<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IT Risk Management Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/it-risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/it-risk-management/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 04 Jun 2025 16:43:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>IT Risk Management Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/it-risk-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Executive&#8217;s AI Policy Checklist: Is Yours Missing These Essential Clauses?</title>
		<link>https://fosterinstitute.com/the-executives-ai-policy-checklist-is-yours-missing-these-essential-clauses/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 20 May 2025 14:50:09 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=6039</guid>

					<description><![CDATA[<p>In addition to the typically included clauses in your AI usage policy, such as data privacy requirements, acceptable use guidelines, and compliance with privacy regulations like GDPR or CCPA, some overlook essential clauses. See below to determine if you want to add any if they are missing from your policy: Tool Approval: You could include [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-executives-ai-policy-checklist-is-yours-missing-these-essential-clauses/">The Executive&#8217;s AI Policy Checklist: Is Yours Missing These Essential Clauses?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="whitespace-normal break-words">In addition to the typically included clauses in your AI usage policy, such as data privacy requirements, acceptable use guidelines, and compliance with privacy regulations like GDPR or CCPA, some overlook essential clauses. See below to determine if you want to add any if they are missing from your policy:</p>
<p class="whitespace-normal break-words"><strong>Tool Approval:</strong> You could include a note about a procedure to approve AI tools before they&#8217;re used, especially for work that involves private or company-sensitive information, such as &#8220;Before using a new AI tool, check with the security or IT team… Make sure it&#8217;s on the approved list.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Human Accountability:</strong> Consider stating that they, the person, not AI, are ultimately responsible for decisions and documents they send out. AI suggestions should be reviewed by someone who understands the context, especially since AI is prone to hallucinations, trying to please the user, and being out of alignment with your culture. For example, &#8220;If an AI tool writes an email or gives advice… read it before sending it out or acting on it.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Confidentiality Protection:</strong> Remind employees not to share confidential company or customer information with AI platforms unless approved. Such as &#8220;Don&#8217;t copy and paste customer names, contracts, or financial reports into any AI tools unless explicitly approved in writing.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Incident Reporting:</strong> To help drive home the seriousness of privacy, tell them to notify you with wording such as &#8220;If an AI tool shares the wrong info or leaks something by accident… report it like you would a security breach.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Usage Boundaries:</strong> You could state what activities are acceptable to use AI (e.g., summaries, brainstorming) and where AI is not allowed (e.g., signing contracts, making hiring decisions) such as &#8220;AI can help draft ideas or summarize documents and produce narratives… but don&#8217;t use it to make final calls on people or legal stuff.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Work Documentation:</strong> Consider telling people to save a copy (or cc someone) of all AI-generated work outputs, especially if they&#8217;ll be used in decisions or presented to clients. For example, you could say, &#8220;If an AI tool creates something you plan to use or send… save a copy of the input and output so we can check it later if needed.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Ethical Guidelines:</strong> Include something about the ethical use of AI tools, such as: &#8220;Only use AI tools in ways that are ethical, fair, and respectful of others. Just because a tool can do something doesn&#8217;t mean it should.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Risk Assessment:</strong> You could also get them to think a little more by saying, &#8220;Before using AI for something any task… ask yourself: could this create bias, mislead someone, or share something private? Ask us if you have any doubt.&#8221; (you might want to replace &#8220;us&#8221; with a specific person).</p>
