October, 2018

article thumbnail

Phishing Attacks up by 297 Percent in Q3 2018

Behavior Group

A report illustrates how cyber criminals are increasingly targeting retailers and their customers through digital and social channels as retailers leverage new channels for increased revenue opportunities. Phishing Attacks “The Retail and eCommerce Threat Landscape Report (October 2018), notes a 297 percent rise in the number of false retailer websites designed to “phish” for customer… Continue reading.

article thumbnail

Effects of Stress on Incident Teams

Plan B Consulting

This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Franklin Mint FCU Improves Reliability With AlertMedia

Alert Media

The post Franklin Mint FCU Improves Reliability With AlertMedia appeared first on AlertMedia.

article thumbnail

Marketpoint Recall & Recall Results. a powerful partnership for global coverage

Marketpoint Recall

An increasing number of recalls that appear in the media these days have one common factor: the companies involved just weren’t ready. A product recall can be one of the most detrimental events for a company and can have overwhelming consequences for both the company, its customers and the brand. That is why having an experienced partner, a robust, up-to-date recall plan, and access to global communication channels, is so critically important in a crisis situation.

Media 52
article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

Business Impact Analysis could be Challenging for some Organizations

Stratogrid Advisory

Why the Business Impact Analysis is Challenging for an Organization with Constant Changes Last Updated on May 31, 2020 by Alex Jankovic Reading Time: 3 minutes In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).

More Trending

article thumbnail

75% of Employees Could Cost a Business $7.91 Million

Behavior Group

Seventy-five percent of professionals pose a moderate or severe risk to their company’s data, says (…) third-annual State of Privacy and Security Awareness Report, which also found that workers in the financial sector are more likely to be a risk with 85 percent of survey respondents falling into one of the two risk categories. Employees… Continue reading.

article thumbnail

Effects of Stress on Incident Teams

Plan B Consulting

This week Charlie looks at the physical effects which occur when individuals are faced with an incident and the methods that can be used to counteract them. I was in Dubai yesterday and every time I visit the city, I always feel that it is the city of the future, with its fantastic array of skyscrapers, its driverless metro and its clean streets. So, this week I was inspired by the city to write about a technical business continuity subject.

article thumbnail

How to Protect Your Lone Workers In 5 Steps

Alert Media

The post How to Protect Your Lone Workers In 5 Steps appeared first on AlertMedia.

article thumbnail

Growing Up In Disaster Recovery with Bob Arnold

Business Resilience Decoded

Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Business Impact Analysis could be Challenging for some Organizations

Stratogrid Advisory

Why the Business Impact Analysis is Challenging for an Organization with Constant Changes. Last Updated on May 31, 2020 by Alex Jankovic. Reading Time: 3 minutes. In a Business Continuity Management (BCM) Program , there are specific professional practices that must be adhered to. The Disaster Recovery Institute (DRI) outlines the first steps as Business Continuity Management (BCM) Program Initiation and Risk Assessment, with the third being the Business Impact Analysis (BIA).

article thumbnail

Independent Analysis on Veritas Resiliency Platform

VOX Veritas

Resiliency Platform offers features that simplify data protection for enterprise customers.

article thumbnail

Cyberattacks that Target the C-Suite on the Rise

Behavior Group

Whaling, impersonating CEOs and compromising executives’ business emails are all ways that hackers are targeting those at the top. Cyberattacks, impersonation attacks, whaling attack Phishing is big business for criminals. But as targeted phishing campaigns, known as spear-phishing, continue to evolve, hackers don’t seem to be satisfied with small fish, aiming more often than ever… Continue reading.

article thumbnail

Does an Authoritarian Nation State Dictate Your Crisis Communications?

Plan B Consulting

This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

What to Look For in a Small Business Communication System

Alert Media

The post What to Look For in a Small Business Communication System appeared first on AlertMedia.

article thumbnail

Growing Up In Disaster Recovery with Bob Arnold

Business Resilience Decoded

Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 7: "Growing Up In Disaster Recovery" with Bob Arnold, president of Disaster Recovery Journal. Contact Bob Arnold at: bob@drj.com [link] [link].

article thumbnail

What Will It Take to Close the Cybersecurity Talent Gap?

