Sat.Jun 05, 2021 - Fri.Jun 11, 2021

article thumbnail

Earthquake Risks in Western Washington

Disaster Zone Podcast

There are earthquake risks in about every corner of the United States. This podcast looks at earthquakes in Western Washington State. Bill Steele, Director of Communications and Outreach at University of Washington, Pacific Northwest Seismic Network is interviewed. In addition to talking about plate tectonics and the three different types of earthquakes the region is subject to, there is a discussion about the most recent work to institute a ShakeAlert System here in Washington State.

article thumbnail

Near-Evacuation Reveals Dangerous Gaps in Communications for Senior Community

DisasterDoc

A special guest blog from emergency preparedness and disaster survival author, Virginia Nicols. Make sure it doesn’t happen this way in your community. On October 26, 2020, over a period of. The post Near-Evacuation Reveals Dangerous Gaps in Communications for Senior Community appeared first on DisasterDoc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BCP Headaches you can Avoid by using Shield: Part 3

KingsBridge BCP

Solve BCP Headaches. Welcome to the third and final installment of our series on how Shield can solve BCP headaches. Last time we talked about how Shield helps the newcomer to Business Continuity get started on the plan development process. Today we’ll look at challenges that can come up after you finally have that plan written. Headache #1: Updating contact information is so time consuming!

BCP 98
article thumbnail

Beat Hurricane Season With Emergency Notification Templates

Alert Media

The post Beat Hurricane Season With Emergency Notification Templates appeared first on AlertMedia.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Never Ignore Backup and Disaster Recovery

LAN Infotech

Never Ignore Backup and Disaster Recovery. Experts estimate that humans produce 2.5 quintillion bytes of data every day. That is a lot of information. However, having a poor backup strategy can wipe out all or vast portions of your data in a single click. From accidental deletions and malicious attacks to natural disasters, there are multiple ways by which you can lose your business data.

More Trending

article thumbnail

Calligo wins Growth MSP of the Year

Calligo

Yesterday, it was revealed virtually that Calligo won Channel Partner Insight’s North American MSP Innovation Awards 2021 Growth MSP of the Year.

59
article thumbnail

The Path to Maximum Data Center Uptime

Talkingpoint

Of all the many ways IT organizations are measured, maximizing uptime has to be one of the most important. After all, if employees and customers can’t access mission-critical systems, none of the rest of what IT does really matters. In […]. The post The Path to Maximum Data Center Uptime appeared first on TierPoint.

54
article thumbnail

Calculated Risk: The Two Kinds of Risk Assessment

BCM METRICS

There are two kinds of risk assessment. In today’s blog we’ll look at what they are and why your company would benefit from performing one of each type, once every year. The Two Types of Risk Assessment A lot of people who come to the blog are looking for basic information on risk assessment as […]. The post Calculated Risk: The Two Kinds of Risk Assessment appeared first on BCMMETRICS.

article thumbnail

4 ISC West Sessions That Will Help Your Integration Business

Security Industry Association

ISC West 2021 is coming up July 19-21 in Las Vegas, and the Security Industry Association (SIA) and ISC West recently revealed full conference details for the SIA Education@ISC West program, including keynote presentations from top luminaries and 65+ sessions on the most current business trends, technologies and industry developments. Among the robust lineup of conference sessions are several dynamic presentations that will help security integration businesses succeed.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Data Warehouse vs Data Lake - Which Is Best?

Calligo

While both data warehouses and lakes are big data storage solutions, they are useful in distinctly different situations. Data warehouses store structured data that can be accessed and interpreted by anyone with permission to do so, whereas a data lake is an unstructured storage space for large quantities of raw data.

59
article thumbnail

MEMBER News: Gilmore Services Rebrands to Honor the Legacy of Founder

Prism International

FOR IMMEDIATE RELEASE : June 7, 2021. Gilmore Services, an i-SIGMA Associate member, and a data and document security company based out of Pensacola, Florida, has rebranded itself to honor the legacy of its founder, Jim Gilmore, who started the company in 1955 on the foundations of building relationships with customers, employees, and the community.

article thumbnail

BCP Headaches you can avoid by using KingsBridge Shield: Part 2

KingsBridge BCP

Tired of BCP Headaches? We hope you enjoyed Part 1 on how KingsBridge Shield can solve some of your Business Continuity Planning (BCP) information security headaches. Part 2 of our series focuses on how Shield can cure the headaches of anyone starting BCP. Let’s start with a common problem: management assigned you the responsibility of heading up the company’s BCP program but you don’t know where to begin.

BCP 52
article thumbnail

How the Houston Astros Simplify Operations With Emergency Communication

Alert Media

The post How the Houston Astros Simplify Operations With Emergency Communication appeared first on AlertMedia.

