Sat.Jan 09, 2021 - Fri.Jan 15, 2021

article thumbnail

Warning the Public in New York City

Disaster Zone Podcast

In this podcast Deanne Criswell, New York City’s Emergency Management Commissioner discusses how the city uses a variety of legacy warning systems along with new technologies to warn the public. New York City has a significant challenge with the level of diversity in spoken languages in the city and those issues are also addressed in the podcast. This episode is sponsored by The Blue Cell , a by design crisis and consequence management consulting firm with a primary focus on education and traini

Education 130
article thumbnail

6 Winter Storm Preparations Every Business Should Make

Alert Media

The post 6 Winter Storm Preparations Every Business Should Make appeared first on AlertMedia.

Security 114
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A brief guide to cyber security risk assessments

IT Governance BC

Cyber security risk assessments are essential for organisations to protect themselves from malicious attacks and data breaches. After all, it’s only once you’re aware of the ways you’re vulnerable that you can put appropriate defences in place. But what exactly does a risk assessment do? Essentially, it helps you answer these three questions: Under what scenarios is your organisation under threat?

article thumbnail

Documentation - Data Classification Policy

The Morning Breach

We also continue our series today on improving your organizations cyber security documentation. We have looked at Vendor Security Questionnaires and the Acceptable Use Policy, today we are going to start the process of data classification. A Data Classification Policy is in place to detail why data classification should be done, and to establish a framework for classifying data based on its sensitivity, value, and criticality to the organization.

article thumbnail

The Complete Guide to Mastering Business Continuity

The Complete Guide to Mastering Business Continuity is a step-by-step resource for developing an effective Business Continuity Management (BCM) program and navigating challenges. Whether building from scratch or enhancing a plan, this guide offers practical tools, expert advice, and strategies to ensure resilience. What You’ll Learn: Key elements of BCM and resiliency Steps to build and test your Business Continuity Plan (BCP) Conducting risk assessments and BIAs Integrating cybersecurity into p

article thumbnail

Why you should make cyber risk a business gain, not a loss

Behavior Group

As companies continue to respond to the global pandemic, millions of their employees are working remotely, often from home. While this is the recommended response, it’s also creating new cyber risks. More specifically, organizations face four daunting challenges today that significantly increase their risk exposure: Distributed workforce: Organizations have created a distributed workforce on an… Continue reading.

More Trending

article thumbnail

Recognize what you don’t know — and fill in the gaps

Business Continuity Today

Are you a thinker, a planner, a person that looks for knowledge? To understand what you do not understand you need to recognize what you don’t know, and you must seek to fill in the gaps. The Business Continuity Show Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Sister Shows EM Student Web - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] EM Weekly Website - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Are you a

article thumbnail

Laptop or Device Lost or Stolen - Proactive and Reactive Steps to secure data

The Morning Breach

Laptops and other portable devices (such as phones, tablets, usb drives, and other devices) are frequently stolen or lost. Within your acceptable use policy, employees should be required to report immediately when one of these devices goes missing, so every company at some point is going to need to deal with a missing device. It is being reported that during the breach of the United States Capitol building, that a laptop belonging to House Speaker Nancy Pelosi was stolen.

article thumbnail

Upcoming FEMA Webinar- Jan 26

Disasters and Faith-Based Organizations

Houses of Worship Continuity Planning. Tuesday, January 26, 2021 11:00:00 AM EST – 12:30:00 PM EST.

article thumbnail

How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency

Alert Media

The post How Our Customers Are Using AlertMedia to Improve Operations, Internal Communications, and Overall Efficiency appeared first on AlertMedia.

article thumbnail

Mastering Remote Onboarding: Proven Strategies for Seamless New Hire Integration

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

Join this brand new webinar with Tim Buteyn to learn how you can master the art of remote onboarding! By the end of this session, you'll understand how to: Craft a Tailored Onboarding Checklist 📝 Develop a comprehensive, customized checklist that ensures every new hire has a smooth transition into your company, no matter where they are in the world.

article thumbnail

Recognize what you don’t know — and fill in the gaps

Business Continuity Today

Are you a thinker, a planner, a person that looks for knowledge? To understand what you do not understand you need to recognize what you don’t know, and you must seek to fill in the gaps. The Business Continuity Show Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Sister Shows EM Student Web - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] EM Weekly Website - [link] Twitter - [link] Facebook - [link] LinkedIn - [link] YouTube - [link] Are you a

article thumbnail

Intel to reveal ransomware capabilities in 11th generation vPro CPUs

The Morning Breach

Intel has added ransomware detection capabilities at the silicon level in it’s 11 th generation Intel Core vPro CPUs with support for the Hardware Shield and Threat Detection Technology or TDT features. Through a partnership with Boston based Cyberreason, these new features are expected in the first half of 2021. Hardware Shield is a technology that will lock down the UEFI/BIOS, whereas TDT will utilize the CPU telemetry and ML heuristics to detect possibly malicious code.

Malware 40
article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link] Business Resilience Decoded: [link] [link] [link] [link] [link]

article thumbnail

Parler Shutdown and Section 230 - What does it mean to you?

The Morning Breach

We begin today with a look at the recent Parler shut down and what it means to you as a business owner. Politics aside, the recent actions of multiple private technology providers to decide to no longer do business with a company should have you evaluating your technology stack as well. For the vast majority of us, we will never be in the same boat as Parler found themselves in, but precedent has been set and now it should be included in your business continuity plans. .

article thumbnail

SME Relationships: Proven Solutions for Seamless Collaboration and Success

Speaker: Tim Buteyn, President of ThinkingKap Learning Solutions

💢 Do you find yourself stuck in never-ending review cycles? Are you wondering if your Subject Matter Expert actually got that last review request? Are you having trouble trying to decipher impractical or conflicting feedback? 💢 If any of these scenarios sounds familiar, you may benefit from a crash course on managing SME relationships!

article thumbnail

Third Malware Strain discovered in SolarWinds Supply Chain CyberAttack

The Morning Breach

A third malware strain has been discovered in the SolarWinds Supply Chain Attack has been identified by CrowdStrike, and it sheds some light on how hackers compromised the SolarWinds Orion app build process. . Named Sunspot, this finding adds to the previously discovered Sunburst and Teardrop malware strains. While Sunspot is the latest discovery, there is evidence that it was the first one used, actually going back to September 2019, when cyber criminals first breached SolarWinds internal netw

Malware 40
article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link].

article thumbnail

The Importance of Non-Profit and Government Partnerships For Small Business Success

Business Resilience Decoded

Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link]. Business Resilience Decoded: [link] [link] [link] [link] [link] Episode 60: Kevin Dick of the Carolina Business Development Fund Contact Kevin Dick at: [link] [link] [link].