Wednesday, March 29, 2017

Workplace Violence

March 29, 2017 - April is Workplace Violence Month, a good time to think about our own violence risks. Workplace violence is often in the news, usually in the form of shootings, but workplace violence runs the gamut from bullying to physical violence of all types. It usually underreported for one reason or another. It can be caused by almost anything... an argument at home, a reprimand from a boss, a restraining order, etc. Awareness and alertness on the part of management are two ways to spot potential violence, but employee training can also help identify the risk. This week’s articles look at various strategies to identify and deal with this ever-escalating problem.

Victims of workplace bullying are suffering in silence and perpetrators are safely and legally continuing the abuse. (Item #1)   This article about workplace violence answers your questions for the health and safety of your employees. (Item #2)   We have to consider that any employee served with a restraining order should be treated as a reason to take workplace security precautions. (Item #3)

Reducing the risk for workplace violence begins and ends in the workplace with a company's leadership. (Item #4)  Workplace violence mitigation requires ongoing attention and senior management commitment in personnel security. (Item #5)   Most companies go to great lengths to protect employees from danger, such as fire drills, safety equipment and extensive courses of safety instruction that encompass standard corporate procedures. With respect to workplace violence, however, most companies are unprepared and vulnerable. (Item #6)

For the full issue, click here.

Wednesday, March 22, 2017

Meeting and Event Planning

March 22, 2017 - Wherever groups of people gather, there exists the potential for disaster or disruption. There are plenty of examples in the news every day to underscore this truth. So, when you have a large important meeting coming up, are you doing everything you can to help prevent something from mucking it up? This week's articles look at everything from helping attendees stay healthy and attentive to how deep to delve into venue security. We hope they will encourage you to take a fresh look at your meeting plans.

In the current environment, what's an event planner to do? Plan for disaster with these best practices. (Item #1)   Have you heard the one about the women in high heels running down a hotel lobby with stolen flat-screen televisions and a blue Rubbermaid bin full of event supplies? (Item #2)   With potential threats constantly evolving, everyone must be informed & cooperative for meeting security to work. (Item #3)

Do you know what precautions you should take to protect meeting content and proprietary information? (Item #4)   Check out these top 10 healthy meeting tips. (Item #5)   IAEE and ESCA have announced a collaboration with DHS to develop guidelines and standards for event safety and security. (Item #6)

For the full issue, click here.

Wednesday, March 15, 2017


March 15, 2017 - There are many reasons that your business might be required to shelter-in-place, including chemical spills, terrorist attacks, flooding, tornados, biological contamination, etc. Do you have a plan for sheltering in place? Supplies and equipment to keep people safe and comfortable for several hours or a day?

What is the difference between shelter in place and lockdown, and when is it appropriate to do each? (Item #1)   When conditions outside get tough, where will building occupants go? (Item #2)   Here's what every landlord needs to know about shelter-in-place orders. (Item #3)

If you perceive any threat in your area that would include a chemical, biological, or radiological hazard, you need to put together a Shelter in Place Kit. (Item #4)   All Americans should have some basic supplies on hand in order to survive for at least three days if an emergency occurs. (Item #5)   Here are some sample shelter-in-place procedures to help you plan. (Item #6)

For the full issue, click here.

Wednesday, March 8, 2017

Reputation Management

March 8, 2017 - It would be most unusual if no one has yet posted anything bad about your company or organization online. In today's social media climate, everybody has the ability and the platform to tell the world what they don't like about you. And make no mistake... they will do so. Your reputation is at stake and you need to be prepared to deal with the negative that's bound to show its ugly head sooner or later. This issue sheds some light on how to develop and carry out a reputation management strategy.

No matter the size of your business, they (prospects, customers, clients... anyone and, potentially, everyone) are talking about you. (Item #1)   how can companies guard their online reputation as effectively and efficiently as possible? (Item #2)   Online reputation management involves placing new content online that pushes old or unwanted content lower in search results. (Item #3)

Everyone has an online footprint and it can make or break your success. (Item #4)   Right or wrong, what is being said online can have a major influence on what others think about you. (Item #5)   Check out some of the best reputation management tools around. (Item #6)

For the full issue, click here.

Wednesday, March 1, 2017

Insider Threats to Business Continuity

March 1, 2017 - Most organizations today have programs in place to guard against external threats. But insider threats, whether malicious or unintentional, are not always easy to identify and may be more difficult to protect against. Large and small companies are at risk, and there are things both can do to help prevent security breaches by insiders. This issue can help.

Here's why you need a proactive approach to protecting information assets from authorized users with malicious intent. (Item #1) This article discusses practical steps that organizations can take to protect data and systems from insider threats. (Item #2) More than 50 percent of data breach incidents in 2014 can be attributed to insiders. (Item #3)

While the most modern type of insider threat is often borne by electrons via fiber-optic cable, it is by no means the only type of insider threat. (Item #4) Businesses spend both time and money to protect data from hackers; but what about the security threats posed by insiders? (Item #5) Security lapses don't always involve IT staff or employees with valid user credentials; they can also include business partners, suppliers and contractors, as well as third-party service providers. (Item #6)

For the full issue, click here.