<p class="whitespace-normal break-words"><strong>Harassment Prevention:</strong> Address using AI for harassment or anything that violates someone&#8217;s rights. For example: &#8220;Never use AI tools to create or spread harmful, threatening, or harassing content. Report it right away if you see it.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Societal Impact:</strong> You could also include text to get your team thinking about AI&#8217;s effects on people and society. For example, &#8220;When using AI, ask whether it could hurt someone&#8217;s rights or reputation or lead to larger problems in society… If in doubt, stop and ask.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Mandatory Training:</strong> Providing training is essential for AI use. Include a clause that employees must participate in training about responsible AI use. You could phrase it: &#8220;We&#8217;ll offer training to help you understand how to use AI safely and fairly… and you must participate.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Approved Tools:</strong> Mention the AI tools you have approved. You might say, &#8220;The only allowed AI tool(s) at (your organization&#8217;s name) is/are the (tool or tools) using the identity and credentials you&#8217;ve been provided by (your organization&#8217;s name). No other versions, nor any other AI tools, are allowed and are expressly prohibited unless explicitly approved ahead of time by (person&#8217;s or department&#8217;s name). Don&#8217;t sign up for AI tools using your work email or passwords unless approved.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Usage Monitoring:</strong> Some tools help your IT team track and block access to AI tools. You might consider adding some accountability, such as: &#8220;AI usage can be so dangerous that we are keeping records of which tools you use so we can refer to that information later if there are any problems.&#8221; (This is an example of when it is essential to ask your organization&#8217;s legal counsel whether monitoring what sites they go to is okay.)</p>
<p class="whitespace-normal break-words"><strong>Data Ingestion:</strong> Caution them about the ingestion of data. An example would be, &#8220;Be aware that AI tools with document or email access permissions may ingest, index, and learn from content you create, even if you delete it later, from documents you save, including spreadsheets and letters, and unsent emails. Even if you delete content later, the information may remain accessible through AI systems that have previously processed it. Never enter sensitive, confidential, or potentially problematic content into any document or email draft, even temporarily. If you use the previously common practice of typing emotion-filled documents while &#8220;venting,&#8221; even if you never intend to share the information, use handwritten methods rather than documents or email messages.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Meeting Privacy:</strong> Be sure to address that online meetings are no longer completely private due to AI. Something like, &#8220;Know that meetings are no longer private spaces to have conversations. Content discussed in meetings may be captured in AI-generated transcripts, summaries, or recordings, making even previously casual conversations potentially discoverable in legal proceedings. Avoid discussing sensitive personnel matters, confidential information, or &#8216;off-the-record&#8217; topics in meetings where AI transcription or summarization tools are active. With some commonly used operating systems and tools, this recording is always enabled and difficult to block.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Summary Review:</strong> Give guidance on meeting summaries, such as &#8220;Disable automatically sending AI-generated meeting summaries to attendees. As the meeting organizer, you must review summaries to ensure accuracy before sending them. AI technology can be prone to hallucinations and errors in transcription, especially if the audio quality is less than optimal. People may use the summaries to make decisions, so the summaries must be accurate.&#8221;</p>
<p class="whitespace-normal break-words"><strong>Policy Updates:</strong> Document that you&#8217;ll be updating your policy regularly. You could include &#8220;Check this policy at least once a month or when we ask you to. We will update it as new tools, laws, risks, or AI-related situations arise.&#8221;</p>
<p class="whitespace-normal break-words">I&#8217;m not a lawyer, and this is not legal advice; check with your legal counsel. These are essential aspects that some organizations later wish they&#8217;d included after they experience a bad outcome. As you review this list, you may think of other aspects specific to your organization or industry that you want to include.</p>
<p class="whitespace-normal break-words">A solid AI policy is essential. Please forward this to your friends so they can help ensure they&#8217;ve included often overlooked parts, too.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/the-executives-ai-policy-checklist-is-yours-missing-these-essential-clauses/">The Executive&#8217;s AI Policy Checklist: Is Yours Missing These Essential Clauses?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Your Advanced AI Models Are Now Learning to Give Fake Answers</title>
		<link>https://fosterinstitute.com/your-advanced-ai-models-are-now-learning-to-give-fake-answers-2/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 27 Dec 2024 20:00:40 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5968</guid>

