. A fire has broken out downtown at an underground sub-station causing both a power outage and melting of fiber-optic cables impacting the internet and 91

Outage 130
article thumbnail

Is Your Org "Not Ready" for Business Continuity?

Alternative Resiliency Services Corp

“We’re not mature enough yet.” “Not in the budget.” “Priorities, we’re way too busy right now.” “People can work from home – we’re good.” Many companies have seemingly valid reasons to delay or defer setting up a Business Continuity Program. There are always more pressing issues.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Conference for forward thinking in crisis management 

Crisis Response Journal

Crisis management professionals are invited to attend a unique international emergency management conference to be held at the Bluepoint Conference Centre in Brussels, Belgium on February 19-20, 2020. And it's free to attend!

article thumbnail

Prevent the Disaster, Forget the Recovery

Disaster Recovery Journal

Personal crystal balls are notoriously bad at predicting the future. They run on small number statistics, have ill-defined parameters, and small data banks incorporating elastic memories. The crystal balls are plagued or programmed with a logic that is. The post Prevent the Disaster, Forget the Recovery appeared first on Disaster Recovery Journal.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

New Data Predicts Unprecedented Levels of Holiday Hacking

Behavior Group

A new report (…) predict unprecedented levels of online data theft this holiday season due to a lack of deployed client-side security measures. Holiday Hacking, data theft,security measures, attacks The State of the Web Report highlights the widespread vulnerability resulting from integrations that enable and enhance website functionality. These integrations, which exist on nearly every… Continue reading.

More Trending

article thumbnail

How AlertMedia Can Help You Keep Your Workforce Safe This Winter

Alert Media

The post How AlertMedia Can Help You Keep Your Workforce Safe This Winter appeared first on AlertMedia.

article thumbnail

A Century of Healthcare Data

Cloudian

The need for a lasting storage infrastructure By Neil Stobart, Cloudian Vice President of Global Sales Engineering This post was originally written for HPE TECHnative. The ongoing data deluge is affecting virtually all industries, but perhaps nowhere is this issue having more impact than in healthcare. Due to a combination of factors, the use of. Read More.

article thumbnail

The role of eLearning in crisis resilience 

Crisis Response Journal

It’s time to add eLearning to your crisis preparedness programme writes Caroline Sapriel of CS and A International, a global risk, crisis and business continuity management consultancy.

article thumbnail

When Disaster Strikes: Disaster Recovery Planning can make the difference Corporate Survival

Disaster Recovery Journal

It could be as innocent as a construction crew accidentally cutting through an underground stone wall that holds back a river. Or as sinister as a terrorist bombing of a skyscraper. Or as sudden as an earthquake. Or as devastating as a hurricane. The reality is that any business that relies on information technology, which includes most businesses, needs a disaster-recovery plan.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

The Benefits of Training Employees to Hack

Behavior Group

For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Training Employees to Hack For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach… Continue reading.

article thumbnail

Resilience Training For Schools And Organisations

Beaumont Resilience Training

We’re currently working on this blog post and it will be live very soon. The post Resilience Training For Schools And Organisations appeared first on Resilience Training.

article thumbnail

4 Tips to Ensure Corporate Travel Security

Alert Media

The post 4 Tips to Ensure Corporate Travel Security appeared first on AlertMedia.

Travel 52
article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

The threat of pandemics 

Crisis Response Journal

What did you do this weekend? How did you fill that 48 hours? The weekly shop maybe, sports sessions for children, household chores, socialising or simply catching up on some rest?

Pandemic 100
article thumbnail

Contingency Planning Cycle

Disaster Recovery Journal

You attend a seminar on contingency planning and hear presentations such as “developing and maintaining your plan”, “testing your plan”, “business impact assessments”, and “lessons learned” from other people’ The post Contingency Planning Cycle appeared first on Disaster Recovery Journal.

article thumbnail

How to Achieve Cybersecurity with Patience, Love and Bribery

Behavior Group

Your five-year-old hears the doorbell ring just after you’ve jumped in the shower. They’ve been trained by your example to answer the door when they hear the bell, but are a bit too young to have had the “never answer the door unless I’m with you” talk. The man at the door is dressed in… Continue reading. The post How to Achieve Cybersecurity with Patience, Love and Bribery appeared first on Behaviour Portugal.

article thumbnail

Welcome To Resilience Training

Beaumont Resilience Training

We’re currently working on this blog post and it will be live very soon. The post Welcome To Resilience Training appeared first on Resilience Training.

article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

Four Steps To Prepare Your Business For Winter

Alert Media

The post Four Steps To Prepare Your Business For Winter appeared first on AlertMedia.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52
article thumbnail

What are the two most vital elements for sustained good health? 

Crisis Response Journal

Ruth Wozencroft of CRJ Key Network Partner, Q-bital Healthcare Solutions, tells us that on the face of it, the answer is simple – clean air and clean water.

article thumbnail

DR: How Do You Pay For It?

Disaster Recovery Journal

One aspect of disaster planning that seems somewhat overlooked is the question, How do you fund the recovery efforts? Recovering from a disaster requires a lot of unbudgeted funds which must be spent or committed very quickly. The post DR: How Do You Pay For It? appeared first on Disaster Recovery Journal.

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

Behavior Group

Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs. Places Where Hackers Are Stealthily Stealing Your Data, cybersecurity, attacks Here we examine the top five places in 2019 where cybercriminals are stealing corporate and government data without ever getting noticed and then learn how to avoid falling victim to… Continue reading.

article thumbnail

Competencies to be a Leader in Organizational Resilience

Business Resilience Decoded

Episode 33: "Competencies to be a Leader in Organizational Resilience" with Lynnda Nelson of ICOR. Contact Lynnda Nelson at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 33: "Competencies to be a Leader in Organizational Resilience" with Lynnda Nelson of ICOR. Contact Lynnda Nelson at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Crisis Management. Keeping A Company Strong in Times of Trouble

Disaster Recovery Journal

Companies generally prepare for emergencies by reviewing insurance policies, implementing back-up computer systems and installing sprinklers, while neglecting the human cost of a workplace crisis and its resulting impact on a company’s productivity. The post Crisis Management. Keeping A Company Strong in Times of Trouble appeared first on Disaster Recovery Journal.

article thumbnail

Disaster Recovery Planning in a VM Operating Environment

Disaster Recovery Journal

VM or Virtural Machine is an IBM operating system that runs on large scale IBM computers. Even though this article is directed to those who have VM, the methods and the thought process is the same for all systems. DEFINING DISASTER RECOVERY. System backup has generally been thought of as a tape management issue, with DASD being backed up to tape and then placed in storage.

article thumbnail

Brain Fog HQ: Memory Enhancement Techniques for Professional Development

Speaker: Chester Santos – Author, International Keynote Speaker, Executive Coach, Corporate Trainer, Memory Expert, U.S. Memory Champion

In October, scientists discovered that 75% of patients who experienced brain fog had a lower quality of life at work than those who did not. At best, brain fog makes you slower and less efficient. At worst, your performance and cognitive functions are impaired, resulting in memory, management, and task completion problems. In this entertaining and interactive presentation, Chester Santos, "The International Man of Memory," will assist you in developing life-changing skills that will greatly enha