August, 2019

article thumbnail

Is it Possible to Keep Up with the Literature?

Emergency Planning

I am the founding editor of the International Journal of Disaster Risk Reduction (IJDRR), which began publishing in August 2012 with just four papers. Seven years later, the submission rate is equivalent to about 1,500 manuscripts per year (although the rejection rate is over 80 per cent). Two years ago, the journal published its first issue to contain 100 papers.

article thumbnail

The disability programme trying to bridge the disconnect between talent and acquisition 

Crisis Response Journal

A new UK aid-funded programme directed by Sightsavers in collaboration with various cross-sector partners, has set out to overcome employment barriers that prevent millions of people with disabilities from accessing employment.

100
100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Can You (or Your Staff) Identify a Scam Call?

NexusTek

READ TIME: 2 MIN August 30, 2019 Can You (or Your Staff) Identify a Scam Call? As you already know hackers are clever. Theyre utilizing new technology to steal from businesses like yours. One of todays trending cyber security threats are scam calls. Often sounding like theyre from reputable sources like your bank or even Google! The following are a few examples of the most current scam calls.

Banking 52
article thumbnail

Lessons Learned from British Airways: Emergency Landing in Valencia

Plan B Consulting

This week Charlie looks at what lessons we can learn from British Airways’ recent emergency landing at Valencia Airport. One of the problems of being a consultant is that you rarely get the opportunity to actually manage or participate in the response to an incident. Instead you spend your life telling people how they should respond. To learn from other’s experiences and to keep yourself up-to-date, you have to constantly read articles, attend conferences and listen to presentations and we

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

Information Systems Auditor, CISA Certification. Get Ready

Behavior Group

Anyone interested in a career in information systems audit and interested to be an information systems audit, control and security professional check out the CISA certification. CISA Certification, Information Systems Auditor If you have experience as an information systems auditor and want to move up (or over), consider acquiring the Certified Information Systems Auditor (CISA)… Continue reading.

Audit 52

More Trending

article thumbnail

Mass Shootings: Reassuring Children After a Traumatic Event

National Center for Disaster Prepardness

America is reckoning with two new mass shootings, one in Dayton, Ohio and the other in El Paso, Texas – believed to be the eighth deadliest in modern U.S. history. While processing the constant stream of disturbing media, parents must also anticipate the needs of their children by helping them process the upsetting news. As a pediatrician and director of Columbia University’s National Center for Disaster Preparedness, I am offering some guidelines on how adults can speak to, comfort, and console

article thumbnail

Problem pests – vicious vectors 

Crisis Response Journal

With the rise in temperature over the summer months comes an increase in the number of flying insects that can make their way into homes, onto food and on car windscreens. In everyday life, they are simply an annoyance.

100
100
article thumbnail

5 Signs You’re Organization is Overdue for a Storage Assessment

NexusTek

READ TIME: 2 MIN August 30, 2019 5 Signs Youre Organization is Overdue for a Storage Assessment Hiding inside your current data centers could be legacy storage equipment waiting to fail at the worst possible time. Older storage devices struggle to handle todays increased data workloads and access requirements. If thats true, where will you be 5-years from now?

article thumbnail

Lessons Learned from British Airways: Emergency Landing in Valencia

Plan B Consulting

This week Charlie looks at what lessons we can learn from British Airways’ recent emergency landing at Valencia Airport. One of the problems of being a consultant is that you rarely get the opportunity to actually manage or participate in the response to an incident. Instead you spend your life telling people how they should respond. To learn from other’s experiences and to keep yourself up-to-date, you have to constantly read articles, attend conferences and listen to presentations and we

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

More Than 4.1 Billion Records Exposed in 2019

Behavior Group

More than 3,800 data breaches were reported from January through June 30, exposing over 4.1 billion records, according to the 2019 MidYear Data Breach Quickview Report. Records Exposed in 2019,passwords, breaches Compared to midyear of 2018, the number of reported breaches was up 54 percent and the number of exposed records was up 52 percent.… Continue reading.

article thumbnail

5 Gaps in Your Lone Worker Safety Program [Webinar Recap]

Alert Media

The post 5 Gaps in Your Lone Worker Safety Program [Webinar Recap] appeared first on AlertMedia.

article thumbnail

5 Strategies On How Your Brand Should Handle A Product Recall

Marketpoint Recall

It's the moment brands dread: one of your company's products has been recalled for health concerns, inaccurate marketing, defective operation or any of a number of reasons, that are, at the surface, wholly negative. One has to look no further than the Samsung Galaxy 7 Note recall , which has been described as "the biggest debacle to happen the smartphone market in the last decade.

article thumbnail

Bullets or bacterium – in pursuit of the forgotten school intruder 

Crisis Response Journal

David P Perrodin, PhD, examines how the shadow of superbugs - a host of tiny, unseen enemies - could be a far greater danger than security threats to schools than many people currently perceive.

Security 100
article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

What is The Forrester Wave?

NexusTek

READ TIME: 1 MIN August 30, 2019 At NexusTek, were devoted to working with the best and brightest technology partners. Thats why were proud announce that one of our cyber security partners Barracuda, was recently named in The Forrester Wave report as a leader in Enterprise Email Security. What is The Forrester Wave? Published by Forrester Research, Inc., The Forrester Wave is a guide for buyers considering their purchasing options in a technology marketplace.

article thumbnail

Part 2: Plans! Huh! Good God! What Are They Good For?