					<description><![CDATA[<p>We&#8217;ve renamed our sweet, playful Golden Retriever &#8220;She didn&#8217;t mean to&#8221; since she&#8217;s unaware of her ability to cause damage. Just like when she bumps into the vase in the hall, it falls to the floor, shattering; even though there was no intention to harm, the damage is done. Just because AI doesn&#8217;t intend to [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/your-advanced-ai-models-are-now-learning-to-give-fake-answers-2/">Your Advanced AI Models Are Now Learning to Give Fake Answers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>We&#8217;ve renamed our sweet, playful Golden Retriever &#8220;She didn&#8217;t mean to&#8221; since she&#8217;s unaware of her ability to cause damage. Just like when she bumps into the vase in the hall, it falls to the floor, shattering; even though there was no intention to harm, the damage is done. Just because AI doesn&#8217;t intend to cause harm, it could, and there&#8217;s lots more than a vase at stake.</p>
<p>AI models are trained to align with human values and never tell people how to cause harm. This is called &#8220;AI Alignment&#8221; training. New research reveals advanced AI models can give answers that demonstrate harmlessness during training and testing, only to drop the &#8220;harmless&#8221; act while operating in the real world. This doesn&#8217;t mean AI will hurt us all soon, but it raises serious concerns about whether the models are actually aligned with human interests.</p>
<p>To score well on your exams, did you ever choose answers you knew the professor wanted, even if you disagreed? Surprisingly, advanced AI systems seem to have developed a similar capability, giving fake answers to match what trainers want during AI alignment training. Scientists at Anthropic, an AI company valued at $18 billion and backed by Amazon and Google, explored this phenomenon in their paper &#8220;Alignment Faking in Large Language Models&#8221; in December 2024.</p>
<p>But hold on; those two paragraphs are written from the perspective that AI is like a human. It is essential to remember that AI models don&#8217;t have intentions or motivations like humans do. The observed behavior is not a conscious decision to deceive humans but results from the training process. Rest assured that scores of people are working on solving this problem and keeping AI results &#8220;safe&#8221; for humanity. When alarmist people predict AI will get out of control, it is more that our programming is flawed; most of us do not believe AI is making conscious decisions.</p>
<p>For businesses using AI tools, this means, from now on, to use AI responsibly, you must evaluate AI answers in two ways:</p>
<ol>
<li>As always, check if the AI is hallucinating and giving wrong information accidentally</li>
<li>And now, pay attention to whether the AI&#8217;s responses align with your values and safety guidelines</li>
</ol>
<p>The research published in the aforementioned article suggests that in regular conversations when AI doesn’t “think” it is being trained or tested, it’s more likely to give straightforward responses based on its core training.</p>
<p>Unfortunately, the discovery that advanced AI has evolved to give fake answers gives skeptics another reason not to trust AI.</p>
<p>As AI becomes more powerful, business leaders must be cautious and aware of risks as well as benefits.</p>
<p>My speeches about AI have focused primarily on its benefits. I’m creating new presentations about managing the emerging AI security risks that responsible business leaders must consider.</p>
<p>As AI becomes more powerful, business leaders must be cautious and aware of risks and benefits. At least I know my dog isn&#8217;t lying to me&#8230; I hope.</p>
<p>The post <a href="https://fosterinstitute.com/your-advanced-ai-models-are-now-learning-to-give-fake-answers-2/">Your Advanced AI Models Are Now Learning to Give Fake Answers</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</title>
		<link>https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 23:27:15 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5730</guid>

					<description><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity. &#160; Considerations for Workplace Operations Loss of Electricity: Without power, most businesses would [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article outlines some realistic consequences of major infrastructure disruptions and provides insights into how these might affect business functionality and employee well-being. By understanding these possibilities, leaders can better strategize and fortify their businesses against unforeseen disruptions, ensuring resilience and continuity.</p>
<h3></h3>
<p>&nbsp;</p>
<h3><strong>Considerations for Workplace Operations</strong></h3>
<p><strong>Loss of Electricity:</strong> Without power, most businesses would experience an immediate halt in operations. This affects everything from lighting to the operation of computers and machinery. Companies that do not have backup power sources might be unable to continue any form of production or service delivery.</p>
<p><strong>Water Supply Disruption:</strong> The loss of water would impact sanitary conditions and halt processes that require water, affecting sectors like manufacturing, food and beverage, and healthcare services. It also raises serious concerns for employee welfare at workplaces.</p>
