SlideShare ist ein Scribd-Unternehmen logo
1 von 14
08 EXTERNAL
CRISIS –
Changing
Technological
In today's tech-driven age, businesses
heavily rely on technology to perform day-
to-day functions. So, when that technology
crashes, it can be devasting.
Ecommerce sites and software companies
can lose millions of potential leads if their
servers suddenly break. That's not only a
huge loss of potential revenue, but it's also
a major hit to the product or service's
reputation. But how many companies fully
prepare for cyberbreaches, systems
failures, or social media attacks?
Freshfields Bruckhaus Deringer
interviewed 102 crisis communications
specialists who had worked on 2,000
significant reputational risk incidents in
80 countries. The findings are stark:
• Only one in five companies had ever
simulated what a crisis might look
like
• Four in 10 had no plan at all
• 53 percent of companies struck by
crisis did not regain their previous
share price.
Preparing for Technology Crisis
Smaller businesses are arguably the most vulnerable to emergencies. In fact, more than
40 percent of small businesses never reopen following a disaster.
Preparing for technology crises requires several steps. Well-funded models, simulations,
training and especially back-up communications technology – must all exist before crises
hit.
• Bandwidth, hardware and applications arrangements with providers should be pre-
arranged.
• Supply chains must be hardened and cybersecurity plans should extend to a remote
access points. The homes of executives and managers should be electronically
“hardened” with VPNs, among other hardware and software.
How many companies have made these investments?
Power outages can lead to business disruption and
hit at any moment. Infrastructure testing and
emergency protocols can help with business
continuity when the lights go down. Electric power is
one of the most important resources to protect
when it comes to critical infrastructure. Power loss is
something virtually every business could face at
some time, and the results can be disastrous.
A power outage business continuity plan must be
included in an organisation's incident response
protocols. Organisations can also take various
measures to minimise the likelihood of power
outages, such as infrastructure testing and ensuring
ample backup power supply access.
Power Outage
Business continuity and disaster recovery (BCDR) and organisational resiliency plans typically
include strategies for power outages response and necessary resources. These include local
backup power systems, spare power supplies for equipment racks and devices, spare power
cables, power connectors and spare power outlets.
The building infrastructure should be periodically inspected
for power protection equipment, including the following:
• lightning arrestors;
• power conditioners;
• surge suppressors;
• diverse cable routing in vertical and horizontal raceways and cable paths;
• diverse power cable routing into the building; and
• service from two different utility power substations.
Minimising business disruption from power outages
Impact of cyber attack on a business
A successful cyber attack can cause major
damage to the business. It can affect the
bottom line, as well as the business' standing
and consumer trust. The impact of a security
breach can be broadly divided into three
categories: financial, reputational and legal.
Cyber security
Cybercrime tops list of external fraud threats faced by
businesses globally - PwC
The PwC Global Economic Crime and Fraud Survey spans 1,296 executives from 53 countries
and looks at the threat of fraud, the cost of fraud and what companies need to do to develop
stronger responses. It found that
• half of firms have experienced fraud or financial crime in past two years
• of those companies encountering fraud, 70% said there were new incidents of fraud as a
result of the disruptions caused by Covid-19.
• as attacks become more sophisticated and more frequent, external fraudsters are posing a
larger risk to organisations than before.
Rapid shift
Cybercrime overtook customer fraud in this year’s survey as the most common type of fraud
by an external perpetrator experienced by organisations, with the rapid shift to digital over the
past two years also opening companies up to more risk. The highest incidence of cyberattack
was in the tech, media and telecoms businesses, with two-thirds of respondents from this
sector saying they had experienced some form of fraud. Businesses have seen a rise in
ransomware and phishing attacks.
Cybercrime tops list of external fraud threats faced by businesses globally - PwC – The Irish Times
Cyber attacks often result in a substantial
financial loss arising from:
• theft of corporate information
• theft of financial information (i.e. bank details
or payment card details)
• theft of money
• disruption to trading (i.e. inability to carry out
transactions online)
• loss of business or contract
• In dealing with the breach, businesses will also
generally incur costs associated with repairing
affected systems, networks and devices.
Economic cost of cyber attack
Educate employees
01
Best practices
for improving
small business
cyber security Implement safe password practices
02
Regularly back up all data
05
Make sure you’ve got the right
partners and platforms
03
Secure your hardware
04
As cyber criminals evolve and become savvier, it’s
essential to regularly update your employees on
new protocols. The more your employees know
about cyber attacks and how to protect your data,
the safer your business will be.
Send out regular reminders not to open
attachments or click on links in emails from people
they don’t know or expect; outline procedures for
encrypting personal or sensitive information; and
train employees to double check if they get rush
requests to issue unexpected payments—a
common scam.
Educate employees
01
Many data breaches occur due to weak, stolen,
or lost passwords. In today’s world of working
from your own devices, it’s crucial that all
employee devices accessing the company
network are password protected. Have
employees change their passwords regularly by
automatically prompting them to change their
passwords every 60 to 90 days.
Implement safe
password practices
02
Your cyber security is only as good as the security of the
platforms and partners your business depends on. Check the
following:
• Do you have a WAF (web application firewall) in place – to
protect your site?
• Is your ecommerce platform PCI-DSS (payment card industry
data security standards) Level 1 compliant? That will protect
you against digital data security breaches across your entire
payment network, not just a single card.
• Does your website hosting company have staff that are
regularly patching security vulnerabilities – to reduce the
likelihood of attacks?
• Check to make sure each company computer has antivirus
software installed. Even after training employees on how to
identify a phishing email, they may be susceptible.
Make sure you’ve got the right
partners and platforms
03
Data breaches can be caused by physical property
being stolen too. If your servers, laptops, cell
phones or other electronics are not secured and
are easy to steal, you are taking a big risk.
Security cameras and alarms will help, but
physically locking down computers and servers
will help even more. Whether your employees are
working from home, a coworking space, or a
traditional office, be sure they understand how to
keep their company equipment protected.
Secure your hardware
04
No matter how vigilant you are with your cyber security
strategies, data breaches can still happen.
The most important information to back up is:
• Databases
• Financial files
• Human resources files
• Accounts receivable/payable files
Be sure to also back up all data stored on an online drive
and check your backup regularly to ensure that it is
functioning correctly. Your insurance company may also
provide cyber consulting and risk management services, so
check with your agent or broker when choosing your cyber
insurance coverage. You can also hire an outside expert to
evaluate risks!
Regularly back up all data
05

