This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In his latest blog, Matt Minshall, member of CRJ's Advisory Panel, asks the question: Has Freedom of Speech been hijacked as an excuse to lie? Civilisation is a veneer of value that differentiates humans from other life forms.
Email fraud is a top risk for 2018, resulting in employee termination. Email Fraud Reports from Proofpoint and Clearswift show that businesses across the globe are concerned about email phishing campaigns. Today, two reports highlight that email phishing is a top concern for global businesses. However, a third of employees believe it is lack of… Continue reading.
Following the recent news of Thomas Cook’s collapse, Charlie looks at one possible contribution to their failure. I am always sorry to see the demise of a company, especially a household name such as Thomas Cook. The loss of 9,000 jobs in the UK, another name off the high street, the repatriation of 150,000 holiday makers, and even my brother has been moaning that his Spring holiday to Turkey is cancelled and he will have to book with someone else.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
September 26, 2019 NexusTek Ranked Fourth on CRNs 2019 Fast Growth 150 List Highest ranking managed IT services provider recognized as one of the most innovative, fastest growing technology companies Denver, CO (September 26, 2019) NexusTek , a top national cloud, managed IT services and cyber security provider (MSP), today announced its rank as the fourth fastest-growing company on CRNs 2019 Fast Growth 150 list , the highest position of any MSP.
When it comes to Business Continuity Plan testing, we should all consider Finagle’s Law. Similar to Murphy’s Law, Finagle’s agrees that anything that can go wrong will go wrong. But it adds a twist: that it will happen at the worst possible time. In the world of information security, it’s an axiom for us to live by. Because, although it may sound homespun and out of kilter with today’s techno jargon, it reminds us of what is important (and often overlooked) when it comes to Business Continuity p
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
When it comes to Business Continuity Plan testing, we should all consider Finagle’s Law. Similar to Murphy’s Law, Finagle’s agrees that anything that can go wrong will go wrong. But it adds a twist: that it will happen at the worst possible time. In the world of information security, it’s an axiom for us to live by. Because, although it may sound homespun and out of kilter with today’s techno jargon, it reminds us of what is important (and often overlooked) when it comes to Business Continuity p
Globalisation and the increasing interdependence of our societal systems are generating multiple levels of stakeholders that are a challenge to engage with in normal times but that become a nightmare to manage in a crisis.
Planning, training, and mock disaster exercises – Three key components of an effective disaster plan. Regardless of the size of a RIM provider or company service level, the ability to respond internally to the threat of disaster or a potential disaster is critical. One that is well documented, understood by all team members, and available for spontaneous implementation when needed.
Anyone interested in a career in risk assessment and interested to be a CISO, CIO, CFO, security director, chief compliance, risk manager and privacy officer professional check out the CRISC certification. CRISC Certification, Risk and Information Systems Control More than 25,000 people, since 2010, have earned the Certified in Risk and Information Systems Control (CRISC)… Continue reading.
Following the recent news of Thomas Cook’s collapse, Charlie looks at one possible contribution to their failure. I am always sorry to see the demise of a company, especially a household name such as Thomas Cook. The loss of 9,000 jobs in the UK, another name off the high street, the repatriation of 150,000 holiday makers, and even my brother has been moaning that his Spring holiday to Turkey is cancelled and he will have to book with someone else.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
READ TIME: 3 MIN September 26, 2019 The 3 Elements of a Harmonious Organization Happy workers are more productive workers. So, treating them with care and respect will bring tangible benefits to your business. Here are three things to consider when building a harmonious organization (and a couple of quotes we pulled from Glassdoor): You have the right team in place.
Today at the Pure Storage user conference, Cloudian® announced the integration of its HyperStore® object storage platform with Pure Storage CloudSnap. This lets Pure users automatically move snapshot data between FlashArray and Cloudian, providing multiple cool benefits: Offloads Pure FlashArray Disk-based data repository for fast access On-prem for security, low-latency Exabyte scalable storage pool Policy-based, Read More.
CRJ was pleased to have been invited to the University of Wolverhampton’s Telford campus (CRJ Key Network Partner) to listen to renowned and acclaimed solicitor advocate, Mark Scoggins of Fisher Scoggins Waters, give his personal views and share his exper By Claire Sanders
Organizations with an active Disaster Recovery program conduct DR Tests to validate the Disaster Preparedness component of their IT Service Continuity strategies. Those exercises should validate – among other milestones – the overall recovery time (actual vs. planned RTO), completeness of DR plan documentation, level of preparedness among recovery team and the overall effectiveness of the DR response.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Eighty percent of companies surveyed experienced a cybersecurity incident in the past year, the most common being malware attacks, according to the Better Security And Business Outcomes With Security Performance Management Report by Forrester Consulting. Businesses Experienced a Cybersecurity Incident, cybersecurity The security incidents affect customer privacy/safety the most — 54 percent report customers were… Continue reading.