<p><strong>Natural Gas Outage:</strong> For companies relying on natural gas for heating or as a part of their production process, a disruption would halt operations and affect the heating and comfort of work environments, especially in colder climates.</p>
<p><strong>Communication Breakdown:</strong> The loss of phone and cell services would severely disrupt communication, both internally among staff and externally with clients, suppliers, and partners. This could lead to breakdowns in coordination, missed opportunities, and a drop in customer service quality.</p>
<p><strong>Shipping and Logistics Challenges:</strong> The inability of shipping companies to operate would disrupt supply chains, leading to shortages of materials and products. This would cascade, causing production delays and potentially leading to financial losses.</p>
<p><strong>Food Service Disruptions:</strong> If restaurants and food services cannot operate, it could affect food availability for employees, especially for businesses that rely on nearby food services for staff meals.</p>
<p><strong>Manufacturing Disruptions:</strong> Manufacturing operations would be severely impacted, especially those reliant on continuous processes. This could lead to significant financial losses and contractual penalties.</p>
<p><strong>Financial Impact:</strong> The cumulative effect of these disruptions would be substantial financial losses due to halted operations, spoiled goods, contractual penalties, and loss of business opportunities.</p>
<p><strong>Unusable Work Environment:</strong> Inability to see or work due to power outages, coupled with extreme hot or cold conditions, would affect productivity.</p>
<p><strong>Employee Safety and Morale:</strong> The safety and morale of employees would be significantly affected. Companies may face challenges in maintaining workforce engagement and productivity during such crises.</p>
<p><strong>Employee Prioritization of Family Needs:</strong> With schools closing and potential dangers at home, employees would naturally prioritize the safety and well-being of their families. This would result in increased absenteeism and a significant decrease in workforce availability.</p>
<p><strong>Dependency on External Aid:</strong> Companies would be heavily reliant on external assistance, whether from government aid, emergency services, or community support, to navigate through the crisis.</p>
<p><strong>Long-Term Recovery Challenges:</strong> Even after services are restored, businesses would face challenges in resuming operations, managing backlogs, and dealing with the financial and operational aftermath.</p>
<p>&nbsp;</p>
<h3><strong>Challenges You and Your Employees May Face in Personal Life</strong></h3>
<p>And just as important, how will you support your workers as they face the challenges at home with their immediate and extended families? How will you take care of your family? Here are some of the challenges that company leaders can consider to help employee well-being:</p>
<p><strong>Food Supply Issues:</strong> The lack of electricity would lead to food spoilage at stores and homes, creating a food scarcity crisis. Companies should consider ways to support their employees with necessities in such scenarios.</p>
<p><strong>Cooking and Sanitation Challenges:</strong> Without electricity or gas, cooking would become a significant challenge. Lack of water would also impact basic sanitation, including dishwashing and toilet flushing.</p>
<p><strong>Automobile Fuel Shortage:</strong> Fuel pumps would cease to function without electricity, leading to a fuel shortage. This would impact employees&#8217; ability to commute, further reducing workforce availability and potentially halting any operations involving transportation. Work from home is not an option when Internet connections are down.</p>
<p><strong>Increase in Crime:</strong> A breakdown in public services could lead to increased theft and other crimes, as law enforcement may be overstretched or focused on their own families&#8217; safety. Companies must enhance their security measures to protect their assets and personnel.</p>
<p><strong>Hygiene and Health Concerns:</strong> The lack of water and proper sanitation facilities could lead to hygiene issues and the spread of diseases. This would have a direct impact on employee health and absenteeism.</p>
<p><strong>Inadequate Healthcare Services:</strong> Healthcare facilities might be overwhelmed or incapacitated, limiting access to medical services. This could exacerbate health issues among employees and their families.</p>
<p><strong>Payment and Transaction Challenges:</strong> With credit card machines down, transactions must be conducted in cash, a medium that might become scarce. This would affect both personal transactions and business operations.</p>
<p><strong>Lack of Resilience and Knowledge:</strong> Most people are accustomed to modern infrastructure and might not be resilient to such a drastic change. This could lead to widespread panic and confusion, affecting mental health and the ability to cope with the situation.</p>
<p><strong>Influx of Refugees:</strong> Should your area maintain functional infrastructure, expect an influx of refugees from impacted zones. This could stretch your community&#8217;s resources thinner, intensifying issues like food scarcity, healthcare access, and public safety.</p>