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

What Is ESG? [Complete Guide]

LogisManager

What Is ESG? [Complete Guide]. Introduction. “ESG” is a term that’s been making headlines over the past year in the midst of today’s rapidly evolving federal and state requirements and our continuously disruptive environment. So what exactly is ESG, what does your organization need to do to be compliant with ESG best practices, and how can you close gaps in your program to become more aligned with ESG?

article thumbnail

5 Reasons Ransomware Protection Needs to Be a Board-Level Conversation

Cloudian

It is not just the responsibility of the IT/IS department to keep the business safe, but the obligation of every CXO and Board member to ask for and implement stringent cyber security measures starting with zero trust, perimeter security, and employee training. The post 5 Reasons Ransomware Protection Needs to Be a Board-Level Conversation appeared first on Cloudian.

article thumbnail

Legal Marijuana Raises Drug Screening Questions and Risks

Prism International

(This blog is provided for perspective only and not to be taken as legal advice). As I often remind service providers, though i-SIGMA certifications (NAID AAA/PRISM Privacy+) require drug screening prior to hiring, and either ongoing drug screening or training to recognize substance abuse, the certifications themselves do not prescribe how service providers respond to the results of those screens.

article thumbnail

BCP Headaches you can avoid by using KingsBridge Shield

KingsBridge BCP

Tired of BCP Headaches? Nobody likes a headache, especially a BCP headache. Welcome to the first in our three-part series on BCP headaches and how you can use the KingsBridge Shield solution to resolve them. Today “ BCP plan access ” is the focus.

BCP 52
article thumbnail

Is Training the Right Solution?

Speaker: Tim Buteyn

Let's set the scene: you’ve identified a critical performance gap in your organization and need to close that gap. A colleague suggests training, but you suspect there’s something going on that training can’t address. How can you determine if training is the right solution before you commit your budget and resources to a new training program? In this webinar, you will learn how to determine if training is the right solution using the Behavior Engineering Model.

article thumbnail

SIA New Member Profile: Openpath

Security Industry Association

New Security Industry Association (SIA) member Openpath is a leader in touchless, modern access control and workplace safety automation. The company is headquartered in Culver City, California, with an additional office in Fishers, Indiana, and more than 750,000 users globally. SIA spoke with James Segil, president and co-founder of Openpath, about the company, the security industry and working with SIA.

article thumbnail

Successfully Navigating Identity Management Strategies

Risk Management Monitor

For many CISOs, overseeing identity management represents a significant challenge and a substantial component of their broader security ecosystem. In a nod to its importance, the National Cyber Security Alliance even recently kicked off the first ever Identity Management Day. It is also central to a number of critical issues that urgently need a CISO’s attention, namely data access governance, data loss prevention and cloud application security.

article thumbnail

Learn To lead with authenticity:

Business Continuity Today

We must have the courage to bring our true selves to our interactions. Sometimes, that means being a less-rehearsed, less-polished version of ourselves. Being more transparent and vulnerable in this crucial way helps us to earn trust; we become more relatable by allowing stakeholders to really see us and connect with us. As we strive to be better leaders, we must learn to evolve to be our best selves.

article thumbnail

Are Cyber Attacks the Next Big Threat for Operational Resilience?

Castellan

Cyber attackers know organizations of all sizes have made a lot of operational changes because of the coronavirus pandemic, and they’re taking full advantage of them as new cyber attack vectors. Just a few weeks after much of the U.S. southeast experienced gas shortages following a hack of the Colonial Pipeline, attackers were at it again, this time targeting the world’s largest meat production facility, JBS , which resulted in the shutdown of its five largest U.S. plants and other plants in Aus

article thumbnail

Revitalizing Dry Content: A Lesson in Engagement

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

We’ve all been there. You’ve been given a pile of dry content and asked to create a compelling eLearning course. You’re determined to create something more engaging than the same old course that learners quickly click through, but how do you take this “boring” content and create something relevant and engaging? Many instructional designers will say, “Boring in means boring out.

article thumbnail

Baltimore City Council Votes to Approve Extreme Ban on Facial Recognition

Security Industry Association

SILVER SPRING, Md. – On June 8, the Baltimore City Council voted 13-2 to approve what would be the most extreme ban by a local jurisdiction on personal and business applications of facial recognition technology. While the Security Industry Association (SIA) supports a related measure introduced in the Council today to establish a task force to examine the technology and make legislative recommendations, we agree with Councilmember Yitzy Schleifer, who stated during the vote that “this is backwar

article thumbnail

Learn To lead with authenticity:

Business Continuity Today

We must have the courage to bring our true selves to our interactions. Sometimes, that means being a less-rehearsed, less-polished version of ourselves. Being more transparent and vulnerable in this crucial way helps us to earn trust; we become more relatable by allowing stakeholders to really see us and connect with us. As we strive to be better leaders, we must learn to evolve to be our best selves.

article thumbnail

Security Industry Association Applauds Senate Passage and Prioritization of U.S. Innovation and Competition Act

Security Industry Association

The bipartisan bill promotes U.S. leadership in technological advancements, including biometrics, artificial intelligence and robotics. SILVER SPRING, Md. – The Security Industry Association (SIA) commends the U.S. Senate for its passage of the U.S. Innovation and Competition Act (S. 1260), which significantly increases investment in research and development, education and training, supply chain security and the broader U.S. innovation ecosystem.