Plan B Consulting

In Part 2 of Charlie’s blogs on Business Continuity Plans, he looks at the different audiences and how we can develop future plans. In last week’s bulletin we looked at what plans are for and the different purposes of business continuity and crisis management plans. Today we will look at who the different audiences are and I will share some personal thoughts on how I am looking to develop future plans.

article thumbnail

Human Factor is a Persistent Cybersecurity Threat

Behavior Group

A new survey says that people consider malicious insiders (30 percent) and human error (25 percent) to be the two top cybersecurity threats.” Cybersecurity Threat, malware and ransomware According to the Canon Office of the Future survey, malware and ransomware are other pertinent cybersecurity threats. More than one-third of respondents consider malware and ransomware a… Continue reading.

article thumbnail

AlertMedia Ranks No. 285 on 2019 Inc. 5000 List; Named 3rd Fastest-Growing Software Company in Texas

Alert Media

The post AlertMedia Ranks No. 285 on 2019 Inc. 5000 List; Named 3rd Fastest-Growing Software Company in Texas appeared first on AlertMedia.

52
article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Record Abandonment -Identify RIM Provider Alternatives?

Prism International

Who pays the bill when the company declares bankruptcy? When a practitioner retires and/or meets an untimely death–who pays the RIM service invoice? What about the outstanding invoices when a practitioner closes a “single practitioner” office and joins a large consortium practice or medical school? As an example, who pays the invoice for those boxes of records sitting on a shelf in the record center (when he indicates he no longer needs them)?

article thumbnail

Wildfire Risks Due to Global Warming

Disaster Recovery

The Conventional Effects of Global Warming. Melting glaciers. Severe droughts. Rising sea levels. Heat waves. More pests and disease outbreaks. While global warming is a relatively well known phenomenon, the damage and impact they can cause to our surroundings are still taking us by surprise. Today, even localities traditionally known for humid climate are becoming prone to wildfire risks.

article thumbnail

The Future of Safety and Emergency Response

Business Resilience Decoded

Episode 28: "The Future of Safety and Emergency Response" with Greg Artzt of Punch Technologies, Inc. Contact Greg Artzt at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 28: "The Future of Safety and Emergency Response" with Greg Artzt of Punch Technologies, Inc. Contact Greg Artzt at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

Part 2: Plans! Huh! Good God! What Are They Good For?

Plan B Consulting

In Part 2 of Charlie’s blogs on Business Continuity Plans, he looks at the different audiences and how we can develop future plans. In last week’s bulletin we looked at what plans are for and the different purposes of business continuity and crisis management plans. Today we will look at who the different audiences are and I will share some personal thoughts on how I am looking to develop future plans.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

British Airways under fire for leaking passenger info in links

Behavior Group

British Airways has come under fire from the security community again, this time after a vulnerability in its e-ticketing system was found to be exposing passenger’s personal information leaking passenger info in links Security firm Wandera claimed in a blog post yesterday that the airline was sending out unencrypted check-in links to customers which contained… Continue reading.

article thumbnail

How GSC Logistics Uses Emergency Communications to Keep Their Business Moving

Alert Media

The post How GSC Logistics Uses Emergency Communications to Keep Their Business Moving appeared first on AlertMedia.

article thumbnail

Dentists Nationwide Victimized by REvil Ransomware as Hackers Attack Cavity in DDS Safe

NexusTek

READ TIME: 2 MIN August 29, 2019 Dentists Nationwide Victimized by REvil Ransomware as Hackers Attack Cavity in DDS Safe According to ZDNet , hundreds of dentists offices in the US were attacked by cyber criminals this past weekend. A ransomware gang targeted and compromised DDS Safe, a medical records retention and backup solution used by dental offices across the country.

article thumbnail

Deadly extreme weather is the new normal

National Center for Disaster Prepardness

This piece was originally published on May 23, 2019 in The Hill. . The extreme weather events this week in the Midwest are both alarming and tragic. It is estimated that at least 30 tornados touched down in Kansas, Missouri and elsewhere on Tuesday alone. Unfortunately, there have also been at least four fatalities with more injuries reported. Flooding has also been an outsized consequence of these storms.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

The Future of Safety and Emergency Response

Business Resilience Decoded

Episode 28: "The Future of Safety and Emergency Response" with Greg Artzt of Punch Technologies, Inc. Contact Greg Artzt at: [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 28: "The Future of Safety and Emergency Response" with Greg Artzt of Punch Technologies, Inc. Contact Greg Artzt at: [link] [link] [link].

article thumbnail

Brexit: Baa Humbug

Plan B Consulting

Charlie looks at a different aspect of the effects of a no-deal Brexit. This week my brother Alex got top price for Cheviot Lambs at Stirling Auction Mart. I also went for a run and listened to the BBC Sounds podcast ‘Beyond Today – No deal: what’s going to happen to our food?’ Inspired by these two things, I thought I would write this week’s bulletin on sheep farming and the effects of a no-deal Brexit.

article thumbnail

Why your workforce is the only way to plug your information security gaps

Behavior Group

Tips on how your staff can help prevent information security gaps.” information security gaps, security and privacy Information security is no longer just an IT issue. In fact, companies are finding themselves having to protect not only their own digital boundaries, but those of their suppliers and customers because of the complexity of the modern… Continue reading.