<p>&nbsp;</p>
<h3><strong>Steps to Take:</strong></h3>
<p>Be sure to see the article about ways to make your organization more resilient <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/" target="_blank" rel="noopener">https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</a></p>
<h3></h3>
<h3><strong>Conclusion:</strong></h3>
<p>The ramifications of a disruption in a nation&#8217;s infrastructure extend far beyond the workplace, affecting every aspect of employees&#8217; lives and, by extension, the overall resilience of the business. Leaders must, therefore, not only focus on fortifying their operational infrastructures but also invest in strategies that support their workforce in times of crisis.</p>
<h3></h3>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/">Consequences of Infrastructure Disruptions: A Realistic Assessment for Business Leaders</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</title>
		<link>https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 01 Feb 2024 22:16:45 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[International Security]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Technology Security]]></category>
		<category><![CDATA[Workplace Safety]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5727</guid>

					<description><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include: Envisioning the Business Impact: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s imperative for business leaders to consider how their companies can remain resilient during possible disruptions of their country’s infrastructure for utilities. Expand your disaster recovery and business continuity plans to include:</p>
<p><strong>Envisioning the Business Impact</strong>: Understanding the potential consequences of an infrastructure attack is critical. This includes being aware of how a loss of electricity or water supply, communication breakdowns, or disruptions in shipping and logistics can impact your business. It’s not about anticipating doom; it&#8217;s about recognizing and planning for possible business interruptions.</p>
<p><strong>Interrupted Cloud Connectivity</strong>: In this digital age, many companies have transitioned to cloud-based operations. It&#8217;s crucial to acknowledge that while cloud services offer tremendous benefits, they also present unique challenges, especially in scenarios of power failures and internet outages. Be sure your business continuity and disaster recovery plans consider periods of limited or no access to cloud services, including critical functions like email.</p>
<p><strong>Emergency Communication Plan</strong>: Diversification in communication methods is key. Developing a plan that extends beyond digital and cellular networks can ensure continuous operations. Alternatives like two-way radios, messengers, and satellite phones for key personnel are not just about crisis management, but about maintaining uninterrupted communication channels under various circumstances.</p>
<p><strong>Financial Resilience</strong>: Financial strategies that encompass scenarios like cash-based transactions and alternative payroll methods demonstrate foresight in financial planning. It&#8217;s about ensuring that your business remains operational and your employees are taken care of, regardless of the situation.</p>
<p><strong>Supply Chain Resilience:</strong> In the face of fuel shortages and electricity disruptions, rethinking your supply chain is vital. Local sourcing can reduce dependence on long-distance transport, while increasing buffer stocks of key materials ensures consistent supply flow. Adapting to manual or low-tech inventory management maintains operational continuity when digital systems fail. This strategy is not just about responding to crises; it&#8217;s about proactively creating a robust and flexible supply network for any situation.</p>
<p><strong>Employee Support and Training</strong>: In any challenging situation, the well-being of your workforce is paramount. Educating employees on fundamental resilience skills and establishing support systems for essentials like food and water are not only about disaster readiness but also about nurturing a strong and supportive corporate culture.</p>
<p><strong>Regular Drills and Plan Updates</strong>: Engaging in routine exercises to test and update disaster recovery plans is not just about remaining resilient in worst-case scenarios. It&#8217;s about ensuring that your team is ready and efficient in any form of business interruption, maintaining agility and responsiveness.</p>
<p><strong>Supporting Employees in Crisis</strong>: In any significant disruption, employees will prioritize their families&#8217; needs. Acknowledging and planning for this – through support in food supply, healthcare, and security – is an integral part of maintaining a resilient workforce. The support you provide will encourage employees to remain engaged and productive at your organization during challenging times.</p>
<p><strong>Conclusion:</strong></p>
<p>This article offers essential insights to help your business thrive amidst a wide spectrum of operational challenges. Please forward this to your friends so they can increase their organization’s resilience too.</p>
