Latest News and Articles
When War Breaks Out: What Businesses Should Be Doing to Prepare and Protect Their Operations
War is often perceived as a geopolitical issue affecting governments, militaries, and national security agencies. But in today’s interconnected global economy, armed conflict rarely remains confined to the battlefield. Even when the…
How Can You Mitigate Risk On Your Phone?
Guest contributor: eTravelSafety Do we understand how to avoid the risk of our devices being compromised? For most of us, our mobile phones are an extension of ourselves. Our daily routine, interests, personality and vital information are all stored on devices that we take with us on-the-go to assist…
A Penetration Test is Vital to Cybersecurity Management and Considerations
A critical component to a holistic approach to cybersecurity is conducting a penetration test, or pen test, to evaluate computer system, network, or web application vulnerabilities that could be exploited by a hacker. The first question to consider when you conduct a pen test – what is the goal?…
5 Ways to be as Prepared as a Special Operations Team
When a Special Operations (Spec Ops) Team deploys, they are usually well prepared and have analyzed as many contingencies (the what if’s) as they possibly can. The success of these operations is down to many factors such as accurate and timely intelligence as well as a strong support system…
Crisis Stakeholder Planning, Don’t Wait! – The Silo Mentality
Does your organization have “silo mentality”? A Common Scenario: Facility: We manage our own emergency program and don’t need help from the corporate office Corporate: How will you respond to an emergency? Facility: We have a plan for that. Corporate: What does the plan state you will say to…
Key Decisions To Be Made During a Cyberattack
What Two Questions Do You Need to be Prepared to Answer After a Cyberattack? In this day and age, it’s prudent to think of a cyberattack as a “when”, not “if” scenario. The truth is, your network is under attack right now and the tools and techniques utilized by…
Four Common Mistakes in Crisis Communications Manuals
Guest contributor: Jo Detavernier, SCMP, APR – VP and Partner with Swyft Although a crisis communications manual might look to be a complex contraption to the untrained eye, what the manual needs to accomplish can simply be condensed to two important things: Putting the processes in place for…







