Attainium's Business Continuity Blog

  • Subscribe to our Blog, which provide current information on topics related to business continuity, emergency response, disaster recovery, and crisis management.
  • Unsubscribe from the Blog. 

Workplace Violence Awareness

April will be the 6th annual Workplace Violence Awareness Month. According to workplaceviolenceawareness.org, workplace violence is a serious recognized occupational hazard, ranking among the top four causes of death in workplaces during the past 15 years. Additional BLS data indicate that an average of more than 15,000 nonfatal workplace injury cases was reported annually during this time. Remember that planning is the key to prevention. What's your plan to help prevent violence in your workplace? 

Read more ...

Meetings & Events: Crisis Management

So you have everything set for this event, the keynote speech is about to begin, and you sit in the back of the meeting room and breathe a sigh of relief. All of a sudden, you smell smoke and alarms are going off. People are screaming and running out the doors. This is one of those crises that could easily ruin your event. If you have a crisis plan, you may be able to deal with this situation and maybe even be able to get everything back on track. If you haven't thought about event crisis plans, now is the time to start.  

Read more ...

Guns in the Workplace

Does your company have a policy on guns in the workplace or at your events? These days, almost every company allows guns to be kept in cars in the parking lot, but do they let them in the office? And how do you handle requests from employees who want to bring concealed weapons to work? Every company has a right to allow or prohibit guns at work. Take a look at these articles and see if you need to develop or revise your guns-at-work policy. 

Read more ...

Reputation Management - Monitor, Manage and Protect

How do you monitor your online reputation? How important is it to you? Maintaining a good reputation is critical to your business, as a bad reputation can adversely impact your bottom line. This week, we've gathered some articles to help you monitor, manage, and protect your corporate reputation. 

Read more ...

Business Continuity Threats - From the Inside

Yes, some internal threats are intentional, but most are unintentional, which makes them difficult to guard against. Estimates indicate that more than 50% of businesses have been victimized by insider attacks. Don't let yours be one of them... take a look -- this issue deals with this growing threat. 

Read more ...

Cyber Attacks from Social Engineering 

Phishing, vishing (uses phone calls), and smishing (uses text messages) plus impersonation are the top four social engineering techniques used in more than half of the hack attacks these days. In this issue, we're looking at what social engineering is, preventing attacks, your best defenses again these attacks, and how to educate your employees about social engineering.  

Read more ...

Email Threats

Email will always be with us and so will all the scams, hoaxes, and threats that continue to grow each year. This issue focuses on understanding some of these threats and learning to combat them. 

Read more ...

Cyber Security

Cyber security (or cybersecurity, whichever you prefer) is always in the news due to some kind of breach or another. There's no question that the next breach is probably right around the corner. And with the GDPR deadline fast approaching, organizations are more motivated to ramp up their cybersecurity. Everyone is focused on how to protect their systems and their data. This issue looks at some past issues and some new approaches to the problem. 

Read more ...