<p><strong>Comprehensive List of What to Expect:</strong></p>
<p><a href="https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/" target="_blank" rel="noopener">https://fosterinstitute.com/consequences-of-infrastructure-disruptions-a-realistic-assessment-for-business-leaders/</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/executive-guide-to-navigating-power-internet-and-infrastructure-disruptions/">Executive Guide to Navigating Power, Internet, and Infrastructure Disruptions</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</title>
		<link>https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 28 Jan 2024 03:46:40 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Cyber Safety]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5714</guid>

					<description><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk. To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Imagine this: You&#8217;re waiting for a friend, texting them on your iPhone, unaware that a thief is watching you enter your passcode. Moments later, your phone is stolen. In an instant, your Apple life, including Apple Pay, Keychain passwords, and family photos, is at risk.</p>
<p>To combat this, Apple&#8217;s iOS 17.3 introduces “Stolen Device Protection”. Here’s why activating it is crucial:</p>
<ol>
<li><strong>Face ID/Touch ID Requirement</strong>: Your iPhone will require your Face ID or Touch ID to turn off lost mode or erase the phone.</li>
<li><strong>Time-Delay Security</strong>: Changes to your Apple ID password, iPhone passcode, and key settings now have a one-hour delay.</li>
</ol>
<p><strong>Settings for Theft Protection</strong>:</p>
<ul>
<li>Quick Tip to find specific settings: Open Settings, swipe down slightly, and <strong>use the search box that appears at the top</strong>. You will find all of the settings in <strong>bold</strong> text by searching in Settings:</li>
<li><strong>Software Update</strong>: iOS 17.3 enables Stolen Device Protection.*</li>
<li><strong>Backup</strong>: Check your backup status by searching for <strong>Backup</strong> in Settings.</li>
<li>Use <strong>Face ID</strong> or <strong>Touch ID </strong>so potential thieves won&#8217;t see you enter your passcode.</li>
<li>Activate <strong>Stolen Device Protection</strong>:This is the new setting that spurred me to write this blog for you<strong><br />
</strong></li>
<li>Ensure &#8220;<strong>Find My</strong>&#8221; is enabled on Apple devices. Use iCloud.com/find or the Find My app to be sure tracking works.</li>
</ul>
<p><strong>Other Essential Steps:</strong></p>
<ul>
<li>Have alternate login methods for resetting passwords for apps and websites that use multi-factor and two-step logins.</li>
<li>If you use authentication apps, ensure you configure ways to generate codes or recover keys if you lose or erase your phone.</li>
</ul>
<p><strong>If Your Phone is Stolen</strong>:</p>
<ul>
<li>Act Fast: Use <strong>iCloud.com/find</strong> or the Find My app to enable “lost mode” and track your phone.</li>
<li>Consider Carrier Notification: They can disable phone calls and cellular data but might limit Find My functionality.</li>
<li>Device Erasure: If you have backups, and ways to recover keys in authentication apps, use Find My to erase your device to help prevent data access.</li>
<li>Password Resets: If not erasing your phone, consider resetting passwords for critical accounts if passwords are stored on the phone or if apps login automatically.</li>
</ul>
<p>As always, threat actors will seek ways to bypass this protection. As of now, this feature is a huge leap forward to protect an iPhone and iPad from thieves who see the passcode. Congratulations, and thank you, Apple!</p>
<p>*If your phone or tablet is too old to update to iOS version 17.3 or newer, see <a href="https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/." target="_blank" rel="noopener">https://fosterinstitute.com/be-prepared-know-the-impact-of-iphone-theft-and-what-to-do-right-now/.</a> for recommendations.</p>
<p>Note: Testing the Stolen Device Protection feature at home may not work, as Apple devices might waive the strict requirements in familiar locations like home or work. You can read all of the details about Apple Stolen Device Protection for iPhone here: <a href="https://support.apple.com/en-us/HT212510" target="_blank" rel="noopener">https://support.apple.com/en-us/HT212510</a></p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6></h6>
<h6></h6>
<h6></h6>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/safeguard-your-apple-iphones-and-ipads-activate-the-latest-theft-protection-setting-now/">Safeguard Your Apple iPhones and iPads: Activate the Latest Theft Protection Setting Now!</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</title>
		<link>https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 15 Dec 2020 16:15:23 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[CCleaner]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Executives and IT]]></category>
		<category><![CDATA[Infection Vector]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3367</guid>

					<description><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must <span id="more-3367"></span>visit SolarWinds dot com/security advisory immediately for more information.</p>
