Wednesday, March 30, 2016

Workplace Violence

The month of April is Workplace Violence Awareness Month and is commemorated nationally, for the fifth year, by the Alliance Against Workplace Violence (AAWPV). AAWPV intends to “highlight the preventable nature of most workplace violence incidents.” This issue reinforces their efforts... please take the time to read how you can recognize and help prevent violence in the workplace.

Employers need to be on the lookout for workers who display any of these eight warning signs of violent behavior. (Item #1)   Employers can’t prevent all workplace violence, but they can take steps to minimize the chances of workplace violence. (Item #2)   Not all measures will be practical in every workplace, but effective measures that could reduce the risk of violence may be found for any workplace. (Item #3)

Workplaces must stay vigilant by enforcing their own workplace human resources/security policies. (Item #4)   The moment of termination is often a crisis; if it's handled well, everything thereafter goes smoothly, but if it's handled poorly, anything can happen. (Item #5)   Whether or not an employer ignores complaint of workplace violence, minor or major, the employee should report all incidents in writing as soon as possible to a supervisor or manager and alert security to the situation. (Item #6) 

Past NewsBriefs are available at

Wednesday, March 23, 2016

Meetings & Events

At today's meetings and events, the security of your content is as important as the safety and security of your attendees. You still need to take all the usual steps of creating a plan, assessing the risks, and testing that plan. What's newer, however, is the critical need for security of any intellectual property at events. This issue provides valuable information on every type of security needed at your event.

Meeting planners for any kind of company or association can learn valuable lessons from their peers in the insurance business. (Item #1)   Here's a checklist detailing safety, contingency and disaster preparedness for the meetings, events, conferences and conventions. (Item #2)   Keeping attendees safe, and ensuring proprietary information stays out of the public domain must be part of any solid strategy for any meeting or event. (Item #3)

These five tips can improve event security and site protection and security's role in event planning. (Item #4)   Here are nine questions to ask with regard to risk management and planning for meetings and events. (Item #5)   With the right precautions and participation from attendees, planners can greatly reduce the threat of theft of intellectual property. (Item #6)

Past NewsBriefs are available at

Wednesday, March 16, 2016

Reputation Management

What value do you put on your organization's reputation? Is it a critical part of your business continuity plan? It certainly should be. In today's world, where almost no information remains “secret” for long, protecting your company's name should be at least as important as protecting its assets, because reputation is one asset that is easy to destroy... and difficult to rebuild. This week's articles provide information on this critical aspect of your organization.

Weber Shandwick shares research results on the evolution of brand and reputation. (Item #1)   Many organizations put the importance of a good reputation to the back of their minds while they attend to more hard-edged, day-to-day urgencies. (Item #2)   Here are several reasons why employees will become even more critical in managing an organization's reputation. (Item #3)

For many small businesses, the complete lack of proactive reputation management leaves them in the position of a sitting duck. (Item #4)   The essence of reputation building lies, not in posturing and spin doctoring, but in authentic communication internally and externally to stakeholders. (Item #5)   Online reputation management (ORM) services can help you stop, fix and prevent PR disasters, as well as protect and promote your brand. (Item #6)

Sign up for (or just peruse) the NewsBriefs at

Wednesday, March 9, 2016

Insider Threats to Business Continuity

If you looked around you, could you pick out which of your colleagues is an insider threat? Maybe, but probably not. And, if you could, what would/could you do about it? Sadly, most organizations do not have a much better chance of picking out the threats than you do and less of an idea on how to mitigate the risk they present. If you don’t know how to identify and deal with these human risks, however, your organization can suffer serious consequences. Take a look through this week’s articles to find some ideas on how to deal with insider threats.

Here’s why you need a proactive approach to protecting information assets from authorized users with malicious intent. (Item #1)   While the motivations are usually the same, there are three distinct, but different, types of insiders that can pose a threat to your organization's security. (Item #2)   Organizations can successfully mitigate insider threats using the measures outlined here. (Item #3)

In this article TK Keanini looks at the practical steps that organizations can take to protect data and systems from insider threats. (Item #4)   Teach your employees to keep a secret — after all, your company’s secrets are the treasures you’re trying to protect. (Item #5)   The answer to the question of why some companies would have no special protection against insider threats is an easy one: leaders and managers who make those decisions are people too and given to naturally positive human assumptions and ignorance. (Item #6)

Sign up for (or just peruse) the NewsBriefs at

Wednesday, March 2, 2016

Shelter in Place

Shelter-in-place orders are used more than you might think. Just last month, UMass Amherst (MA) and Gadsden State (AL) were on lockdown for various reasons. Chemical spills in your vicinity, fires, active shooter incidents and many other situations may required that you shelter in place for some period of time. We’re sure you know that you need water, medical supplies, foot, etc., in order to shelter in place. In this week’s articles are some things you may not have thought of.

When conditions outside get tough, where will building occupants go? (Item #1)   How do lockdown and shelter-in-place situations differ? (Item #2)   Remain calm and carry out the procedures in your plan in the event of any situation. (Item #3)

Temporary SIP is a public protection tool used by communities in the United States and around the world; this guidebook discusses the effective use of SIP in the event of a chemical hazard. (Item #4)    To best prepare your staff for an active shooter situation, create an Emergency Action Plan (EAP), and conduct training exercises. (Item #5)   Here is a general guide for preparing a shelter-in-place plan in the workplace. (Item #6)

Sign up for (or just peruse) the NewsBriefs at