Sat.Sep 14, 2019 - Fri.Sep 20, 2019

article thumbnail

Stakeholder mapping: Untangling problems before, during and after a crisis 

Crisis Response Journal

Globalisation and the increasing interdependence of our societal systems are generating multiple levels of stakeholders that are a challenge to engage with in normal times but that become a nightmare to manage in a crisis.

article thumbnail

80 Percent of Businesses Experienced a Cybersecurity Incident in the Past Year

Behavior Group

Eighty percent of companies surveyed experienced a cybersecurity incident in the past year, the most common being malware attacks, according to the Better Security And Business Outcomes With Security Performance Management Report by Forrester Consulting. Businesses Experienced a Cybersecurity Incident, cybersecurity The security incidents affect customer privacy/safety the most — 54 percent report customers were… Continue reading.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Finagle’s Law and the importance of business continuity plan testing

SRM

When it comes to Business Continuity Plan testing, we should all consider Finagle’s Law. Similar to Murphy’s Law, Finagle’s agrees that anything that can go wrong will go wrong. But it adds a twist: that it will happen at the worst possible time. In the world of information security, it’s an axiom for us to live by. Because, although it may sound homespun and out of kilter with today’s techno jargon, it reminds us of what is important (and often overlooked) when it comes to Business Continuity p

article thumbnail

Inclement Weather Warnings: Customer Service and Marketing Go Hand in Hand

Prism International

Planning, training, and mock disaster exercises – Three key components of an effective disaster plan. Regardless of the size of a RIM provider or company service level, the ability to respond internally to the threat of disaster or a potential disaster is critical. One that is well documented, understood by all team members, and available for spontaneous implementation when needed.

article thumbnail

Are Robots Replacing You? Keeping Humans in the Loop in Automated Environments

Speaker: Erroll Amacker

As businesses increasingly adopt automation, finance leaders must navigate the delicate balance between technology and human expertise. This webinar explores the critical role of human oversight in accounts payable (AP) automation and how a people-centric approach can drive better financial performance. Join us for an insightful discussion on how integrating human expertise into automated workflows enhances decision-making, reduces fraud risks, strengthens vendor relationships, and accelerates R

article thumbnail

Major incident management: A lawyer's view 

Crisis Response Journal

CRJ was pleased to have been invited to the University of Wolverhampton’s Telford campus (CRJ Key Network Partner) to listen to renowned and acclaimed solicitor advocate, Mark Scoggins of Fisher Scoggins Waters, give his personal views and share his exper By Claire Sanders

More Trending

article thumbnail

Five Ways Hackers Can Hurt Your Business with Office 365

NexusTek

READ TIME: 1 MIN September 17, 2019 Five Ways Hackers Can Hurt Your Business with Office 365 Most small business leaders know that theyre vulnerable to hackers, but 47% of companies dont know the best methods for protecting themselves. If you dont know how to protect yourself, youre an easy target. In Small Biz Daily, NexusTek CTO, Randy Nieves, outlines five ways that hackers can disrupt your business via holes in Microsoft Office 365.

Malware 52
article thumbnail

Insights into creating a successful Disaster Recovery Test – Part 3: Metrics

eBRP

Organizations with an active Disaster Recovery program conduct DR Tests to validate the Disaster Preparedness component of their IT Service Continuity strategies. Those exercises should validate – among other milestones – the overall recovery time (actual vs. planned RTO), completeness of DR plan documentation, level of preparedness among recovery team and the overall effectiveness of the DR response.

article thumbnail

More Than 99% of Cyber-Threats Target Corporate Staff

Behavior Group

Over 99% of cyber-threats require human interaction to work, highlighting the importance of user awareness programs and layered defenses, according to Proofpoint. Cyber-Threats Target Corporate Staff The security vendor’s 2019 Human Factor report is based on an 18-month analysis of data the firm collected across its global customer base. It adds some concrete findings to… Continue reading.

article thumbnail

Preparing for DRJ Fall 2019 in Phoenix

Business Resilience Decoded

Episode 29: "Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals. Contact DRJ staff members at: [link] [link] [link] [link] [link] [link] Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 29: "Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals.

article thumbnail

How to Put Your Business Continuity Plans into Action

During a crisis, successful organizations are led by strong leaders who communicate continuously with all stakeholders and have plans that are flexible enough to allow changes to be made on the fly. What You'll Learn: Understanding the characteristics of actionable business continuity plans. Step-by-step guidance on building robust and adaptable BCPs.

article thumbnail

There is No Excuse for Ignoring Backup and Disaster Recovery

NexusTek

READ TIME: 5 MIN September 16, 2019 There is No Excuse for Ignoring Backup and Disaster Recovery Disaster strikes when we least expect it, and for the unprepared business, the consequences are dire. According to a survey conducted by IDC, 80% of small and medium-sized business (SMB) respondents reported that network downtime costs their organizations at least $20,000 per hour.

article thumbnail

“He knows exactly what he’s done and I hope he comes clean about it.”

Plan B Consulting

This week Charlie shares his comments on the crisis communications aspect of the Prince Andrew and Jeffrey Epstein scandal. I have been following the Prince Andrew and Jeffrey Epstein story with interest over the last few weeks and thought I would make some comments on how the crisis communications of this incident have been handled. I assumed that the story had faded away, but I noticed that five of the alleged victims of Epstein, including Virginia Roberts who has accused Epstein of forcing he

article thumbnail

Preparing for DRJ Fall 2019 in Phoenix

Business Resilience Decoded

Episode 29: "Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals. Contact DRJ staff members at: [link] [link] [link] [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded Episode 29: "Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals.

article thumbnail

029 DRJ Staff

Business Resilience Decoded

"Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals. Contact DRJ staff members at: [link] [link] [link] [link] [link] [link]. Business Resilience Decoded: www.drj.com/decoded/ twitter.com/BRDecoded "Preparing for DRJ Fall 2019 in Phoenix" with Bob Arnold, Patti Fitzgerald, Rose Chotrow, and Jon Seals.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

“He knows exactly what he’s done and I hope he comes clean about it.”

Plan B Consulting

This week Charlie shares his comments on the crisis communications aspect of the Prince Andrew and Jeffrey Epstein scandal. I have been following the Prince Andrew and Jeffrey Epstein story with interest over the last few weeks and thought I would make some comments on how the crisis communications of this incident have been handled. I assumed that the story had faded away, but I noticed that five of the alleged victims of Epstein, including Virginia Roberts who has accused Epstein of forcing he