November, 2019

article thumbnail

Scenario of the Month: An Ice-Storm Wrecks Havoc

Disaster Preparedness

Melted Fiber-optic Cable. It is Mid-November. After a week of above-average temperatures and some heavy rain. A massive cold front has moved into your area causing an ice-storm and covering everything in layers of ice. The Mayor has declared a local State-of-Emergency and has asked everyone to stay home and off the roads for safety and clean-up. A fire has broken out downtown at an underground sub-station causing both a power outage and melting of fiber-optic cables impacting the internet and 91

Outage 130
article thumbnail

Is Your Org "Not Ready" for Business Continuity?

Alternative Resiliency Services Corp

“We’re not mature enough yet.” “Not in the budget.” “Priorities, we’re way too busy right now.” “People can work from home – we’re good.” Many companies have seemingly valid reasons to delay or defer setting up a Business Continuity Program. There are always more pressing issues.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Conference for forward thinking in crisis management 

Crisis Response Journal

Crisis management professionals are invited to attend a unique international emergency management conference to be held at the Bluepoint Conference Centre in Brussels, Belgium on February 19-20, 2020. And it's free to attend!

article thumbnail

Prevent the Disaster, Forget the Recovery

Disaster Recovery Journal

Personal crystal balls are notoriously bad at predicting the future. They run on small number statistics, have ill-defined parameters, and small data banks incorporating elastic memories. The crystal balls are plagued or programmed with a logic that is The post Prevent the Disaster, Forget the Recovery appeared first on Disaster Recovery Journal.

Banking 100
article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

New Data Predicts Unprecedented Levels of Holiday Hacking

Behavior Group

A new report (…) predict unprecedented levels of online data theft this holiday season due to a lack of deployed client-side security measures. Holiday Hacking, data theft,security measures, attacks The State of the Web Report highlights the widespread vulnerability resulting from integrations that enable and enhance website functionality. These integrations, which exist on nearly every… Continue reading.

More Trending

article thumbnail

How Azure is Improving Business Worldwide

NexusTek

READ TIME: 3 MIN November 26, 2019 How Azure is Improving Business Worldwide Your companys data is a ticket to its success. Immediate access as well as protecting and securing that data is at the top of the priority list. NexusTeks Microsoft Gold status and being a Microsoft Azure certified partner ensures that you have a technology partner that can handle your data in a responsible fashion.

article thumbnail

How AlertMedia Can Help You Keep Your Workforce Safe This Winter

Alert Media

The post How AlertMedia Can Help You Keep Your Workforce Safe This Winter appeared first on AlertMedia.

article thumbnail

The role of eLearning in crisis resilience 

Crisis Response Journal

It’s time to add eLearning to your crisis preparedness programme writes Caroline Sapriel of CS and A International, a global risk, crisis and business continuity management consultancy.

article thumbnail

When Disaster Strikes: Disaster Recovery Planning can make the difference Corporate Survival

Disaster Recovery Journal

It could be as innocent as a construction crew accidentally cutting through an underground stone wall that holds back a river. Or as sinister as a terrorist bombing of a skyscraper. Or as sudden as an earthquake. Or as devastating as a hurricane. The reality is that any business that relies on information technology, which includes most businesses, needs a disaster-recovery plan.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

The Benefits of Training Employees to Hack

Behavior Group

For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Training Employees to Hack For most corporate denizens, security training is an unpleasant but necessary evil, but does it have to be? Not according to Kris Martel, CISO of Imagine IT, who uses a highly interactive approach… Continue reading.

article thumbnail

Resilience Training For Schools And Organisations

Beaumont Resilience Training

We’re currently working on this blog post and it will be live very soon. The post Resilience Training For Schools And Organisations appeared first on Resilience Training.

article thumbnail

How To Guarantee Expense Deductions By The End of 2019

NexusTek

READ TIME: 2 MIN November 25, 2019 How To Guarantee Expense Deductions By The End of 2019 In 2019, the Section 179 Tax Deduction allows small businesses to write off up to one million dollars from equipment purchased during 2019. This includes, but is not limited to: Servers Desktops/ Laptops Software considered off the shelf Phone systems and equipment Does My Business Qualify?

article thumbnail

A Century of Healthcare Data

Cloudian

The need for a lasting storage infrastructure By Neil Stobart, Cloudian Vice President of Global Sales Engineering This post was originally written for HPE TECHnative. The ongoing data deluge is affecting virtually all industries, but perhaps nowhere is this issue having more impact than in healthcare. Due to a combination of factors, the use of. Read More.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

The threat of pandemics 

Crisis Response Journal

What did you do this weekend? How did you fill that 48 hours? The weekly shop maybe, sports sessions for children, household chores, socialising or simply catching up on some rest?

