Sat.Dec 17, 2022 - Fri.Dec 23, 2022

article thumbnail

Holiday Hacking: Watch Out for These Deceptive Tricks

NexusTek

READ TIME: 4 MIN. December 21, 2022. Holiday Hacking: Watch Out for These Deceptive Tricks. While most of us get into the holiday spirit, threat actors gear up for their holiday hacking sprees. To outsmart sophisticated hackers, you have to understand how they operate. Consider the following as you develop your cybersecurity strategy—if a trickster cyber attacker were planning their holiday hacking methods, here’s what they might do… Extend a Fake Job Offer.

article thumbnail

Pandemic, Ukraine, Power Grids, Supply Chain: 2022 in Review

DRI Drive

2022 has been, of course, another eventful year for resilience professionals. Here are some of the biggest stories we covered this year in Drive. January: Omicron Response Puts One More Strain on Already-Struggling Small Businesses Read the 7th Annual DRI Predictions Report and Keep the Conversation Going at DRI2022 February: ‘Who’s THAT Guy?!’ When Telework […].

Pandemic 369
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learn About Space Weather--Before it is Too Late!

Disaster Zone

Your opportunity to come up to speed.

196
196
article thumbnail

Risk and Crisis Communications

Disaster Zone Podcast

One of emergency management’s major partners in all things concerning disasters, from the preparation phase to the response and recovery is our public information/affairs officers who support what we are trying to do in communicating with the public. It is critical that they have the knowledge and skill to perform their duties in a manner that helps, rather than hinders, our mission of protecting people, property and the environment.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

How to add vertical specialties to grow your cybersecurity practice

Acronis

IT service providers that serve a particular industry typically have fewer competitors since they stand apart from the crowd. That translates to more potential revenue, higher margins, greater market share and an overabundance of other advantages for MSPs. A vertical specialty separates the experts from other service providers, especially regarding cybersecurity and compliance.

More Trending

article thumbnail

Tech Predictions for 2023 and Beyond

Disaster Zone

Some small tips to consider as we keep moving toward more technology.

article thumbnail

The Risks that Manufacturing Firms are Facing and the Impact that Follows

Fusion Risk Management

The reach and criticality of global manufacturers impacts almost everyone. Manufacturers are responsible for sourcing and producing life-sustaining food, medicine, commodities, and goods that we rely on. They produce electronics and transportation that keep us connected and engaged. Their supply chains enable the world like the veins that carry our blood; but, because manufacturers touch nearly every facet of our daily lives, disruption to their operations can have an immediate and wide-reaching

article thumbnail

US Climate Disasters in 2022

Recovery Diva

From TheConversation: 2022’s US climate disasters, from storms and floods to heat waves and droughts.

100
100
article thumbnail

A Guide to Completing an Internal Audit for Compliance Management

Reciprocity

Learn the best way to complete an internal audit for your compliance management program. The Basics of Internal Audits. Internal audits assess a company’s internal controls, including its governance, compliance, security, and accounting processes. They provide management and the board’s audit committee with objective assurance about the design and operation of the organization’s governance, risk, and compliance (GRC) program and whether that program functions effectively throug

Audit 98
article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

Elon Musk and Leadership

Disaster Zone

Consistency is something children and employees need.

113
113
article thumbnail

People of Pure: Meet Barkz

Pure Storage

We started the “People of Pure” series to do what a mission statement and earnings report can’t: to tell you who we are via the people who make us what we are. That’s why this edition is so special. . Barkz is one of the longest-tenured people of Pure, and he’s truly built a legacy during his time here. He’s a builder: of Pure’s culture, technology, and service to our customers and community.

article thumbnail

Acronis Cyberthreats Report Year-end 2022: Data under attack

Acronis

Today we published the Acronis Cyberthreats Report: Year-end 2022, highlighting our findings from the back half of the year. In this free resource, you’ll find high-level trends in attack patterns, an overview of significant software vulnerabilities and detailed insights into the most dominant cybercrime gangs and their tactics — not to mention plenty of recommendations for staying safe in the year ahead.

article thumbnail

How to Maximize Your Business Impact Analysis (BIA)

BryghtPath

We recently helped a client of ours discover that they could save a boatload of money (imagine a very big boat) by downsizing their on-premise data centers and moving their data to a cloud-based storage service. As an added bonus, this discovery also helped them avoid a significant expense in updating their on-site legacy systems, … The post How to Maximize Your Business Impact Analysis (BIA) appeared first on Bryghtpath.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Even Authoritarian Regimes Have Trouble with COVID

Disaster Zone

You can only keep them down on the farm for so long.

113
113
article thumbnail

Smart Building Technology: Is it Time You Make the Switch?