Weitere ähnliche Inhalte

Ähnlich wie Module 8 - External Crisis – Changing Technology.pptx

The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...Citrin Cooperman
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksMarie Wilcox
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewTheEntrepreneurRevie
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine InsurancePeter Hulyer
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideInspiring Women
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxKENNEDY GITHAIGA
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...VMware_EMEA
 

Ähnlich wie Module 8 - External Crisis – Changing Technology.pptx (20)

The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber security
Cyber securityCyber security
Cyber security
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Understanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacksUnderstanding Zero Day Recovery - Your last defence against ransomware attacks
Understanding Zero Day Recovery - Your last defence against ransomware attacks
 
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur ReviewHow to Protect Your Business from Cyber Threats | The Entrepreneur Review
How to Protect Your Business from Cyber Threats | The Entrepreneur Review
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cyber Risk and Marine Insurance
Cyber Risk and Marine InsuranceCyber Risk and Marine Insurance
Cyber Risk and Marine Insurance
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
ZS Infotech v1.0
ZS Infotech v1.0ZS Infotech v1.0
ZS Infotech v1.0
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
Small%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptxSmall%20Business%20Presentation.pptx
Small%20Business%20Presentation.pptx
 
V mware business trend brief - crash insurance - protect your business with...
V mware   business trend brief - crash insurance - protect your business with...V mware   business trend brief - crash insurance - protect your business with...
V mware business trend brief - crash insurance - protect your business with...
 

Mehr von caniceconsulting

Module 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxModule 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxcaniceconsulting
 
PROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxPROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxcaniceconsulting
 
PROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxPROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxcaniceconsulting
 
PROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxPROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxPROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxPROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxPROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxcaniceconsulting
 
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...caniceconsulting
 
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...caniceconsulting
 
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxPROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxcaniceconsulting
 
PROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxPROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxcaniceconsulting
 
PROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxPROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxPROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxPROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxPROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxPROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxcaniceconsulting
 
PROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxPROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxBG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxBG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxcaniceconsulting
 
BG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxBG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxcaniceconsulting
 

Mehr von caniceconsulting (20)

Module 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptxModule 1 - Identifying Common Stereotypes.pptx
Module 1 - Identifying Common Stereotypes.pptx
 
PROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptxPROSPER - Module 4 Unit 3 (v2).pptx
PROSPER - Module 4 Unit 3 (v2).pptx
 
PROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptxPROSPER - Module 4 Unit 2(v2).pptx
PROSPER - Module 4 Unit 2(v2).pptx
 
PROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptxPROSPER - Module 4 Unit 1(v2).pptx
PROSPER - Module 4 Unit 1(v2).pptx
 
PROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptxPROSPER - Module 2 - Unit 3.pptx
PROSPER - Module 2 - Unit 3.pptx
 
PROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptxPROSPER - Module 2 - Unit 2_IT.pptx
PROSPER - Module 2 - Unit 2_IT.pptx
 
PROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptxPROSPER - Module 2 - Unit 1_IT.pptx
PROSPER - Module 2 - Unit 1_IT.pptx
 
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
PROSPER - Module 3 - Unit 4 - Approcci creativi per una migliore inclusività ...
 
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
PROSPER - Module 3 - Unit 3 - Sviluppare senso di appartenenza nel mondo ibri...
 
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptxPROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
PROSPER - Module 3 - Unit 2 Misurare l_appartenenza digitale_IT.pptx
 
PROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptxPROSPER - Module 3 - Unit 1_IT.pptx
PROSPER - Module 3 - Unit 1_IT.pptx
 
PROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptxPROSPER - Module 2 - Unit 4.pptx
PROSPER - Module 2 - Unit 4.pptx
 
PROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptxPROSPER - Modulo 1 - Unità 5_IT.pptx
PROSPER - Modulo 1 - Unità 5_IT.pptx
 
PROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptxPROSPER - Modulo 1 - Unità 4_IT.pptx
PROSPER - Modulo 1 - Unità 4_IT.pptx
 
PROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptxPROSPER - Modulo 1 - Unità 3_IT.pptx
PROSPER - Modulo 1 - Unità 3_IT.pptx
 
PROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptxPROSPER - Modulo 1 - Unit 2_IT.pptx
PROSPER - Modulo 1 - Unit 2_IT.pptx
 
PROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptxPROSPER - Modulo 1 - Unità 1_IT.pptx
PROSPER - Modulo 1 - Unità 1_IT.pptx
 
BG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptxBG PROSPER - Module 4 - Unit 3.pptx
BG PROSPER - Module 4 - Unit 3.pptx
 
BG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptxBG PROSPER - Module 4 - Unit 2.pptx
BG PROSPER - Module 4 - Unit 2.pptx
 
BG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptxBG PROSPER - Module 4 - Unit 1.pptx
BG PROSPER - Module 4 - Unit 1.pptx
 

