Risk Management ( Page 14 )

  • Home
  • Risk Management
  •  ( Page 14 )

How Much Crisis Planning is Enough?

One of the most important management competencies is planning. Crisis planning is the preparation of documented action steps designed to improve the organization’s response toward mitigating a disruption’s impact on assets and resources. Long ago, I was given some sage advice prior to briefing proposed Crisis Planning improvements to the executive team. My boss said, ...
Read more

Hotels and Restaurants; Prime Real Estate for Slip and Fall Accidents

By David B. Willis, MemberEckert Seamans Cherin & Mellott, LLC – Boston Slip and falls are the number one cause of accidents in hotels, restaurants and public buildings according to the Bureau of Labor Statistics. Injuries from a seemingly incidental fall here or trip there are estimated to cost some $70 billion annually according to ...
Read more

Technology, Media and Telecommunications Risk Index 2016

50 risks, split into five megatrends, ranked by 350 senior executives The TMT Risk Index analyses the severity of impact and ease of management of the top 50 risks facing the TMT industry. Grouped into five megatrends, we examine how these are impacting the sector currently and how this will change in the future. The ...
Read more

Beneath the Surface of a Cyberattack

Do leaders accurately gauge the impact a cyberattack can have on their organization? Do common assumptions about the costs and recovery process associated with data breaches paint a clear picture? This paper considers—in financial terms—the broad and extended business impact of cyberattacks, including both direct and intangible costs. Assumptions can be misleadingCommon perceptions about the ...
Read more

The TSA Debacle Can Be Solved, But Cooperation is Required

Airlines, Operating Authorities and Passengers Need to Help Out The Transporation Security Administration (TSA) is once again under fire. This time, it is not for potentially dangerous security lapses or employee misconduct. It is taking the blame for tortuous airport security lines, some of which extend out to sidewalks in front of terminals, causing many ...
Read more

The inside threat: Why employee behavior and opinions impact cyber risk

by Adeola Adele, Patrick Kulesa The human element as a risk factor in data security breaches is as enduring as it is troubling. Compromised laptops and phishing email scams continue to appeal to hackers as avenues to damage corporate servers and the confidential, sensitive information they maintain. Effective risk management strategy must therefore acknowledge and ...
Read more

Major Changes In Attitudes and Approaches to Workplace Violence Prevention

We just completed the second of two Fisher Phillips webinars including panelists and contributors who were active and former Department of Homeland Security, Secret Service, and other law enforcement professionals.  We solicited questions and concerns from employers and used the panel discussions and preparation to develop more effective practices to prevent and respond to workplace ...
Read more

Combating cybercrime in the hospitality business

Technology has changed our lives for the better, but like every other development it has its downside. Data breaches have become common news, and the latest victim is the hospitality industry. The 2016 Trustwave Global Security Report has found the hospitality industry to be the second-most vulnerable to security breaches behind the retail industry. The ...
Read more

Where Liability Falls When Guest Safety is Compromised

by: Casey Gale It almost sounds like the beginning of a low-budget horror movie. According to his claims, in 2008 Michael David Barrett gained access to a back-of-the-house phone in the Nashville Marriott at Vanderbilt University to learn sportscaster Erin Andrews’s room number. Without using Andrews’s name, he requested to be placed in the neighboring ...
Read more

Hospitality & Gaming Risk Management

Cyber Risk Management In the realm of hospitality and gaming risk management, “securing data against unauthorized and unintentional disclosure continues to be elusive” and consistently presents itself as a problem. It is important to emphasize the need for a “strategy that includes careful contracting, quality insurance coverage, and cyber security due diligence” to fight against ...
Read more