Security Industry Association

Michael is the CEO and President of Genea. In 2020, 75% of real estate executives anticipated that smart buildings would become the norm within five years. Now, almost three years after the announcement, many CRE professionals still struggle to incorporate these tools into their overall building strategy…and that is becoming a problem. First things first… What is a Smart Building?

article thumbnail

What is the difference between RPO and RTO?

Acronis

What is RPO? Recovery Point Objective (RPO) generally refers to the amount of data that can be lost within a period most relevant to a business, before significant harm occurs, from the point of a critical event to the most preceding backup. What is RTO? Recovery Time Objective (RTO) often refers to the quantity of time that an application, system and/or process, can be down for without causing significant damage to the business as well as the time spent restoring the application and its data.

Backup 98
article thumbnail

4 Keys to Consider When Evaluating Cloud Data Protection Tools

Solutions Review

This is part of Solutions Review’s Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Keepit Chief Customer Officer Niels van Ingen offers four essential keys to consider when evaluating cloud data protection tools. No one likes surprises, particularly IT executives who believe their SaaS cloud providers have taken all the necessary steps to back up customers’ critical enterprise data.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

$40 Billion for Disaster Recovery

Disaster Zone

This is the number in the omnibus budget bill.

article thumbnail

Looking back at the biggest Citrix DaaS and VDI accomplishments of 2022

Citrix

It’s hard to believe that 2022 is already coming to an end. As we reflect on this past year, we see 2022 as a time of development, growth, and innovation. With so much happening with Citrix DaaS and Citrix Virtual … The post Looking back at the biggest Citrix DaaS and VDI accomplishments of 2022 first appeared on Citrix Blogs. Related Stories What’s new and next with Citrix DaaS and Citrix Virtual Apps and Desktops: Webinar Q&A What’s new with Citrix DaaS and Citrix Virtu

95
article thumbnail

What is the 3-2-1 Backup Strategy?

Acronis

Backup is important but it is just as important to remember that having one backup copy is sometimes not enough. For example, let’s assume that you backup your computer to an external drive, which you keep in your home office. If your computer crashes, you have the backup copy. However, if a fire breaks out in your home, it will destroy both your computer and the external drive.

Backup 98
article thumbnail

The Precarious Transition of Unvaccinated Service Members

The Rand Blog

U.S. service members separated from the military for refusing the COVID-19 vaccine were largely separated with a general discharge under honorable conditions. While they may be eligible for health care and disability compensation from the VA, they are not eligible for G.I. bill benefits. How have they fared as they entered civilian society unvaccinated and with limited benefits?

83
article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Emergency Management Is Match.com

Disaster Zone

There are many similarities!

article thumbnail

Enable mobile workstyles, empower users with Citrix Workspace App on iPad

Citrix

The traditional 9-to-5 job looks a lot different today, and for many, there’s less sitting at a desk in an office building. Although some executives and employees in sales and customer success have always needed flexibility, many companies have adopted … The post Enable mobile workstyles, empower users with Citrix Workspace App on iPad first appeared on Citrix Blogs.

83
article thumbnail

How To Maintain Building and Equipment Access for the Responding Fire Department

National Fire Protection Association

When facility managers and building owners think of fire department access, they typically think about keeping a fire lane clear, so the responding fire department has a place to set up their equipment in case of an emergency. While this is critical to an effective response, there are many other aspects of a building that need to be properly maintained to provide appropriate fire department access to the building, as well as crucial fire and life safety equipment.

article thumbnail

New Zealand Is Done with Speaking Softly to China

The Rand Blog

In three short years, New Zealand has gone from saying next to nothing about China to saying quite a lot. What has prompted New Zealand to suddenly take a firmer stand on China?

81
article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Disaster Zone Podcast: Risk and Crisis Communications

Disaster Zone

You need to listen to this podcast!!

article thumbnail

What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — December 2022

Citrix

It’s hard to believe that 2022 is already coming to a close. This year has flown by and has been full of new features, innovations, and updates from the Citrix team. In a recent blog post , I looked back … The post What’s new with Citrix DaaS and Citrix Virtual Apps and Desktops — December 2022 first appeared on Citrix Blogs. Related Stories Looking back at the biggest Citrix DaaS and VDI accomplishments of 2022 What’s new and next with Citrix DaaS and Citrix Virtual Apps and Desktop

83
article thumbnail

What is a Ransomware?

Acronis

In 2020, 51% of surveyed businesses were hit by ransomware and it is expected that in 2021 a company will be hit by a ransomware attack every 11 seconds. Since the introduction of COVID, cybercriminals have started to attack new entities, including schools, healthcare providers/researchers, and government institutions. Regardless of your company’s size or industry, your organization is not immune to a ransomware attack, which makes it essential that your organization implement data protection a