We’re only human. That’s why many users fail to create passwords that follow IT password best practices, primarily because the more complex passwords get, the harder they are to remember. That’s a pretty big problem. According to the Ponemon Institute, 55% of U.S. small businesses have had some form of data breach and 53% had multiple breaches. Following IT password best practices is one of the most critical steps a company can take to prevent a breach.
Crisis Insights Blog™
Welcome! The Crisis Insights blog was created for professionals who deal with crises—even if that's not in their job description. Each week, you'll find fresh insights, resources and news on a range of topics.
We'd love to know what you think. Click here to send us feedback, suggest a blog topic, or inquire about being a guest blogger.
Subscribe to the Crisis Insights newsletter and receive the free eBook, "Best of Crisis Insights", the most popular articles from the blog.
SHARE THIS BLOG
No matter your political party affiliation, if you were a recipient of a text message from the president, you’d most likely sit up and pay attention. That’s what the Federal Communication Commission (FCC) expects and why it has proposed a plan that would give the president the ability to communicate to the masses via phone and through other emergency alert systems in times of national crisis.
In today’s world, it’s probably more realistic to accept that it’s a matter of when your organization will experience an information security breach, not if. And it won’t be cheap. According to the Ponemon Institute, the 2014 Cost of Data Breach Study sponsored by IBM estimates the average cost to a company of a data breach at $3.5 million. The level and development and testing of your response plan prior to the breach makes all the difference in how severe its impact will be to your organization. There are also a number of things to keep in mind after you’ve discovered a breach to help you navigate quickly to recovery. Here are some important things to consider.
In our over-connected world, there are still plenty of people who say, “I knew nothing about that.” That’s why it is so enticing to use an emergency notification system to reach a mass audience with messages that fall in the “important”, but not necessarily “urgent” category. When officials decide to send out a non-emergency notification on a system that was designed and marketed for emergency communications only, it can spark debate regarding the proper use of the technology.
As parents get ready to send their students back to school this fall, the fact that colleges and universities are required by a federal law to have an emergency notification system in place may enhance their peace of mind. Effective communication is absolutely vital in an emergency situation, and mere minutes can mean the difference between a minor incident and a horrific tragedy. It’s reassuring to know that the technology available in top emergency notification systems enables universities to communicate with thousands of students, faculty and staff in just minutes.
When your business is just a single fish in the big pond of commerce, it’s easy to become complacent about cyber security. No matter what size your business, determining how to secure your company’s data, devices and networks should be a priority for every business leader today. At a recent roundtable, thought leaders from Interbrand, PricewaterhouseCoopers, the Institute of Risk Management and Symantec discussed 10 things that every business owner should think about regarding cyber security.
In a global world where a natural or man-made disaster on one side of the earth can impact the operations of businesses on the other, it’s more important than ever to ensure your supply chain management team plans for interruptions that will inevitably occur. According to Resilinc, a leading supplier of supply chain resiliency solutions, 293 global supply chain disruptions were tracked in 2013 which included; earthquakes, hurricaines, explosions, labor disputes, and more.
Some leadership qualities and actions that would be expected and appreciated during normal operating circumstances can and do backfire in a crisis situation. Crisis leadership is a delicate dance of knowing when to take control, when to collaborate and when to recognize the strength of others. Listed below are some behaviors a leader might exhibit during a crisis situation that can fail miserably.
Last December retail giant, Target, fell victim to a data breach in which hackers broke into their point-of-sale system and obtained personal information and credit card numbers impacting 110 million customers. This was one of the largest data breaches in history and it exposed major shortcomings in Target’s crisis response readiness which led to the recent departure of chief executive, Gregg Steinhafel and CIO, Beth Jacobs.