Risk Management ( Page 15 )

  • Home
  • Risk Management
  •  ( Page 15 )

Major Changes In Attitudes and Approaches to Workplace Violence Prevention

We just completed the second of two Fisher Phillips webinars including panelists and contributors who were active and former Department of Homeland Security, Secret Service, and other law enforcement professionals.  We solicited questions and concerns from employers and used the panel discussions and preparation to develop more effective practices to prevent and respond to workplace ...
Read more

Combating cybercrime in the hospitality business

Technology has changed our lives for the better, but like every other development it has its downside. Data breaches have become common news, and the latest victim is the hospitality industry. The 2016 Trustwave Global Security Report has found the hospitality industry to be the second-most vulnerable to security breaches behind the retail industry. The ...
Read more

Where Liability Falls When Guest Safety is Compromised

by: Casey Gale It almost sounds like the beginning of a low-budget horror movie. According to his claims, in 2008 Michael David Barrett gained access to a back-of-the-house phone in the Nashville Marriott at Vanderbilt University to learn sportscaster Erin Andrews’s room number. Without using Andrews’s name, he requested to be placed in the neighboring ...
Read more

Hospitality & Gaming Risk Management

Cyber Risk Management In the realm of hospitality and gaming risk management, “securing data against unauthorized and unintentional disclosure continues to be elusive” and consistently presents itself as a problem. It is important to emphasize the need for a “strategy that includes careful contracting, quality insurance coverage, and cyber security due diligence” to fight against ...
Read more

Personal Protective Measures for Today’s Global Citizens

Personal protective tips are a necessity for business travelers. From the Post Vietnam War era of kidnapping and ransom scenarios throughout South America to terror attacks against western cultures in Europe and the US, the number and types of threats faced by travelers continues to increase. Unfortunately, what we have yet to see is same ...
Read more

Cyber and Privacy Risk Advisory

Hospitality Industry Spotlight by Gamelah Palagonia Senior Vice President, Finex Hoteliers have long been major hacking targets – a trend that is likely to continue given the volume of credit and debit card transactions the industry processes. While all business should assess and implement comprehensive privacy and data security policies to ensure adequate protection of ...
Read more

Corporate Travel Focus 2014 – Data Security, Travel Risk Management and Mobile Tech

Travel data security, risk management while traveling to emerging countries and demand for additional mobile technology will be the focus for corporates next year, says corporate travel management company HRG. Travel Data Security The UK-based TMC recommends corporates have a global data consolidation strategy in order to mitigate risks associated with data protection and privacy. ...
Read more

Competition & Markets Authority Recommendations for Online Reviews

The Competition & Markets Authority (CMA), which investigates business practices and enforces anti-competition and consumer protection legislation in the UK, just released a report and call for information that signals more scrutiny for online reviews and endorsements. Though the report does not identify companies or sites that will be the subject of investigation, it expresses a ...
Read more

Risk Management vs. Big Brother

Craig Banikowski takes a look at the fine line between risk management and an overbearing and potentially privacy invading way of managing traveling employees. Read below for a look at useful tips to maintain safety from a close but reasonable distance. As travel professionals working in the aftermath of 9/11, the 2004 Madrid train bombings, ...
Read more

A Guide to Cyber Coverage

This article was first published in the ABA Coverage Journal July-August 2014, Vol. 24, No. 4. Unless you have been living under a rock for the past few years (without a wireless connection), you are likely familiar with the countless news stories that unfold every day reporting seemingly fantastic tales of cyber espionage, hacker attacks, ...
Read more