After spending a week observing a series of ISO meetings in Bangkok, Charlie shares his experience of how ISOs are developed. Is this a conundrum that has kept you awake at night for years or have you only just thought about it now, after being prompted by this bulletin? I am very familiar with ISO 22301, having helped PlanB Consulting and a number of other organisations get certified to the standard, as well as both PlanB Consulting and BC Training certified to ISO 9001.
READ TIME: 3MIN September 26, 2019 The Best Cyber Security Practices for Business Do you think your business is flying under the radar of todays hackers? If youre in that mindset, then you would be making a big mistake. Small and medium businesses are increasingly being targeted by cybercriminals simply because most dont take the time to implement these cyber security best practices.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
Cold temperatures are not nearly as deadly as heat, with around two per cent of all deaths in Australia related to the latter, according to new research from the University of Technology Sydney (UTS), writes Leilah Schubert.
Insights into creating a successful Disaster Recovery Test. Part 2 – DR Test Preparations. DR Tests are the only way to measure the effectiveness of a Disaster Recovery Program. Once the objectives of a DR Test are set, the preparation activities can begin. Test preparations include reviewing DR Plans for correctness, collaborating with the various stakeholders, identifying test metrics, and managing logistics.
Over 99% of cyber-threats require human interaction to work, highlighting the importance of user awareness programs and layered defenses, according to Proofpoint. Cyber-Threats Target Corporate Staff The security vendor’s 2019 Human Factor report is based on an 18-month analysis of data the firm collected across its global customer base. It adds some concrete findings to… Continue reading.
After spending a week observing a series of ISO meetings in Bangkok, Charlie shares his experience of how ISOs are developed. Is this a conundrum that has kept you awake at night for years or have you only just thought about it now, after being prompted by this bulletin? I am very familiar with ISO 22301, having helped PlanB Consulting and a number of other organisations get certified to the standard, as well as both PlanB Consulting and BC Training certified to ISO 9001.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
READ TIME: 1 MIN September 17, 2019 Five Ways Hackers Can Hurt Your Business with Office 365 Most small business leaders know that theyre vulnerable to hackers, but 47% of companies dont know the best methods for protecting themselves. If you dont know how to protect yourself, youre an easy target. In Small Biz Daily, NexusTek CTO, Randy Nieves, outlines five ways that hackers can disrupt your business via holes in Microsoft Office 365.
In a previous PRISM International blog, there was a discussion related to RIM providers responding to issues of abandoned records within a record center. As a follow-up to that discussion, it is important to address that it is not a matter of if – but a matter of when a record center and team will be faced with abandoned client records, and what to do when this happens.
Highly publicised spats between international leaders, an emotive social media storm of condemnation, manipulated ideologies, misinformation, fake photos, fake news… What is the truth behind this year’s fires in the Amazon?
Part 1 – Determine Recovery Scope and Objectives (a Case Study). As a BCP/DR software solution provider, we are regularly called on to assist our enterprise customers with preparation, management and enhancement their DR Test and Exercises. This collaboration often provides opportunities to optimize and improve both organizations’ DR Program software implementation and usage.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
The site was taken down across Europe. The world’s most popular online encyclopaedia, Wikipedia, has suffered a severe DDoS (distributed denial of service) attack, which resulted with multiple servers across the globe going offline in different points in time. DDoS attack According to the company’s Twitter account, but also a subsequent press release, the attack… Continue reading.
Charlie looks at what lessons we can learn about responding to disasters, from Rebecca Solnit’s book: ‘A Paradise Built in Hell: The Extraordinary Communities That Arise in Disaster’ I have a strong interest in hurricanes having worked with a number of organisations in the Caribbean. This week I am on holiday (not in the Caribbean), and I have been reading ‘A Paradise Built in Hell: The Extraordinary Communities That Arise in Disaster’ by Rebecca Solnit.
READ TIME: 5 MIN September 16, 2019 There is No Excuse for Ignoring Backup and Disaster Recovery Disaster strikes when we least expect it, and for the unprepared business, the consequences are dire. According to a survey conducted by IDC, 80% of small and medium-sized business (SMB) respondents reported that network downtime costs their organizations at least $20,000 per hour.
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content