September, 2019

article thumbnail

Do we need a bodyguard for Truth? 

Crisis Response Journal

In his latest blog, Matt Minshall, member of CRJ's Advisory Panel, asks the question: Has Freedom of Speech been hijacked as an excuse to lie? Civilisation is a veneer of value that differentiates humans from other life forms.

100
100
article thumbnail

6 Workplace Fire Prevention Tips

Alert Media

The post 6 Workplace Fire Prevention Tips appeared first on AlertMedia.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Email Fraud is a Top Business Risk for 2018

Behavior Group

Email fraud is a top risk for 2018, resulting in employee termination. Email Fraud Reports from Proofpoint and Clearswift show that businesses across the globe are concerned about email phishing campaigns. Today, two reports highlight that email phishing is a top concern for global businesses. However, a third of employees believe it is lack of… Continue reading.

article thumbnail

One Disaster Leads to Another: The Loss of Thomas Cook

Plan B Consulting

Following the recent news of Thomas Cook’s collapse, Charlie looks at one possible contribution to their failure. I am always sorry to see the demise of a company, especially a household name such as Thomas Cook. The loss of 9,000 jobs in the UK, another name off the high street, the repatriation of 150,000 holiday makers, and even my brother has been moaning that his Spring holiday to Turkey is cancelled and he will have to book with someone else.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

NexusTek Ranked Fourth on CRN’s 2019 Fast Growth 150 List

NexusTek

September 26, 2019 NexusTek Ranked Fourth on CRNs 2019 Fast Growth 150 List Highest ranking managed IT services provider recognized as one of the most innovative, fastest growing technology companies Denver, CO (September 26, 2019) NexusTek , a top national cloud, managed IT services and cyber security provider (MSP), today announced its rank as the fourth fastest-growing company on CRNs 2019 Fast Growth 150 list , the highest position of any MSP.

More Trending

article thumbnail

Stakeholder mapping: Untangling problems before, during and after a crisis 

Crisis Response Journal

Globalisation and the increasing interdependence of our societal systems are generating multiple levels of stakeholders that are a challenge to engage with in normal times but that become a nightmare to manage in a crisis.

article thumbnail

Inclement Weather Warnings: Customer Service and Marketing Go Hand in Hand

Prism International

Planning, training, and mock disaster exercises – Three key components of an effective disaster plan. Regardless of the size of a RIM provider or company service level, the ability to respond internally to the threat of disaster or a potential disaster is critical. One that is well documented, understood by all team members, and available for spontaneous implementation when needed.

article thumbnail

Risk and Information Systems Control, CRISC Certification. Get Ready

Behavior Group

Anyone interested in a career in risk assessment and interested to be a CISO, CIO, CFO, security director, chief compliance, risk manager and privacy officer professional check out the CRISC certification. CRISC Certification, Risk and Information Systems Control More than 25,000 people, since 2010, have earned the Certified in Risk and Information Systems Control (CRISC)… Continue reading.

article thumbnail

One Disaster Leads to Another: The Loss of Thomas Cook

Plan B Consulting

Following the recent news of Thomas Cook’s collapse, Charlie looks at one possible contribution to their failure. I am always sorry to see the demise of a company, especially a household name such as Thomas Cook. The loss of 9,000 jobs in the UK, another name off the high street, the repatriation of 150,000 holiday makers, and even my brother has been moaning that his Spring holiday to Turkey is cancelled and he will have to book with someone else.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

The 3 Elements of a Harmonious Organization

NexusTek

READ TIME: 3 MIN September 26, 2019 The 3 Elements of a Harmonious Organization Happy workers are more productive workers. So, treating them with care and respect will bring tangible benefits to your business. Here are three things to consider when building a harmonious organization (and a couple of quotes we pulled from Glassdoor): You have the right team in place.

B2C 52
article thumbnail

Pure Storage CloudSnap Integrates With Cloudian For Fast, Efficient Data Protection

Cloudian

Today at the Pure Storage user conference, Cloudian® announced the integration of its HyperStore® object storage platform with Pure Storage CloudSnap. This lets Pure users automatically move snapshot data between FlashArray and Cloudian, providing multiple cool benefits: Offloads Pure FlashArray Disk-based data repository for fast access On-prem for security, low-latency Exabyte scalable storage pool Policy-based, Read More.

article thumbnail

Major incident management: A lawyer's view 

Crisis Response Journal

CRJ was pleased to have been invited to the University of Wolverhampton’s Telford campus (CRJ Key Network Partner) to listen to renowned and acclaimed solicitor advocate, Mark Scoggins of Fisher Scoggins Waters, give his personal views and share his exper By Claire Sanders

article thumbnail

Insights into creating a successful Disaster Recovery Test – Part 3: Metrics

eBRP

Organizations with an active Disaster Recovery program conduct DR Tests to validate the Disaster Preparedness component of their IT Service Continuity strategies. Those exercises should validate – among other milestones – the overall recovery time (actual vs. planned RTO), completeness of DR plan documentation, level of preparedness among recovery team and the overall effectiveness of the DR response.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year

Behavior Group

Eighty percent of companies surveyed experienced a cybersecurity incident in the past year, the most common being malware attacks, according to the Better Security And Business Outcomes With Security Performance Management Report by Forrester Consulting. Businesses Experienced a Cybersecurity Incident, cybersecurity The security incidents affect customer privacy/safety the most — 54 percent report customers were… Continue reading.

article thumbnail

Where Do ISOs Come From?

