Spring World 2018

Conference & Exhibit

Attend The #1 BC/DR Event!

Winter Journal

Volume 30, Issue 4

Full Contents Now Available!

Industry Hot News

Industry Hot News (354)

Plunging temperatures, whiteout conditions, and icy roads can turn into a crisis even in the most prepared cities and states.

As a result, this is the season that puts crisis communication to the test. Consider how well your employees and security teams are prepared for communicating internally in the event of a weather emergency.

Plan Activation Strategies

Activation strategies are a crucial component to ensuring proper recovery during and after inclement weather. This strategy will put into action a crisis response team to handle the situation as quickly as possible. Crisis preparation involves a series of procedures that need to be in place ahead of time. This is essential for maintaining internal communications for your workers.

Internal notification software, such as CodeRED from OnSolve, is designed specifically for communications during an emergency situation. By incorporating this government-approved notification solution into your office, internal communications can be handled no matter the situation. Thanks to automated, advanced warnings along with geo-location communication using a variety of delivery modalities, internal notification systems integrate seamlessly into businesses of all sizes.



Monday, 15 January 2018 16:01

Employee Communication in Inclement Weather

OnSolve’s chief product officer, Daniel Graff-Radford, recently interviewed with SDM Magazine to discuss how mobile and integrators are a driving force behind today’s mass notification systems.

Whether choosing to go mobile or become a hard-wired hybrid, here are three ways mass notification systems are changing rapidly.

1. Mobile Integration Success

Mobile integration allows emergency communication to take place across a larger network. Emails, social media, texting and other forms of mobile communication can be achieved all at once using wireless. As a result, you have the potential to communicate with more people in a shorter span of time.

Yet mobile communication is not always perfect, especially in the case of a large-scale emergency or a cyberattack. The best move?  Pursue IP wireless. This gives the organization much-needed control over the network. An organization can structure and prioritize emergency notifications based on the event type and its location This integration provides mobile accessibility with the security associated with analog.



Crisis management, public relations, and business continuity are tested during a disaster event. Today, we’re analyzing business continuity plans and disaster response to determine a good public relations response vs. a bad one.

For today’s post, I thought we might try something new. Rather than write a formal article, I wanted to share some things with you that have been on my mind lately about business continuity and disaster recovery.

I have been observing other organizations’ disaster response efforts from the outside and trying to work out what’s really going on based on what we see in the media, as well as about what separates a good public relations response to a crisis from a bad one. I’ll touch on these and other topics below.



The end game for data center infrastructure management (DCIM) software is that it eventually enables self-managing, or fully autonomic, data centers.

The hope is that AI-driven management software (likely cloud-based) will monitor and control IT and facilities infrastructure, as well as applications, seamlessly and holistically – potentially across multiple sites. Cooling, power, compute, workloads, storage, and networking will flex dynamically to achieve maximum efficiency, productivity, and availability.

Facilities equipment and IT will also be self-healing to some degree by applying cloud-based analytics to sensor data harvested from thousands of sites to guide and enact targeted predictive and preventive maintenance programs. Spare parts will be ordered, tested, and installed (perhaps by dexterous robots) to exactly align with when they are required to avoid failures but also to avoid unnecessary maintenance and testing.  



On Jan. 5 of the new year, emergency managers sent a letter to the FCC requesting, among other things, to allow a more precise targeting of alerts during a potential disaster and to accomplish via device-based geo-targeting and to do it before May 2019.

On Tuesday, the FCC responded with a 49-page proposal, calling for device-based geo-targeting, which would send alerts to cellphones in areas targeted — as small as one-tenth of a mile in radius. This would be a huge upgrade from the current Wireless Emergency Alerts (WEA) system, which allows for targeting cellphones in a county.

This and other recommendations, could be approved at a Jan. 30 meeting in Washington, D.C. If approved, the upgrades would have to take place by November 2019.



Self-driving cars may be getting all the attention, but the big impact of artificial intelligence and machine learning in the enterprise is in cybersecurity, and especially in securing data center networks. And given all the threats data centers are facing this year the help is much needed.

According to a recent survey of 400 security professionals by Wakefield Research and Webroot, a cybersecurity vendor, 99 percent of US respondents believe AI overall could improve their organizations’ cybersecurity. And 87 percent report their organizations are already using AI as part of their cybersecurity strategy. In fact, 74 percent of cybersecurity professionals in the US believe that within the next three years their companies will not be able to safeguard digital assets without AI.

AI and machine learning are being used to spot never before seen malware, recognize suspicious user behaviors, and detect anomalous network traffic.



The past few decades have seen a significant increase in society’s level of awareness and investment in personal and workplace safety. In the opinion of those of us at MHA Consulting, similar attention must be given to business continuity.

In this article, we will sketch out the rise over the past few decades of what might be termed “safety culture,” define an envisioned “continuity culture,” and set forth how such a culture can be brought into being at your organization.

The rise in safety consciousness in today’s society can be seen in everything from the creation of the U.S. Occupational Safety and Health Administration in 1971 to the introduction of polarized electrical plugs to the increasing emphasis on people’s wearing seatbelts and bicycle helmets. In the business world in particular, many companies have over recent decades developed a strong emphasis on safety, with consideration for safety permeating everything their employees do.



You’ve probably been there before, at least once. Colorful lights rotating off the ceiling and walls. Music that plays a touch too fast, usually on purpose. Singers who are … enthusiastic in their performance. We’re talking, of course, about singing karaoke.

People love to watch amateurs sing, as demonstrated by the host of amateur singing shows on television, from The Voice to American Idol to The X Factor. The singers’ hearts always seem to be in the right place, even if the notes and words sometimes aren’t. At the end of the day, it’s the effort that counts, right?

You might be wondering what all the silly, at times humiliating goodness of karaoke singing has to do with your network security. It’s simple, really.

Amateur performance is fine when it comes to singing karaoke. When it comes to managing your network security? Not so much. You wouldn’t want that sloppy-but-well-meaning guy in the pub singing on your favorite artist’s new record. So why would you want anything but the very best securing your network, which houses your most precious data and trade secrets?



Thursday, 11 January 2018 15:50

Are You Confident in Your Network Security?

So you’ve locked down your perimeter defenses tightly and implemented comprehensive monitoring and remediation facilities.

All your employees have been trained to spot potential phishing attacks and your email filtering ensures bad actors get dumped unceremoniously into the street, long before their spam and malware gets anywhere near your gleaming infrastructure.

Even your pentesters have started to complain that they’re running out of attack vectors.

Before you decide to relax, there’s something you may have overlooked.



This is part 2 of a 3-part series on digital blueprints. Click here to read part 1. 

Digital transformation has tremendous potential to unleash value for organizations; therefore, organizations in increasing numbers are formulating digital strategies.  However, we find that many are missing significant transformation and value, which are both made possible by holistic enterprise digital strategies.  Many digital strategies are focused too narrowly.  For example, leaders claimed that they are achieving the digital strategy by moving applications and infrastructure to the cloud.  A digital strategy establishes the enterprise vision and priorities for digital transformation.  To power your digital transformation, leverage a digital blueprint – a structured approach to evaluate opportunity areas, value drivers, and risks, and ultimately align the digital path with business drivers.



Page 1 of 2