<p>SolarWinds is a well-respected organization, and many organizations utilize their products. Not enough details are known to discredit their organization. Clearly, attackers see them as valuable enough to use as an infection vector.</p>
<p>This is called a supply chain attack because bad actors use a trusted product in an organization&#8217;s supply chain to attack the organization. A similar well-publicized attack happened with a popular tool, with many benefits, called CCleaner. The attackers successfully compromised 2.3 Million PCs.</p>
<p>The CCleaner supply chain attack is an illustration of dwell time. Attackers waited five months from the time they gained access to CCleaner before they launched the attack on CCleaner users. Many computers were safe, but not 2.3 Million of them.</p>
<p>Remember: Just because your organization fixes a vector through which the infection came does not eliminate damage already done. As an analogy, if you were the king or queen of a castle, and you found that attackers entered your castle walls to attack your city, raising the bridge over your moat does not eliminate the attackers who already made it inside.</p>
<p>Supply chain attacks are one of many reasons to eliminate as much software as possible at your organization. If a program is not essential, remove it asap. SolarWinds is vital for many organizations.</p>
<p>Please forward this to your friends so they can alert their IT departments to address this situation, and know to remove all non-essential software from all computers.</p>
<p>The post <a href="https://fosterinstitute.com/emergency-update-if-your-it-team-uses-solarwinds-products-and-how-to-protect-against-supply-chain-attacks/">Emergency Update if Your IT Team Uses SolarWinds Products, and How to Protect Against Supply Chain Attacks</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 07 Oct 2020 08:00:34 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Remote Worker Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3324</guid>

					<description><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk. When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Workers who use their personal home computers for business put you at significant risk.<span id="more-3324"></span></p>
<p>When another family member shares a work-from-home computer, it magnifies your risk exponentially. If users already work from home using personal home computers, there are potentially cost-free steps to help protect your organization. Consider allowing them to take their work computer home. If their work computer doesn&#8217;t have wireless access, you can provide an inexpensive USB wireless adapter.</p>
<p>Allow your IT professionals, or IT consultants, to monitor and maintain the security of those computers. Many protection tools support remote users, so you might already have what you need.</p>
<p>Dedicated work computers must remain off-limits to other family members. Set a firm boundary that your workers are not authorized to use the computers for any purpose other than working.</p>
<p>Please forward this to your friends, so they know this cost-free way to help protect work-from-home users.</p>
<p>The post <a href="https://fosterinstitute.com/one-nine-year-old-checking-her-email-can-breach-your-entire-organization-and-how-to-protect-yourself/">One Nine-Year-Old Checking her Email can Breach Your Entire Organization, and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Be Smart and Avoid This Comforting Belief</title>
		<link>https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 02 Oct 2020 20:03:41 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[Keep Your Network Safe]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3322</guid>

					<description><![CDATA[<p>Someone told me today, as is common: Attackers are only interested in hacking large businesses. Believing that small to mid-size businesses are not targets helps business owners and executives sleep better at night. The thought is comforting. However, the reality is that instead of choosing targets based on organization size, the majority of attackers choose [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/">Be Smart and Avoid This Comforting Belief</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Someone told me today, as is common: Attackers are only interested in hacking large businesses.<span id="more-3322"></span></p>
<p>Believing that small to mid-size businesses are not targets helps business owners and executives sleep better at night. The thought is comforting.</p>
<p>However, the reality is that instead of choosing targets based on organization size, the majority of attackers choose soft, easy to breach, targets. In particular, that category includes work-from-home computers.</p>
<p>In our consulting business, we&#8217;re seeing many firms suffer major breaches that originate at an unsuspecting work-from-home user&#8217;s computer.</p>
<p>Please forward this to your friends so they know that it may feel comforting to believe attackers only go after the big companies, that belief is putting their organization at tremendous risk.</p>
