From natural disasters to oil and chemical spills to terrorist attacks to cyberattacks, water distribution systems have to be prepared for a variety of challenges that could contaminate or disrupt the water supply. When a crisis hits, a strong water supply emergency response plan makes sure that stakeholders can make rapid and effective decisions that will minimize the damage and resume operations as quickly as possible. At the core of any successful emergency response is communication—coordinating quickly with other stakeholders for the best possible outcomes. But how can you make your communication strategy A-grade? Here are some tips.
These days crises like breaches, ransomware attacks and natural disasters have become all too common and businesses have to contend with keeping core operations running and addressing any reputation fallout that comes with the crisis. During a crisis, misinformation and rumors can spread quickly and seriously damage a company’s reputation, resulting in lost revenue. That’s why it’s so important for businesses to think about how to protect their reputation during a crisis. Here are five tips on how to do so:
Last week, our CEO Galina Datskovsky and global security expert Paul Viollis hosted a panel titled “Confidential Conversations: Are They Actually Possible in Our Technological Age?”. We were lucky to be joined by a diverse group of journalists, industry experts, and other people in enterprise to discuss how to use communications to improve security, privacy and employee safety. The panel covered a lot of ground—from discussions about human risks to company security to conversations about how to develop legal and business strategies to protect businesses. Here are five of our key takeaways from the conversations that day.
Providing patients in senior living with quality care is a team effort—and that team is diverse. It can include multiple doctors, nurses, other caretakers and, of course, the patient’s family. While keeping everyone on the same page can feel all too difficult—especially with people in different roles in different places at different times—it doesn’t have to be. Keeping everyone in the loop is actually as simple as having the right communication solution on a tool you already have in your pocket: your smartphone.
Just this January, Apple featured a billboard at the Consumer Electronics Show in Las Vegas. “What happens on your iPhone stays on your iPhone,” the billboard stated. The recent news that Apple had contractors listening to Siri conversations for quality control—and that these contractors sometimes had access to deeply personal conversations—debunks this claim. While this news is unsettling, it brings up something important that we all need to know—and talk about: when we use voice assistants like Siri, whatever we say no longer belongs to us. The voice-to-text travels off the device, into the cloud and outside of our control.
With over 106 million customers and applicants’ personal data exposed, the Capital One breach is one of the biggest breaches of a financial institution in US history. A former employee of Amazon’s cloud-computing unit was able to exploit a vulnerability in Capital One’s cloud service provider AWS,exposing some 140,000 Social Security Numbers and 80,000 bank account numbers of US customers.
The US nuclear industry’s safety record is stellar, in part thanks to NRC regulations that arose from Three Mile Island. But complying with NRC regulations is costly: annual ongoing regulatory costs can range from $7.4 million to $15.5 million per plant and can have significant impact on plants and companies’ profitability—with regulatory costs in some cases exceeding profit margins. But while complying with NRC regulations is necessary, the high costs don’t have to be. Nuclear plants can easily and cost-effectively meet NRC regulations with streamlinedemergency preparedness plans that rapidly address events while reducing potential for error.
On Tuesday, May 7, Baltimore city employees came into work to find that their computer screens were locked. “We’ve been watching you for days,” the message on their screens read, “We won’t talk more, all we know is MONEY! Hurry up!” The city of Baltimore had been hit by a ransomware attack; the hackers were demanding $100,000 in bitcoin to release their files.
Consistent communication and collaboration can be tricky when it comes to home healthcare—especially since it involves so many different people in many different places. Along with home healthcare professionals, a patient’s care team can include anyone from their primary care doctor to a range of specialists to family members and other caregivers. Fortunately, HIPAA-compliant mobile messaging (from mobile devices or tablets) is one way to address that challenge, keeping care teams in the loop no matter where they are and with minimal interruption to their schedule.
Smartphones have become an indispensable part of our lives. We use it to keep in touch with families and friends, to handle our bank transactions, to arrange transportation, even to track our health—so it makes a ton of sense for pharmacies to use smartphones to increase patient engagement and satisfaction.
A historically industrial area, Marshall County, West Virginia is accustomed to the occasional industrial emergency. So, when a gas pipeline exploded in June of 2018, people knew exactly what to do. As first responders handled over 37 calls in 3 minutes, they dispatched resources to the site of the emergency. No fatalities, injuries, or property damage was reported as a result of the emergency and damage was contained to 1,100 feet around the site. This was in part thanks to Marshall County’s oil and gas task force, which brings together emergency management officials, first responders, local schools, and representatives from the oil and gas industry to address potential emergencies. Marshall County’s oil and gas task force and its impact on emergencies highlights the importance of engaging multiple stakeholders via regular communications when it comes to incident response.
In an era where data breaches or leaks seem inevitable, business disruptions too frequent and the press all too prone to run away with a salacious story, what can the board of directors do to protect sensitive corporate data? It is all too easy for information to be inadvertently exposed—whether as a result of hacking, a slip of the finger that results in an email being sent to the wrong person, or a disgruntled employee who decides to share confidential information via a text.
As we enter into cybersecurity month it makes me think a lot about my own privacy, and how elusive it has become in the 21st century. It seems that everything we do is now tracked; whenever we visit a web page, call someone on our smart phone, visit the doctor, change the temperature on our smart thermostat or simple talk about a specific subject in our own household, our actions get recorded as data – in theory to make our lives better and more productive. However, in an age when digital privacy is practically an oxymoron, what can people do to protect their privacy?