Behavior Group

Security talent is in high demand, but it doesn’t have to stay that way. Cybersecurity is top of mind for organizations everywhere, yet the talent pool to fill these much-needed positions just isn’t there. In fact, according to a 2017 survey by ISACA’s Cybersecurity Nexus, only 13 percent of organizations surveyed received more than 20… Continue reading.

article thumbnail

How To Check If Your Facebook Account Got Hacked—And How Badly

Behavior Group

AT THE END of last month, Facebook made a bombshell disclosure: As many as 90 million of its users may have had their so-called access tokens—which keep you logged into your account, so you don’t have to sign in every time—stolen by hackers.Friday, the company put the actual number at 30 million. Here’s how to… Continue reading. The post How To Check If Your Facebook Account Got Hacked—And How Badly appeared first on Behaviour Portugal.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

The GDPR and Privacy: What Security Leaders Need to Know

Behavior Group

If You Think the GDPR Doesn’t Affect You, Think Again. The European Union’s new General Data Protection Regulation (GDPR) came into effect in May of this year. While many in North America believe that since they are not located within the European Union the regulation does not apply to their operations, the territorial scope of… Continue reading.

article thumbnail

New Zealand Customs Control Requires Your Phone Password

Behavior Group

A new law in New Zealand means that travelers can be fined thousands of dollars if they refuse to allow border officials access to their phone. Phone Password, New Zealand Customs Control Under the Customs and Excise Act 2018, which came into force this week, officials will be able to demand travelers unlock any electronic… Continue reading. The post New Zealand Customs Control Requires Your Phone Password appeared first on Behaviour Portugal.

Travel 52
article thumbnail

Location, Location, Location: 3 Ways to Leverage Location Data

Alert Media

The post Location, Location, Location: 3 Ways to Leverage Location Data appeared first on AlertMedia.

article thumbnail

How to Work with Hackers to Make Your Company More Secure

Behavior Group

For most ethical hackers, including myself, hacking doesn’t feel like work. We’re a community of puzzle-solvers – curious and eager to share the vulnerabilities we uncover that can have repercussions for your company and your customers. Hackers to Make Your Company More Secure, hacker community repercussions for your company and your customers. Many major enterprises… Continue reading.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Does an Authoritarian Nation State Dictate Your Crisis Communications?

Plan B Consulting

This week Charlie talks about incident management communications within authoritarian regimes. I will leave a bulletin on the terrible events associated with the Palau earthquake and tsunami in Indonesia until next week. This week we were asked to bid for some incident management training in a country which has an authoritarian regime. The work would include delivering training to the crisis management team, followed by an exercise.

article thumbnail

The Importance of Cybersecurity in Modern Video Surveillance Environments

Behavior Group

For organizations to identify security threats and vulnerabilities, mitigate risk, ensure operational compliance and combat fraud, a comprehensive and innovative security approach is necessary. With today’s evolving risk landscape and the increasing complexity and severity of cyber threats, we must take advantage of emerging technologies, strong internal operator and process policies, and advanced analytics must… Continue reading.

article thumbnail

You Are On Your Own Mate…

Plan B Consulting

Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.

Alert 40
article thumbnail

You Are On Your Own Mate…

Plan B Consulting

Charlie discusses the the recent earthquake and tsunami in the Indonesian city of Palu and the importance of taking responsibility for protecting yourself as much as possible during incidents. I said last week I would write something on the Palu earthquake and tsunami. As the title suggests, I thought I would talk about taking personal responsibility for looking after yourself and your family during incidents.

Alert 40
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Announcing Veritas Access 7.4.2: NetBackup Deduplication on Access Appliance

VOX Veritas

Today (10/1/18) marks the release of the 7.4.2 version of Access. The new release has several new features, but by far the most important of those features is support for NetBackup deduplication on the Access Appliance.

40
article thumbnail

Introducing the DRJ Fall 2018 Podcast Recordings

Business Resilience Decoded

Episode 5 - "Introduction" with Vanessa Vaughn of Asfalis Advisors and Jon Seals of Disaster Recovery Journal. This is the first release of episodes recorded at DRJ Fall 2018 in Phoenix. We had several technical difficulties for our first set of face-to-face interviews so the audio quality isn't nearly as good as we had hoped. (Please bear with us. We already have new equipment ready to go for the next face-to-face interviews in March.).

article thumbnail

Building An Engaging Program with Tracey Forbes Rice of Fusion Risk Management

Business Resilience Decoded

Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 6: "Building An Engaging Program" with Tracey Forbes Rice of Fusion Risk Management. Contact Tracey Forbes Rice at: [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.