Wednesday, October 17, 2018

Crisis Communication

October 17, 2018 - As you read through this week's articles, you will see several themes... respond quickly, tell the truth and apologize. There's lots more good information as well. Companies have to act like people in a crisis situation, and the way they communicate can enable that perception in their stakeholders. We hope you don't have to put this information to use, but, let's face it, stuff happens, and we all need whatever help we can get just in case.

Starbucks raised the bar on how to do what's right when something goes wrong. (Item #1)  Here are five crisis communications takeaways from the characters of "Stranger Things." (Item #2)  Unsure of where to begin preparing to communicate in a crisis? Here are seven tips your organization should master. (Item #3)

In this digital age, there are several questions crisis communication plans should address. (Item #4)  Here's a look at five examples of crisis communication fails and what we can learn from them about what not to do in a business crisis. (Item #5)  While this expert says that "crisis is inevitable," she believes that when handled properly a crisis can actually give a boost to an organization. (Item #6)

For the full issue, click here.

Wednesday, October 10, 2018

Cybersecurity Awareness Month

October 10, 2018 - This October is the 15th observation of National Cyber Security Awareness Month, an initiative to raise awareness of the importance of cybersecurity. The theme for 2018 is "Cybersecurity is our shared responsibility and we all must work together to improve our Nation's cybersecurity." These articles focus on the five Cybersecurity Framework Function areas: identify, protect, detect, respond and recover.

The first step in protecting a business from cyber threats is to identify the "crown jewels" of your business – those assets and systems that are critical to your business. (Item #1)   Here is a cybersecurity toolkit created for small and medium-size businesses. (Item #2)   Market pressure to adopt online security will come from these major factors. (Item #3)

To help organizations identify breaches sooner, breach detection platform provider Lastline lists seven tips. (Item #4)   Experts weigh in on the most important considerations when developing a cybersecurity incident response plan. (Item #5)   66 percent of organizations would not recover from a cyberattack if it occurred today. Is your organization prepared? (Item #6)

For the full issue, click here.

Wednesday, October 3, 2018

Fire Prevention, Preparedness & Safety

October 3, 2018 - National Fire Prevention Week, this year Oct. 7-13, has been observed since 1922 in the week in which Oct. 9 falls to commemorate the Great Chicago Fire, which occurred Oct. 8-10 and killed more than 300 people. October also is National Fire Prevention Month. Each year at this time we like to focus on fire safety, prevention, and preparedness. Take a look at this week's articles to see how to prepare and stay safe at work and at home. Don't take your safety for granted.

All companies should create a basic fire prevention plan for fire safety. (Item #1)  To protect yourself, home, and loved ones, follow this fire safety guide, so you're prepared for the worst. (Item #2)  Having your door closed makes a 900 degree difference in a fire. (Item #3)

Fire takes more lives in the workplace than anything else... here are some tips to prevent such fatalities.  (Item #4)  Pull, aim, squeeze, sweep (PASS)... do you know to what this refers? (Item #5)  Fire evacuation procedures are critical... make sure everyone knows them. (Item #6)

For the full issue, click here.

Wednesday, September 26, 2018

Meeting & Event Emergency Management Planning

September 26, 2018 - Every event or meeting is both an opportunity for success and a possible potential for failure; you just never know what might happen. But planning can help ensure success, or at least, help deal with disasters to avoid catastrophe. These articles identify many possible pitfalls and ways to overcome them.

What's your "Convention Misery Index" number? (Item #1)   Here is a list of nine threats to your event and how you might overcome them. (Item #2)   Here are 10 painful moments every event manager will have experienced at one time or another and how to tackle them. (Item #3)

Here are some lessons learned from event planning failures. (Item #4)   What makes great events so memorable, and how can we bottle up that magic and replicate it in the future? (Item #5)   Being prepared is the #1 way to avoid a crisis when you can and mitigate the damage when you can't. (Item #6)

For the full issue, click here.

Wednesday, September 19, 2018

Recovering from a Data Breach or other Cyber Attack

September 19, 2018 - Statistically speaking, as you read this, you could become the victim of a data breach or cyber attack. We hope that is not the case. But, given the prevalence of such attacks, you should certainly have a plan of how to deal with one should an attack happen. If you have been hacked, you might want to read Item #6. If not, this week’s other articles could be helpful to you.

This plan for recovering from a data breach will vary from business to business, but it should always contain these four essential steps. (Item #1)   Data security experts answer the question "What's the most important next step you should take following a data breach?" (Item #2)   Once a breach has been discovered, the organization should take these immediate steps to limit the impact of the breach. (Item #3)

Hidden costs of data breaches may include cybersecurity insurance premium increases, lost contract revenue, loss of intellectual property, lost customers, business disruption, devaluation of trade name, and increased cost to raise debt. (Item #4)   This article explores four major points on how to recoup your security procedures so that they're stronger than ever before --- even if you haven't suffered the embarrassment of a breach. (Item #5)   Here are the missteps executives make time and again after a data breach and advice for avoiding these pitfalls. (Item #6)

For the full issue, click here.