Risk Management ( Page 11 )

  • Home
  • Risk Management
  •  ( Page 11 )

Responding to Crisis Effectively

In crisis, efforts toward the planning, training, and coordination of resources enable an organization to surge toward the protection of its assets and operations during disruption. However, what cannot be surged is stakeholder trust and confidence. Prior to crisis, a requisite level of capabilities must be developed and maintained to provide stakeholder confidence that assets ...
Read more

What American Companies Need to Know about the EU’s New General Data Protection Regulation

The General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe that will go into force on May 25, 2018. Every organization that does business with EU customers, regardless of the home base of the organization, and regardless of the size of the organization, must come into compliance or risks ...
Read more

Pre-Travel Health Planning Can Help You Avoid Common Issues

Pre-travel health planning is paramount. Travelers can face a variety of health-related threats while traveling abroad from infectious diseases and injury to exacerbating pre-existing medical conditions. Fortunately, many of these issues can be mitigated and even prevented prior to departure. Let’s take a look at some basic and proactive pre-travel health measures you should consider ...
Read more

Venue Protection in an Asymmetric Environment

In the aftermath of the horrific shooting at the Mandalay Bay Resort in Las Vegas on October 1, hotel operators, cinema and restaurant managers as well as security personnel assigned to outdoor venues, have logically asked themselves how they can go about “hardening” the location. Specifically, what reliable measures can they take to make the ...
Read more

Cloud Computing Crash Course: Safety First

When it comes to privacy and security laws governing sensitive data, you don’t have to be a financial or health institution to have information that is subject to state and federal regulation. Almost every organization with employees stores some personally identifiable information. Simply storing an employee’s name, email address and date of birth will be ...
Read more

How to Protect Your Online Privacy

On a daily basis, the global media reports a huge loss of personnel data, damaged reputations, pilfered intellectual property, or millions of dollars stolen as the result of cyber incidents. An event reported in the news today will likely be eclipsed in scale or audacity in a few months’ time. Neither banks, global corporations, celebrities, ...
Read more

Cloud Computing Crash Course: Location, Location, Location

Cloud computing is the practice of enlisting a “cloud provider” to deliver data, applications and storage to users through the internet, which allows each user to share the computing resource and forego some on-premise technology. Cloud computing is generally categorized into three buckets. The cloud provider may: Host applications, thereby eliminating the need to install ...
Read more

The traveler’s guide to keeping electronic devices secure during international travel

From the first time I traveled overseas in 1996 to my most recent international trip this past November it’s safe to say that international communication has gotten a little easier. Smartphones, laptops, high-speed wireless networks and wifi have made staying connected to home while you’re abroad a trivial task. Unfortunately that massive leap forward in ...
Read more

An Often Overlooked Tool in Workplace Safety Prevention: The Near-Miss Investigation

OSHA defines a near miss as an incident in which no property was damaged and no personal injury was sustained, but where, given a slight shift in time or position, damage or injury easily could have occurred. Put simply, someone got lucky. Because there was no damage, these near miss incidents are often ignored or ...
Read more

Cyber Insurance: Get What You Pay For

Due to the increasing number of successful and attempted cyber-attacks and increased government scrutiny surrounding protection of confidential information, companies cannot ignore the various risks associated with potential data breaches.  The result is that more and more companies are considering and purchasing cyber insurance.  Companies are increasingly recognizing that customer names, customer financial data, credit ...
Read more