This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
As I write, the Covid-19 pandemic is ramping up in many countries. So is the response by academic authors. In 2015 Gaillard and Gomez published an interesting paper on the "disaster research gold rush". It was inspired by some thoughts expressed in 1967 by eminent sociologists of disaster on problems associated with researching transient events (Dynes et al. 1967).
In the first of a new series of blogs, CRJ Advisory Panel member Rob Fagan explains how you can enhance your professional development and training in all hazards understanding, crisis leadership, and global emergency management topics writ large on a cost By Robert Fagan
READ TIME: 3 MIN March 31, 2020 Three Ways to Motivate Your Remote Workforce With a third of Americans under a Stay-at-home order, many workplaces have gone to a complete work-from-home environment. This offers a great opportunity to focus on the positives and make the most from our remote predicament. Its easy to take for granted the value of having a conversation by the coffee machine or a firm handshake until it is not possible due to social distancing.
Plan activation – during this coronavirus pandemic, the majority of companies will be referring to either their business continuity plan or pandemic plan. The question I am discussing today is, w hen there is an issue which requires a Business Continuity Plan to be activated, who is responsible for the plan activation? Is it the Business Continuity team or the affected department?
Strengthen your operations with the Supply Chain Resilience Checklist. This practical, easy-to-use tool helps your organization prepare for disruptions and ensure long-term continuity in an unpredictable world. Why Download: Identify and assess critical supply chain risks Ask the right questions to evaluate vendor preparedness Implement effective strategies to reduce vulnerabilities Improve communication, transparency, and coordination across your network What You’ll Learn: How to evaluate and m
Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. malware, antivirus This is a dramatic increase from the year-long average of 35% for 2019 and points to the fact that obfuscated or evasive malware is becoming the rule, not the exception.… Continue reading.
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Evasive malware has grown to record high levels, with over two-thirds of malware detected by WatchGuard in Q4 2019 evading signature-based antivirus solutions. malware, antivirus This is a dramatic increase from the year-long average of 35% for 2019 and points to the fact that obfuscated or evasive malware is becoming the rule, not the exception.… Continue reading.
Once upon a time in Tuscany, when my son was very young, I lamented to a friend that all he seemed to have learned at school was how to swear and blaspheme. My friend put on a wise expression and said, very sagely, "David, you must remember that swearing and blaspheming are an ancient tradition in our countryside here." I mention this because, in AD 1244, a group of men in a bothy decided that they were swearing and blaspheming too much and each time they did it they would put a groat in a jar.
This week I look at panic buying and what lessons we can identify from the ongoing COVID-19 outbreak to help prevent this in the future. When I talk to Jacqui Semple, Head of the EPS and Resilience Lead at Angus Council, about incidents and the lessons learned from them, she always corrects me by saying they are ‘lessons identified’. She says that more often than not, the lesson identified in one incident is forgotten by the next one.
How To Prepare For A Strong Recovery From COVID-19. Pete O'Dell. March 29, 2020. Share on facebook. Share on linkedin. Share on twitter. Share on email. The world is in free fall and people are confused. The Covid-19 pandemic has caused many to speculate when the infection will peak. And when the world can begin to recover from this major event. Early predictions of a pandemic were ignored, but things will recover, and you need to be ready.
Plan activation – during this coronavirus pandemic, the majority of companies will be referring to either their business continuity plan or pandemic plan. The question I am discussing today is, w hen there is an issue which requires a Business Continuity Plan to be activated, who is responsible for the plan activation? Is it the Business Continuity team or the affected department?
Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.
READ TIME: 6 MIN March 25, 2020 6 Ways Microsoft is Empowering Your Remote Employees Due to the threat and spread of the coronavirus (COVID-19), U.S. state governments and businesses across the country are mandating that their employees work from home. With the increasing prevalence of a mobile and digitized workforce, taking such measures to equip employees can be fairly seamless and offers a negligible impact on conducting business as usual.
A few months ago, a global pandemic with the capacity to bring the world to a standstill was almost unthinkable. Yet, here we are. Those with high-level business continuity plans in place will be putting elements of these into action. For many, however, it is time to dust off what plans they have and update them to take account of the current threats.
The global spread of the COVID-19 coronavirus has had a notable impact on workplaces worldwide, and many organizations are encouraging employees to work from home. What are the cybersecurity implications of this shift? cybersecurity, working remotely Having a sizable amount of employees suddenly working remotely can be a major change for organizations and presents numerous… Continue reading.