Kürzlich hochgeladen

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

Module 8 - External Crisis – Changing Technology.pptx

  • 2. In today's tech-driven age, businesses heavily rely on technology to perform day- to-day functions. So, when that technology crashes, it can be devasting. Ecommerce sites and software companies can lose millions of potential leads if their servers suddenly break. That's not only a huge loss of potential revenue, but it's also a major hit to the product or service's reputation. But how many companies fully prepare for cyberbreaches, systems failures, or social media attacks? Freshfields Bruckhaus Deringer interviewed 102 crisis communications specialists who had worked on 2,000 significant reputational risk incidents in 80 countries. The findings are stark: • Only one in five companies had ever simulated what a crisis might look like • Four in 10 had no plan at all • 53 percent of companies struck by crisis did not regain their previous share price.
  • 3. Preparing for Technology Crisis Smaller businesses are arguably the most vulnerable to emergencies. In fact, more than 40 percent of small businesses never reopen following a disaster. Preparing for technology crises requires several steps. Well-funded models, simulations, training and especially back-up communications technology – must all exist before crises hit. • Bandwidth, hardware and applications arrangements with providers should be pre- arranged. • Supply chains must be hardened and cybersecurity plans should extend to a remote access points. The homes of executives and managers should be electronically “hardened” with VPNs, among other hardware and software. How many companies have made these investments?
  • 4. Power outages can lead to business disruption and hit at any moment. Infrastructure testing and emergency protocols can help with business continuity when the lights go down. Electric power is one of the most important resources to protect when it comes to critical infrastructure. Power loss is something virtually every business could face at some time, and the results can be disastrous. A power outage business continuity plan must be included in an organisation's incident response protocols. Organisations can also take various measures to minimise the likelihood of power outages, such as infrastructure testing and ensuring ample backup power supply access. Power Outage
  • 5. Business continuity and disaster recovery (BCDR) and organisational resiliency plans typically include strategies for power outages response and necessary resources. These include local backup power systems, spare power supplies for equipment racks and devices, spare power cables, power connectors and spare power outlets. The building infrastructure should be periodically inspected for power protection equipment, including the following: • lightning arrestors; • power conditioners; • surge suppressors; • diverse cable routing in vertical and horizontal raceways and cable paths; • diverse power cable routing into the building; and • service from two different utility power substations. Minimising business disruption from power outages
  • 6. Impact of cyber attack on a business A successful cyber attack can cause major damage to the business. It can affect the bottom line, as well as the business' standing and consumer trust. The impact of a security breach can be broadly divided into three categories: financial, reputational and legal. Cyber security
  • 7. Cybercrime tops list of external fraud threats faced by businesses globally - PwC The PwC Global Economic Crime and Fraud Survey spans 1,296 executives from 53 countries and looks at the threat of fraud, the cost of fraud and what companies need to do to develop stronger responses. It found that • half of firms have experienced fraud or financial crime in past two years • of those companies encountering fraud, 70% said there were new incidents of fraud as a result of the disruptions caused by Covid-19. • as attacks become more sophisticated and more frequent, external fraudsters are posing a larger risk to organisations than before. Rapid shift Cybercrime overtook customer fraud in this year’s survey as the most common type of fraud by an external perpetrator experienced by organisations, with the rapid shift to digital over the past two years also opening companies up to more risk. The highest incidence of cyberattack was in the tech, media and telecoms businesses, with two-thirds of respondents from this sector saying they had experienced some form of fraud. Businesses have seen a rise in ransomware and phishing attacks. Cybercrime tops list of external fraud threats faced by businesses globally - PwC – The Irish Times
  • 8. Cyber attacks often result in a substantial financial loss arising from: • theft of corporate information • theft of financial information (i.e. bank details or payment card details) • theft of money • disruption to trading (i.e. inability to carry out transactions online) • loss of business or contract • In dealing with the breach, businesses will also generally incur costs associated with repairing affected systems, networks and devices. Economic cost of cyber attack
  • 9. Educate employees 01 Best practices for improving small business cyber security Implement safe password practices 02 Regularly back up all data 05 Make sure you’ve got the right partners and platforms 03 Secure your hardware 04
  • 10. As cyber criminals evolve and become savvier, it’s essential to regularly update your employees on new protocols. The more your employees know about cyber attacks and how to protect your data, the safer your business will be. Send out regular reminders not to open attachments or click on links in emails from people they don’t know or expect; outline procedures for encrypting personal or sensitive information; and train employees to double check if they get rush requests to issue unexpected payments—a common scam. Educate employees 01
  • 11. Many data breaches occur due to weak, stolen, or lost passwords. In today’s world of working from your own devices, it’s crucial that all employee devices accessing the company network are password protected. Have employees change their passwords regularly by automatically prompting them to change their passwords every 60 to 90 days. Implement safe password practices 02
  • 12. Your cyber security is only as good as the security of the platforms and partners your business depends on. Check the following: • Do you have a WAF (web application firewall) in place – to protect your site? • Is your ecommerce platform PCI-DSS (payment card industry data security standards) Level 1 compliant? That will protect you against digital data security breaches across your entire payment network, not just a single card. • Does your website hosting company have staff that are regularly patching security vulnerabilities – to reduce the likelihood of attacks? • Check to make sure each company computer has antivirus software installed. Even after training employees on how to identify a phishing email, they may be susceptible. Make sure you’ve got the right partners and platforms 03
  • 13. Data breaches can be caused by physical property being stolen too. If your servers, laptops, cell phones or other electronics are not secured and are easy to steal, you are taking a big risk. Security cameras and alarms will help, but physically locking down computers and servers will help even more. Whether your employees are working from home, a coworking space, or a traditional office, be sure they understand how to keep their company equipment protected. Secure your hardware 04
  • 14. No matter how vigilant you are with your cyber security strategies, data breaches can still happen. The most important information to back up is: • Databases • Financial files • Human resources files • Accounts receivable/payable files Be sure to also back up all data stored on an online drive and check your backup regularly to ensure that it is functioning correctly. Your insurance company may also provide cyber consulting and risk management services, so check with your agent or broker when choosing your cyber insurance coverage. You can also hire an outside expert to evaluate risks! Regularly back up all data 05