<p>The post <a href="https://fosterinstitute.com/be-smart-and-avoid-this-comforting-belief/">Be Smart and Avoid This Comforting Belief</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Power Down to Boost Security</title>
		<link>https://fosterinstitute.com/power-down-to-boost-security/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 05 Jun 2020 20:35:40 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Training]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Executive Tips]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3220</guid>

					<description><![CDATA[<p>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network. You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><span>One simple thing you can do to protect yourself is to power off your computer when you are not using it. If you don&#8217;t want to power it down, at least disconnect from your network.</span></div>
<p><span id="more-3220"></span></p>
<p>You&#8217;ll make your computer less attractive to attackers, and it limits the window during which they can attack. You have nothing to lose, and you might even reduce your power bill!</p>
<p>Please forward this to all of your friends, so they know this simple step to protect themselves.</p>
<p>The post <a href="https://fosterinstitute.com/power-down-to-boost-security/">Power Down to Boost Security</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prepare Your Organization for a Reaction to Coronavirus</title>
		<link>https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 26 Feb 2020 21:41:24 +0000</pubDate>
				<category><![CDATA[Disaster Plans]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[IT Risk Management]]></category>
		<category><![CDATA[Threat Protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Plan]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3039</guid>

					<description><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours. I&#8217;m in San Francisco right now at the RSA cybersecurity conference. Hand sanitizer is everywhere, and people are using it. Italy shut down some towns. There is a possibility, however remote, and perhaps [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The city of San Francisco just declared a state of emergency over the Coronavirus. Other cities will follow suit &#8211; maybe yours.<span id="more-3039"></span></p>
<p>I&#8217;m in San Francisco right now at the RSA cybersecurity conference.  Hand sanitizer is everywhere, and people are using it.</p>
<p>Italy shut down some towns. There is a possibility, however remote, and perhaps not for months, that US cities might shut down too. Prepare for the potential impact on your organization. For example, if schools shut down, will some of your workers, including IT team members, be unable to come into work because they need to stay at home to watch their youngsters?</p>
<p>Make sure all of your network users can work from home concurrently. Your IT team might need to increase the capacity of your servers to handle the additional workload. Can your workers use their phones to conduct business remotely? Does your IT team need to set up remote VoIP phone clients? Are IT team members cross-trained to be able to cover other workers&#8217; duties? Does everyone know who to contact at your company for the most current information?</p>
<p>Even if your workers can work, they will put the safety of their families first. When Italy shut down some towns, the grocery stores ran out of food and supplies quickly. Encourage workers to stock up on food and products they usually buy, including non-perishables. They need to have enough medications. Once their family is taken care of first, then your workers can devote attention to work.</p>
<p>Prepare for loss of, or delays in, sales and income. Develop contingency plans. Would the loss of one of your primary suppliers devastate your business? Are you prepared if some essential piece of machinery, or network server, needs repair and you cannot get spare parts? Assign someone or develop a team at your company to focus on the risks and develop contingency plans. Remember IT.</p>
<p>Warn your workers that there will be an increase in spam and phishing as bad actors prey on their worries of the virus. They must be vigilant to spam and fake news.</p>
<p>For more information, Homeland Security offers suggestions at <a href="http://ready.gov/business/implementation/IT" rel="noopener noreferrer" target="_blank">ready.gov/business/implementation/IT</a> CDC provides a useful document at <a href="http://CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf" rel="noopener noreferrer" target="_blank">CDC.gov/flu/pandemic-resources/pdf/businesschecklist.pdf</a> </p>
<p>Notice signs of things to come including a potential reaction to the virus. The falling stock market is a sign, Italy closing cities is a sign, and San Francisco declaring a state of emergency is a sign. Prepare now in case things start happening rapidly.</p>
<p>Please forward this to your friends so they can prepare their organizations for possible public panic and quarantines over Coronavirus.</p>
<p>The post <a href="https://fosterinstitute.com/prepare-your-organization-for-a-reaction-to-coronavirus/">Prepare Your Organization for a Reaction to Coronavirus</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
