Attainium's Business Continuity NewsBriefs
- Subscribe to our weekly news service, which provides current information on topics related to business continuity, emergency response, disaster recovery, and crisis management.
- Unsubscribe from the NewsBriefs.
Aug 17, 2016 - Think BP, Toyota, Tylenol, Red Cross -- all brands that suffered serious damage to their brands and reputation yet have survived. While your business or organization may not be on that scale, you could suffer reputation damage from which it could take years to recover. What’s your online reputation management plan? The articles below offer some tips on how to manage your reputation online and how to assess reputation risks.
Aug 10, 2016 - It's important that you review and update your business continuity plan in order to cover all the possible risks -- everything from acts of terrorism to the zika virus. What's particularly important is ensuring that your current plan addresses all the risks that could affect your organization; readiness to respond is the goal. This issues covers what your plan should include, how to help your employees plan at home and what you should know about the zika virus.
Aug 3, 2016 - Cyber hacking is always in the news. The recent hacking of the emails of the Democratic National Committee once again reminds us that cyber security should be a major concern for all of us. We have to continually update our security plans and processes – and our employee education -- so we can keep up with the advances made by hackers and other cyber criminals. This issue may shed some light on how you can continue to protect your organization.
Today, many people have business continuity/disaster plans, but they may not review and update them on a regular basis, which can lead to serious problems. When you first wrote your plan, did you consider that one day much of your data would/might be in the cloud? Did you plan for what you would have to do in the event your cloud vendor went out of business? If not, and you have a private or public cloud vendor (or are thinking about going to the cloud), you may want to read on.
Various types of workplace violence, including active shooters, have been on the rise in recent years and many end in fatalities. What have you done to prevent acts of workplace violence in your organization? Do you identify risks for violence on a regular basis? Do you have a policy for employees to report concerns about specific employees? Once you read this week's articles, you might want to look again at what you're doing and see where you might improve.
We probably cannot count the number of times we have said that you cannot rely on a plan that hasn't been tested – or asked if you want to use a plan for the first time in the midst of a disaster. This issue echoes those sentiments and can help you design and implement your own exercises for your various plans.
A comprehensive risk management strategy enables an organization to identify, assess, manage and/or mitigate various risks. It provides a method by which you can prioritize specific risks and determine how to allocate resources. As we all know, there are many types of risk, internal and external, that may impact operations. This issue addresses ways to deal with these various types of risk.
Most of us expect our workplaces to be safe and secure, and most of them are. There are some circumstances, however, when unexpected events may not have been sufficiently planned for. Our safety and security is the responsibility of the employer, but all employees also have some responsibility for their own and their co-workers’ safety. These articles discuss a number of issues for which you might need additional planning.
If your corporate or nonprofit event is coming up soon, and you wake up in a cold sweat hoping the nightmare about a disaster doesn't come true, you're obviously worrying that things could go wrong. And, of course, they can. But the best antidote to worrying is to be as prepared as possible.
Identity theft of businesses, their customers and employees is becoming more and more common as hackers seem to try to outdo each other. We hope you don't think that this won't happen to you because you're just as likely to become a victim as any other business. No one is ever prepared for identity theft to happen to them, but now it's possible to do more to protect your business.Here are some things to consider.
Many of us -- maybe most of us -- have been affected by data breaches in the past year. Perhaps your organization is one whose data has been breached by hackers. But your data could have been exposed or stolen in other ways in the workplace, during the data recovery process for example. What controls do you have in place to prevent your disaster recovery process from becoming part of the problem? A newer privacy risk is the proliferation of wearable technology in the workplace. Also of concern is the monitoring of computer/social networking activity by employers. If you have not thought about how some of these issues might impact you, this issue of the NewsBriefs should be of interest.