Safety Zone: 13 Fire & Life Safety Tips for BCM Practitioners
Business continuity practitioners have plenty of reasons to be advocates for good fire and life safety practices at their organizations, even if that’s not one of their core responsibilities. In today’s post, […]
10 Steps You Can Take to Prepare for the Threat of Workplace Violence
Unfortunately, recent news events have shown that workplaces need to do a better job of preparing for instances of workplace violence. In today’s post, we’ll share 10 steps you can take to […]
How to Stop Third-Party Vendors from Becoming Your Achilles’ Heel
Organizations of all sizes are increasingly turning to third-party vendors to handle tasks which would formerly have been performed in-house. Such tasks can range from payroll and accounting to email to presentation […]
America’s Red Zones: Where Natural Disasters Cluster and What It Means for You
Everyone knows that natural disasters aren’t spread evenly across the United States, rather they occur in the same places year after year. This fact was given striking visualization in a recent New […]
3 New Risk Management Trends for 2018
So 2017 is in the rear-view mirror, and here comes 2018, all bright-eyed and bushy-tailed. What should we be ready for this year in terms of risk management trends? Here are three […]
Monitoring Risk: Maintaining Your Risk Mitigation Strategies
You identified risks, then chose and implemented a mitigation strategy. You’ve decided whether you’ll accept, avoid, transfer, or reduce risk. Unfortunately, you have not completed the job. Monitoring risk, including tracking identified […]
Signs of an Unreliable IT Architecture
A solid IT architecture keeps your business running efficiently, but what if you don’t have one? These are key indicators for when a rebuild is in order. Many come into the planning […]
What is Business Continuity? – Business Continuity 101
If you’re new to disaster recovery or risk mitigation, you might be overwhelmed with business continuity terminology. To start, what is business continuity? If you’re not sure, don’t worry. We’re going to cover […]
Common Insider Threats
Last week we discussed combating insider threats, beginning with identifying them. This is such an important subject, that we want to help you identify some of the most common insider threats. As a reminder, […]
Mitigating Insider Threats: 7 Steps to Keeping Your Company Safe
More than ever, your users are the weak link in your network security. Mitigating insider threats isn’t just about thwarting the malicious action of a disgruntled employee; a careless insider can also cause catastrophic […]
Ransomware Defense: Prevention and Preparation
Ransomware defense is often an uncomfortable subject where enterprises must face some hard truths and new responsibilities. Nevertheless, it’s becoming increasingly necessary. According to the FBI, there were an average of 4,000 ransomware […]
What is a DoS Attack?
The web offers a lot of opportunities, but with them, threats are sure to follow. The faster the technological advance, the more security gaps appear. Just in the last year, we’ve seen […]