Ultimate Business Continuity

  • Tools & Techniques
    • COVID-19
    • Active Shooter Detection
    • Mass Notification
    • Situational Alert
    • Business Continuity Management
      • Why Digital AND Paper Plans Are Both Critical
    • Critical Event Management
    • Disaster Recovery
    • Digital Transformation for Business Continuity & Beyond
  • Digital Transformation
    • 22 Habits for Digital Continuity Success
    • Beware: The 7 Habits for Digital Failure
    • Digital Communications are Changing Our World
    • The Laws of Exponential Digital Technology Growth in a Nutshell and How They Help You
    • Digital Transformation in Industrial-Age Companies
    • Digital Mindset: Have Fun and Build a Better and Faster Program the Digital Way
    • Digital Listening Tools are Key
    • Digital Convergence Building Blocks
  • Breaking News!
  • Critical Solutions Advisor Newsletter
  • Contact

Tech Tips & Techniques

BCM

Why Digital AND Paper Plans Are Both Critical

Although I love technology I am going a bit old-school with this one so we leave nothing to chance. Create awareness among process owners that they should always have access to a paper ‘hard’ copy of their plan.  Also, tech it out by making plans available to them in a secure locationRead More

By Marty Fox, 5 years ago
BCM

Create Wider Scope ‘Roll-Up Plans’ – Info at Your Fingertips

By Marty Fox, 5 years ago
BCM

Digitizing the ‘Department’ Business Continuity Plan

The department (process) level business continuity plan is the ‘cookbook’ to recovering a department and sub-departments (sub-processes). There is no one ‘right way’ to document a plan. If you do some research you will find well over 100 styles of business continuity plans. Decide on a style that meets the needsRead More

By Marty Fox, 5 years5 years ago
Critical Event Management

How to Build A Value Laden In-House Recovery Hot-Site

I know you can do it, because I have done it multiple times, for many clients!  Every scenario is different; however, I have saved $150k+ (and much higher) annually in some instances. Enormous savings are achieved due to the high expense of a using a third party vendor for dedicatedRead More

By Marty Fox, 5 years5 years ago
Operational Tips & Techniques

Establish Employee Work-from-Home and Laptop Take-Home Policies and Procedures

Laptops and tablets have replaced desktops as the primary work tool for many employees. This can be a plus in building resilience. With a laptop or tablet and a good virtual private network (VPN), a large percentage of your organization can work securely from anywhere they can get an Internet connection andRead More

By Marty Fox, 5 years5 years ago
Cyber Security

Our Soft Targets MUST Be Hardened Now!

Soft targets have deeply concerned me for many years. One way or another all of our lives are touched when a soft target is attacked whether it is by an irate student, a person filled with hatred for others, nation states or terrorist organizations. As experts, we have the opportunityRead More

By Marty Fox, 5 years ago
Cyber Security

Cyber Security – Automated Virus Patching and Inventory Auditing is Critical!

My interviews with C level executives convey again and again that being the victim of a cyber-attack is their worst nightmare. Imagine walking into the office one morning, turning on your laptop and up pops a ransomware demand to access your files. If you do not meet the demand inRead More

By Marty Fox, 5 years5 years ago
Cyber Security

Cyber Security for Business Continuity – Best Practices for Survival

In the ‘Cyber Security Threats and Vulnerabilities 101’ post we discuss cyber security risks that can potentially impact your employees and the continuity of your operations. Although your Cyber Security and Information Technology departments must secure mobile and desktop devices and the data on them, the survival of your businessRead More

By Marty Fox, 5 years5 years ago
Cyber Security

Cyber Security – Threats and Vulnerabilities 101

Warning: Please do not read this post before you go to sleep.  Threats to the security of desktop, mobile devices and the data on those devices has exploded in recent years. We all know of organizations that have been compromised. There is a saying that there are only two types of companies; theRead More

By Marty Fox, 5 years5 years ago
Cyber Security

Cyber Security – Personal Cloud Data Storage Risks

Employees storing organizational data on personal cloud drives is a serious concern! If employees are storing company data on services such as Dropbox or Box in their personal accounts there could be big cyber and data security issues in your future. These services are valuable for personal use but not unauthorizedRead More

By Marty Fox, 5 years5 years ago

Posts navigation

Previous 1 2 3 4 Next
Recent Posts
  • Scylla – Alertus Real-Time AI Threat Detection & Communications Integration
  • QA Systems Engineer – Adobe
  • AI Prevents Active Shooter Massacres BEFORE the First Shot Is Fired
  • Scylla.ai
  • AI for Critical Event Mgmt
  • Contact
  • Home Page
  • Main Grid
  • Marty test page 1
  • Marty Test Page 2
  • Sample Page
  • thank-you
Hestia | Developed by ThemeIsle