Attainium's Business Continuity Blog
- Subscribe to our Blog, which provide current information on topics related to business continuity, emergency response, disaster recovery, and crisis management.
- Unsubscribe from the Blog.
Meetings & Events: Crisis Management
So you have everything set for this event, the keynote speech is about to begin, and you sit in the back of the meeting room and breathe a sigh of relief. All of a sudden, you smell smoke and alarms are going off. People are screaming and running out the doors. This is one of those crises that could easily ruin your event. If you have a crisis plan, you may be able to deal with this situation and maybe even be able to get everything back on track. If you haven't thought about event crisis plans, now is the time to start.
Guns in the Workplace
Does your company have a policy on guns in the workplace or at your events? These days, almost every company allows guns to be kept in cars in the parking lot, but do they let them in the office? And how do you handle requests from employees who want to bring concealed weapons to work? Every company has a right to allow or prohibit guns at work. Take a look at these articles and see if you need to develop or revise your guns-at-work policy.
Reputation Management - Monitor, Manage and Protect
How do you monitor your online reputation? How important is it to you? Maintaining a good reputation is critical to your business, as a bad reputation can adversely impact your bottom line. This week, we've gathered some articles to help you monitor, manage, and protect your corporate reputation.
Business Continuity Threats - From the Inside
Yes, some internal threats are intentional, but most are unintentional, which makes them difficult to guard against. Estimates indicate that more than 50% of businesses have been victimized by insider attacks. Don't let yours be one of them... take a look -- this issue deals with this growing threat.
Cyber Attacks from Social Engineering
Phishing, vishing (uses phone calls), and smishing (uses text messages) plus impersonation are the top four social engineering techniques used in more than half of the hack attacks these days. In this issue, we're looking at what social engineering is, preventing attacks, your best defenses again these attacks, and how to educate your employees about social engineering.
Email will always be with us and so will all the scams, hoaxes, and threats that continue to grow each year. This issue focuses on understanding some of these threats and learning to combat them.
Cyber security (or cybersecurity, whichever you prefer) is always in the news due to some kind of breach or another. There's no question that the next breach is probably right around the corner. And with the GDPR deadline fast approaching, organizations are more motivated to ramp up their cybersecurity. Everyone is focused on how to protect their systems and their data. This issue looks at some past issues and some new approaches to the problem.
According to many recent surveys, ransomware is expected to be a (if not THE) leading cyber threat of 2018. Some report that 63% of businesses have experienced attempted ransomware attacks. Everything is vulnerable to these attacks; even our cars and home appliances can be at risk. The newest predictions say that ransomware will hit the cloud this year. Given all of this, it's time to learn all we can about this threat and how we might protect ourselves.