Weighing the Danger: The Continuing Value of the Threat and Risk Assessment
The Threat and Risk Assessment (TRA) is one aspect of business continuity that has come under criticism recently. In our opinion, this tool remains highly valuable, provided it is used correctly. Related on MHA Consulting: Today’s Threat Environment: How Vulnerable is Your Business? The complaints against the TRA are similar to those expressed about the Business… Continue reading Weighing the Danger: The Continuing Value of the Threat and Risk Assessment
Exercise in Topeka Prepares Responders for Active Assailant
(TNS) – Dozens of emergency responders rushed Tuesday around the Capitol Federal building in downtown Topeka during an exercise simulating an active assailant incident. The training was organized by the Shawnee County, Kan., Department of Emergency Management and included several area agencies. “We like to think when it happens here, versus if — that way… Continue reading Exercise in Topeka Prepares Responders for Active Assailant
What The C-Suite Needs To Know About Cybersecurity And Compliance
Beware of These Risks to Build Resilience Steve Durbin, Managing Director of the Information Security Forum (ISF), discusses some of the key risks to organizations today and provides guidance on how to steer clear of them while becoming more resilient. Until recently, leading executives at organizations around the world received information and reports encouraging them… Continue reading What The C-Suite Needs To Know About Cybersecurity And Compliance
Many Helping Hands in Storm Rescue Efforts in Minnesota
(TNS) – This weekend’s storm has meant long hours for emergency personnel as numerous stranded motorists were in need of rescuing. According to Mower County, Minn., Sheriff Steve Sandvik, preliminary numbers indicate that over 150 vehicles were abandoned throughout Mower County during the storm. Many of those vehicles contained people in need of rescue. The… Continue reading Many Helping Hands in Storm Rescue Efforts in Minnesota
The Employee Experience Index
Six years ago, I noticed a pattern in the inquiry calls I was fielding from clients. At the time, many of them centered around things like BYOD, whether to take away local admin rights from PCs, and other decisions driven by escalating fears of security or compliance risks. If I was able to answer their… Continue reading The Employee Experience Index
Embracing DevSecOps: 5 Processes to Improve DevOps Security
In the cyber threat climate of the 21st century, sticking with DevOps is no longer an option In 2016, about eight years following the birth of DevOps as the new software delivery paradigm, Hewlett Packard Enterprise released a survey of professionals working in this field. The goal of the report was to gauge application security sentiment, and… Continue reading Embracing DevSecOps: 5 Processes to Improve DevOps Security
Why Risk Managers Are Suddenly Interested in Flexible Working
When developing their business continuity plans, office managers, IT leads and risk teams now have a new weapon in their arsenal – flexible workspace According to a recent global study by Regus, a staggering 73% of respondents claimed that flexible workspace solutions have helped mitigate risks that could threaten the flow of business operations. As Joe Sullivan, Regus’… Continue reading Why Risk Managers Are Suddenly Interested in Flexible Working
UK Government says that businesses are under-prepared for no-deal Brexit impacts
The UK Government has published a new document which highlights some of the expected impacts of a no-deal Brexit on businesses, it concludes that ‘lack of preparation by businesses and individuals is likely to add to the disruption experienced in a no-deal scenario.’ Entitled ‘Implications for business and trade of a no deal exit on… Continue reading UK Government says that businesses are under-prepared for no-deal Brexit impacts
Social Media Platforms Double as Major Malware Distribution Centers
Because many organizations tend to overlook or underestimate the threat, social media sites, including Facebook, Twitter, and Instagram, are a huge blind spot in enterprise defenses. Social media platforms present far more than just a productivity drain for organizations. New research from Bromium shows that Facebook, Twitter, Instagram, and other high-traffic social media sites have… Continue reading Social Media Platforms Double as Major Malware Distribution Centers
Aurora, Ill., Police Release 911 Audio From Mass Shooting
(TNS) – Aurora, Ill., police released audio of the 911 calls and emergency dispatch made during the Feb. 15 Aurora warehouse shooting at Henry Pratt Co. that left five employees dead. Police communications detail the hour-long manhunt that injured six police officers, who were also identified by the department Monday. The shooter — Gary Martin… Continue reading Aurora, Ill., Police Release 911 Audio From Mass Shooting