This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A report illustrates how cyber criminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue opportunities. Phishing Attacks “The Retail and eCommerce Threat Landscape Report (October 2018), notes a 297 percent rise in the number of false retailer websites designed to “phish” for customer… Continue reading.
This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.
An increasing number of recalls that appear in the media these days have one common factor: the companies involved just weren’t ready. A product recall can be one of the most detrimental events for a company and can have overwhelming consequences for both the company, its customers and the brand. That is why having an experienced partner, a robust, up-to-date recall plan, and access to global communication channels, is so critically important in a crisis situation.
As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R
Why the Business Impact Analysis is Challenging for an Organization with Constant Changes Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).
Signup to get articles personalized to your interests!
Continuity Professional Pulse brings together the best content for business continuity professionals from the widest variety of industry thought leaders.
Seventy-five percent of professionals pose a moderate or severe risk to their company’s data, says (…) third-annual State of Privacy and Security Awareness Report, which also found that workers in the financial sector are more likely to be a risk with 85 percent of survey respondents falling into one of the two risk categories. Employees… Continue reading.
This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.
Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.
During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.
Why the Business Impact Analysis is Challenging for an Organization with Constant Changes. Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).
Whaling, impersonating CEOs and compromising executives’ business emails are all ways that hackers are targeting those at the top. Cyberattacks, impersonation attacks, whaling attack Phishing is big business for criminals. But as targeted phishing campaigns, known as spear-phishing, continue to evolve, hackers don’t seem to be satisfied with small fish, aiming more often than ever… Continue reading.
This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.
Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link].
Security talent is in high demand, but it doesn’t have to stay that way. Cybersecurity is top of mind for organizations everywhere, yet the talent pool to fill these much-needed positions just isn’t there. In fact, according to a 2017 survey by ISACA’s Cybersecurity Nexus, only 13 percent of organizations surveyed received more than 20… Continue reading.
AT THE END of last month, Facebook made a bombshell disclosure: As many as 90 million of its users may have had their so-called access tokens—which keep you logged into your account, so you don’t have to sign in every time—stolen by hackers.Friday, the company put the actual number at 30 million. Here’s how to… Continue reading. The post How To Check If Your Facebook Account Got Hacked—And How Badly appeared first on Behaviour Portugal.
Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.
If You Think the GDPR Doesn’t Affect You, Think Again. The European Union’s new General Data Protection Regulation (GDPR) came into effect in May of this year. While many in North America believe that since they are not located within the European Union the regulation does not apply to their operations, the territorial scope of… Continue reading.
A new law in New Zealand means that travelers can be fined thousands of dollars if they refuse to allow border officials access to their phone. Phone Password, New Zealand Customs Control Under the Customs and Excise Act 2018, which came into force this week, officials will be able to demand travelers unlock any electronic… Continue reading. The post New Zealand Customs Control Requires Your Phone Password appeared first on Behaviour Portugal.
For most ethical hackers, including myself, hacking doesn’t feel like work. We’re a community of puzzle-solvers – curious and eager to share the vulnerabilities we uncover that can have repercussions for your company and your customers. Hackers to Make Your Company More Secure, hacker community repercussions for your company and your customers. Many major enterprises… Continue reading.
The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p
This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.
For organizations to identify security threats and vulnerabilities, mitigate risk, ensure operational compliance and combat fraud, a comprehensive and innovative security approach is necessary. With today’s evolving risk landscape and the increasing complexity and severity of cyber threats, we must take advantage of emerging technologies, strong internal operator and process policies, and advanced analytics must… Continue reading.
Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.
Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.
Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions
💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!
Today (10/1/18) marks the release of the 7.4.2 version of Access. The new release has several new features, but by far the most important of those features is support for NetBackup deduplication on the Access Appliance.
Episode 5 - "Introduction" with Vanessa Vaughn of Asfalis Advisors and Jon Seals of Disaster Recovery Journal. This is the first release of episodes recorded at DRJ Fall 2018 in Phoenix. We had several technical difficulties for our first set of face-to-face interviews so the audio quality isn't nearly as good as we had hoped. (Please bear with us. We already have new equipment ready to go for the next face-to-face interviews in March.).
We organize all of the trending information in your field so you don't have to. Join 25,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content