This week I look at panic buying and what lessons we can identify from the ongoing COVID-19 outbreak to help prevent this in the future. When I talk to Jacqui Semple, Head of the EPS and Resilience Lead at Angus Council, about incidents and the lessons learned from them, she always corrects me by saying they are ‘lessons identified’. She says that more often than not, the lesson identified in one incident is forgotten by the next one.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
I recently received a series of text messages from my 28-year-old son who lives in New York City. He was asking whether he should stock up on food and water in case NYC gets quarantined due to the coronavirus. Frankly, I found his question a bit strange. Just the day before, I listened to a press conference with the New York governor, the NYC mayor and other public health officials.
READ TIME: 6 MIN March 18, 2020 The Other Pandemic COVID-19 Phishing Cybercrime is an ongoing issue today, even in a state of a global pandemic. Phishing, malware and ransomware attempts are becoming more disguised and believable each day. Oftentimes, cybercriminals use current events to increase response to phishing campaigns. If you have had any conversations, watched television, or been outside your home then you are aware of the latest pandemic, the COVID-19.
Welcome to our March Ransomware Recap! In this monthly series, we discuss a few of the biggest ransomware stories. Let’s jump in. Nemty Ransomware Posts Victims Stolen Data as Punishment. Nemty Ransomware has created a data leak site to publish information of victims who do not pay ransoms. This information can include financials, personal information of employees, client data and more.
April is Workplace Violence Prevention Awareness Month. Enhance your organization’s emergency preparedness with our Active Shooter Tabletop Exercise. Download now to strategically plan, prepare, and test your response to active shooter situations. Key Features: Plan, prepare, and test your emergency response strategy. Simulate real-world scenarios to mitigate risks.
New research revealed that while over half of organizations use artificial intelligence (AI) or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings verified by humans over AI. security professionals, artificial intelligence (AI), cybersecurity, Cybersecurity Findings Verified by Humans over AI WhiteHat Security released the results of its… Continue reading.
This week I mark the six elements of the business continuity lifecycle out of 10, based on their effectiveness during the COVID-10 outbreak. As coronavirus continues to spread apace and it is announced that schools in the UK will be closed down today, I thought I would do a bit of a review and see how well business continuity stands up when faced with a real incident.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
READ TIME: 7 MIN March 10, 2020 The Secret Behind an Efficient Remote Workforce Is your business prepared in the event of a disaster or pandemic forcing its staff to work remotely? Lets not play to the fear of these potential events, but rather the challenges that your business needs to overcome when preparing for these disasters. The challenges that many businesses are facing when developing their remote workforce options within their Business Continuity Plan (BCP) is determining what remote so
The past years have seen a dramatic escalation in cybersecurity threats. According to a report by The New York Times, more than 200,000 organizations were attacked with ransomware in 2019, a 41% rise from the year before. To help you protect yourself, we’ve compiled a list of important data security settings that are often overlooked. […].
Nearly two-thirds of healthcare organizations globally have experienced a cyberattack in their lifetime, while 53 percent were attacked within the last 12 months, according to new research by Keeper Security. Healthcare Organizations Have Experienced Cyberattacks, cybersecurity, healthcare These findings derived from Keeper Security’s 2019 Global State of Cybersecurity in Small and Medium-Sized Businesses report, conducted… Continue reading.
This week I mark the six elements of the business continuity lifecycle out of 10, based on their effectiveness during the COVID-10 outbreak. As coronavirus continues to spread apace and it is announced that schools in the UK will be closed down today, I thought I would do a bit of a review and see how well business continuity stands up when faced with a real incident.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Episode 42: "20 Years in the Making" with Cheyene Marling and Alicia Stevens of BC Management, Powered by Avalution Contact Cheyene Marling and Alicia Stevens at: [link] [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 42: "20 Years in the Making" with Cheyene Marling and Alicia Stevens of BC Management, Powered by Avalution Contact Cheyene Marling and Alicia Stevens at: [link] [link] [link] [link] Business Resilience Decoded: www.drj.com/decod
READ TIME: 4 MIN March 4, 2020 Coronavirus and the Need for a Remote Workforce Failover Plan For some businesses, the Coronavirus is requiring them to take a deep dive into remediation options if the pandemic was to effect their workforce or local community. Options to travel, have in-person meetings and even in-office contact (like handshakes) may need to become regulated and monitored for your business.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content