Pandemic 100
article thumbnail

Contingency Planning Cycle

Disaster Recovery Journal

You attend a seminar on contingency planning and hear presentations such as “developing and maintaining your plan”, “testing your plan”, “business impact assessments”, and “lessons learned” from other people’ The post Contingency Planning Cycle appeared first on Disaster Recovery Journal.

article thumbnail

How to Achieve Cybersecurity with Patience, Love and Bribery

Behavior Group

Your five-year-old hears the doorbell ring just after you’ve jumped in the shower. They’ve been trained by your example to answer the door when they hear the bell, but are a bit too young to have had the “never answer the door unless I’m with you” talk. The man at the door is dressed in… Continue reading. The post How to Achieve Cybersecurity with Patience, Love and Bribery appeared first on Behaviour Portugal.

article thumbnail

Welcome To Resilience Training

Beaumont Resilience Training

We’re currently working on this blog post and it will be live very soon. The post Welcome To Resilience Training appeared first on Resilience Training.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

NexusTek Achieves Triple Crown Status for 2019

NexusTek

November 19, 2019 NexusTek Achieves Triple Crown Status for 2019 CRN Recognizes Exceptional IT Solution Providers in North America Denver, CO (November 19, 2019) NexusTek , a top national cloud, managed IT services and cyber security provider (MSP), today announced its recognition as one of CRNs 2019 Triple Crown Award winners. Now in its sixth year, the Triple Crown Award recognizes solution providers that outshine their IT channel peers.

article thumbnail

4 Tips to Ensure Corporate Travel Security

Alert Media

The post 4 Tips to Ensure Corporate Travel Security appeared first on AlertMedia.

Travel 52
article thumbnail

What are the two most vital elements for sustained good health? 

Crisis Response Journal

Ruth Wozencroft of CRJ Key Network Partner, Q-bital Healthcare Solutions, tells us that on the face of it, the answer is simple – clean air and clean water.

article thumbnail

DR: How Do You Pay For It?

Disaster Recovery Journal

One aspect of disaster planning that seems somewhat overlooked is the question, How do you fund the recovery efforts? Recovering from a disaster requires a lot of unbudgeted funds which must be spent or committed very quickly The post DR: How Do You Pay For It? appeared first on Disaster Recovery Journal.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

Behavior Group

Skyrocketing data breaches bring incalculable losses to organizations and can cost cybersecurity executives their jobs. Places Where Hackers Are Stealthily Stealing Your Data, cybersecurity, attacks Here we examine the top five places in 2019 where cybercriminals are stealing corporate and government data without ever getting noticed and then learn how to avoid falling victim to… Continue reading.

article thumbnail

What Goes Into a Cyber Data Risk Assessment?

Plan B Consulting

Charlie proposes an inventory of information which your organisation should consider to conduct a cyber data risk assessment. This week, I was conducting an exercise for a government organisation. As we have worked with the company for a number of years we decided to go for a slightly different set-up, so this time we used loss-of-data as the scenario.

Banking 52
article thumbnail

5 Tips for Failure-Proofing Your Business Continuity and Disaster Recovery Plans

NexusTek

READ TIME: 4 MIN November 11, 2019 5 Tips for Failure-Proofing Your Business Continuity and Disaster Recovery Plans In a day and age where IT downtime costs $20,000 an hour, SMBs cant afford to leave disaster recovery planning to chance. Recently, we talked about various threats SMBs face from natural disasters and cyberthreats to day-to-day hardware failures.

article thumbnail

Four Steps To Prepare Your Business For Winter

Alert Media

The post Four Steps To Prepare Your Business For Winter appeared first on AlertMedia.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Competencies to be a Leader in Organizational Resilience

Business Resilience Decoded

Episode 33: "Competencies to be a Leader in Organizational Resilience" with Lynnda Nelson of ICOR. Contact Lynnda Nelson at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 33: "Competencies to be a Leader in Organizational Resilience" with Lynnda Nelson of ICOR. Contact Lynnda Nelson at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Crisis Management. Keeping A Company Strong in Times of Trouble

Disaster Recovery Journal

Companies generally prepare for emergencies by reviewing insurance policies, implementing back-up computer systems and installing sprinklers, while neglecting the human cost of a workplace crisis and its resulting impact on a company’s productivity The post Crisis Management. Keeping A Company Strong in Times of Trouble appeared first on Disaster Recovery Journal.

article thumbnail

Cybersecurity workforce skills gap rises to over 4 million

Behavior Group

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. The data indicates a necessary cybersecurity workforce increase of 145% globally. cybersecurity Cybersecurity workforce skills gap around the world In the UK, the current cybersecurity workforce… Continue reading.