by Heather Engel | Jun 11, 2019
A critical component to a holistic approach to cybersecurity is conducting a penetration test, or pen test, to evaluate computer system, network, or web application vulnerabilities that could be exploited by a hacker. The first question to consider when you...
by Rob Burton | Jun 3, 2019
When a Special Operations (Spec Ops) Team deploys, they are usually well prepared and have analyzed as many contingencies (the what if’s) as they possibly can. The success of these operations is down to many factors such as accurate and timely...
by Brad Cole | Aug 28, 2018
Mental Health Support and Crisis Intervention for victims, survivors and families after an active assailant or hostile event looks different than a natural disaster response, because it is different. Your company, agency, community or region is the victim of a...
by Mark Hoffman | Jun 25, 2018
Recently I was running a hurricane drill for a client in the Caribbean and they were inspecting their campus to see what debris needed to be removed. Each year, as part of the drill, we look for things that could ‘float or fly’ during a hurricane and make plans for...
by David Kalson | Jan 11, 2016
Is this type of cyber attack inevitable? Are we prepared? Veteran newsman, Ted Koppel, is gaining a lot of attention for his new book, “Lights Out: A Cyberattack, a Nation Unprepared, Surviving the Aftermath.” In it, Koppel convincingly argues that a cyber...
by Deb Hileman | Dec 10, 2015
“My company has a business continuity plan. Why do I need a crisis communication plan, too?” Business continuity and crisis management are increasingly on the minds of organizational leaders worldwide. As well they should be. Many senior leaders with a business...