Plan B Consulting

After spending a week observing a series of ISO meetings in Bangkok, Charlie shares his experience of how ISOs are developed. Is this a conundrum that has kept you awake at night for years or have you only just thought about it now, after being prompted by this bulletin? I am very familiar with ISO 22301, having helped PlanB Consulting and a number of other organisations get certified to the standard, as well as both PlanB Consulting and BC Training certified to ISO 9001.

article thumbnail

The Best Cyber Security Practices for Business

NexusTek

READ TIME: 3MIN September 26, 2019 The Best Cyber Security Practices for Business Do you think your business is flying under the radar of todays hackers? If youre in that mindset, then you would be making a big mistake. Small and medium businesses are increasingly being targeted by cybercriminals simply because most dont take the time to implement these cyber security best practices.

article thumbnail

Kawasaki Motors Speeds Up Internal Communications with AlertMedia

Alert Media

The post Kawasaki Motors Speeds Up Internal Communications with AlertMedia appeared first on AlertMedia.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The danger of heat and cold across Australia 

Crisis Response Journal

Cold temperatures are not nearly as deadly as heat, with around two per cent of all deaths in Australia related to the latter, according to new research from the University of Technology Sydney (UTS), writes Leilah Schubert.

article thumbnail

Insights into creating a successful Disaster Recovery Test – Part 2: Preparation

eBRP

Insights into creating a successful Disaster Recovery Test. Part 2 – DR Test Preparations. DR Tests are the only way to measure the effectiveness of a Disaster Recovery Program. Once the objectives of a DR Test are set, the preparation activities can begin. Test preparations include reviewing DR Plans for correctness, collaborating with the various stakeholders, identifying test metrics, and managing logistics.

article thumbnail

More Than 99% of Cyber-Threats Target Corporate Staff

Behavior Group

Over 99% of cyber-threats require human interaction to work, highlighting the importance of user awareness programs and layered defenses, according to Proofpoint. Cyber-Threats Target Corporate Staff The security vendor’s 2019 Human Factor report is based on an 18-month analysis of data the firm collected across its global customer base. It adds some concrete findings to… Continue reading.

article thumbnail

Where Do ISOs Come From?

Plan B Consulting

After spending a week observing a series of ISO meetings in Bangkok, Charlie shares his experience of how ISOs are developed. Is this a conundrum that has kept you awake at night for years or have you only just thought about it now, after being prompted by this bulletin? I am very familiar with ISO 22301, having helped PlanB Consulting and a number of other organisations get certified to the standard, as well as both PlanB Consulting and BC Training certified to ISO 9001.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Five Ways Hackers Can Hurt Your Business with Office 365

NexusTek

READ TIME: 1 MIN September 17, 2019 Five Ways Hackers Can Hurt Your Business with Office 365 Most small business leaders know that theyre vulnerable to hackers, but 47% of companies dont know the best methods for protecting themselves. If you dont know how to protect yourself, youre an easy target. In Small Biz Daily, NexusTek CTO, Randy Nieves, outlines five ways that hackers can disrupt your business via holes in Microsoft Office 365.

Malware 52
article thumbnail

Abandoned Records Case Study

Prism International

In a previous PRISM International blog, there was a discussion related to RIM providers responding to issues of abandoned records within a record center. As a follow-up to that discussion, it is important to address that it is not a matter of if – but a matter of when a record center and team will be faced with abandoned client records, and what to do when this happens.

article thumbnail

The Amazon Apocalypse? 

Crisis Response Journal

Highly publicised spats between international leaders, an emotive social media storm of condemnation, manipulated ideologies, misinformation, fake photos, fake news… What is the truth behind this year’s fires in the Amazon?

Media 100
article thumbnail

Insights into creating a successful Disaster Recovery exercise – Part 1: Objectives

eBRP

Part 1 – Determine Recovery Scope and Objectives (a Case Study). As a BCP/DR software solution provider, we are regularly called on to assist our enterprise customers with preparation, management and enhancement their DR Test and Exercises. This collaboration often provides opportunities to optimize and improve both organizations’ DR Program software implementation and usage.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Wikipedia hit by DDoS attack

Behavior Group

The site was taken down across Europe. The world’s most popular online encyclopaedia, Wikipedia, has suffered a severe DDoS (distributed denial of service) attack, which resulted with multiple servers across the globe going offline in different points in time. DDoS attack According to the company’s Twitter account, but also a subsequent press release, the attack… Continue reading.

article thumbnail

Will there be chaos and panic in the Bahamas after Dorian?

Plan B Consulting

Charlie looks at what lessons we can learn about responding to disasters, from Rebecca Solnit’s book: ‘A Paradise Built in Hell: The Extraordinary Communities That Arise in Disaster’ I have a strong interest in hurricanes having worked with a number of organisations in the Caribbean. This week I am on holiday (not in the Caribbean), and I have been reading ‘A Paradise Built in Hell: The Extraordinary Communities That Arise in Disaster’ by Rebecca Solnit.

article thumbnail

There is No Excuse for Ignoring Backup and Disaster Recovery

NexusTek

READ TIME: 5 MIN September 16, 2019 There is No Excuse for Ignoring Backup and Disaster Recovery Disaster strikes when we least expect it, and for the unprepared business, the consequences are dire. According to a survey conducted by IDC, 80% of small and medium-sized business (SMB) respondents reported that network downtime costs their organizations at least $20,000 per hour.