Tag Archives

14 Articles

Building Resilience and Psychological Safety (w/ Dr Dan Radecki)

Posted by Alex Fullick on
0
Business
Building Resilience and Psychological Safety (w/ Dr Dan Radecki)

Join me Thursday, July 6/23 at 1pm EST! I talk with Psychologist, author, and the co-founder of the Academy of Brain-based Leadership (ABL), Dr. Dan Radecki, as we talk about the book he co-authored ‘Psychological Safety: The key to happy, high-performing people and teams’.

To build resilience, whether in a team or an organization, a person needs to build psychological safety for themselves…but how.

Dr. Radecki talks about:

1. Defining Psychological Safety,

2. The co-pilot (Pre-frontal cortex),

3. Biases (What it really is and how we can manage them),

4. The SAFETY model (Security, Autonomy, Fairness, Esteem, Trust, You),

5. How to build a resilient brain with NETS and TRAIN,

6. Understanding our triggers,

7. How mindfulness helps us with resiliency,

8. Building strong networks for resilience,

9. How to get started building a resilient team…and it’s now what you think.

Dr Radecki provides some incredible insights into how we can create resilience for ourselves, our organizations, and our communities but starting with ourselves. Enjoy!

Preparing4Unexpected-AFullick.jpg

Supply Chain Security with Andrew Owlett

Posted by presspass on
0
Business
Supply Chain Security with Andrew Owlett

Join me Thursday, March 2/23 at 1pm EST on the VoiceAmerica Business Channel!

upply Chain Management (SCM) is a major topic amongst organizations and their leadership, but do they have an understanding of Supply Chain Security (SCS)? I talk with Supply Chain Security expert Andrew Owlett who provides some great insights into SCS.

We talk about:

1. Defining Supply Chain Security vs Supply Chain Management,

2. Why the security of supply chains is important,

3. The security of physical and cyber suppliers and partners,

4. Ownership and the many parties that need to be involved,

5. Creating and validating ‘controls’ (mitigating activities), and the challenges that can be encountered,

6. Assessing vendor capabilities and building good relationships with them…and much more.

Andrew sheds allot of light on an important topic. If you have concerns about your supply chain management and security, you don’t want to miss Andrew’s insights. Enjoy!

Preparing4Unexpected-AFullick.jpg

Minimizing Cyber-attack Impacts: Digital Supply Chain Management

Posted by rstapholz on
0
Business
Minimizing Cyber-attack Impacts: Digital Supply Chain Management

Join me August 4/22 at 1pm EST!

There is allot of focus on our physical Supply Chains, but what about digital supply chains? I talk with long time lead auditor for ISO 9001, ISO 27001 and other standards, Willy Fabritius. Willy takes a different view of Supply Chain Management and talks about the digital aspects, rather than the traditionally focus of physical products and their supply chains. It’s a new perspective that hasn’t been fully talked about until now.

Willy talks about:

1. Defining digital supply chains,

2. Digital supply chain issues,

3. Products and Services obtained through a digital manner,

4. Impacts of digital changes to products already in use,

5. Key program components and possible solutions,

6. Risk Assessments / Analysis,

7. Regulatory requirements,

8. User awareness (People aren’t as aware as you might think.),

9. Incident management and learning from them,

10. Management Systems,

11. Independent reviews and assessments (Governance)…and more.

It’s a very informative talk with a focus many aren’t considering in Supply Chain Management; the digital aspects. Don’t miss this!

Enjoy!

Preparing4Unexpected-AFullick.jpg

Top Benefits of Online Faxing Over Traditional Faxing

Posted by rstapholz on
0
Business
Top Benefits of Online Faxing Over Traditional Faxing

Even though faxing may seem outdated technology with the latest advancements in technology, many organizations including healthcare, legal, and government institutions still use faxing to share their documents with suppliers are clients.

In fact, these organizations expect to be able to conduct business with your company over fax. Hence, you need to maintain a fax facility without burdening yourself with the physical resources that traditional faxing consists of. That is where online, electronic, eFax, or virtual fax from ifaxapp comes in handy.

Virtual faxing is the modern solution to traditional faxing. It helps you to upload electronic documents to an online fax portal to securely send your document to the required fax number. On the other hand, your organization will receive incoming faxes as an electronic attachment to a selected email address. Here are 6 important benefits of switching to online faxing.

  1. Fewer Resources Required

You don’t need a physical fax machine and space to store it in your office with virtual faxing. There are no ink or paper purchases, equipment maintenance, or repair with online faxing. Since eFax uses the internet, you don’t need a dedicated line for faxing.

  1. Location Flexibility

Virtual faxing lets you receive faxes from anyone or anywhere in the world provided they have access to the internet. Incoming faxes will be sent straight to your email inbox. In fact, you will have immediate access to any important documents with such a facility whether you are out of the office, on a business trip, or working from home. The same is true when sending a fax. You will be simply uploading an electronic document to the online fax portal to send a fax to another organization.

  1. Convenience

No more waiting near the fax machine to receive or send a fax with online faxing. You can upload outgoing faxes and receive incoming faxes to your email inbox with the click of a mouse from your computer. Online faxing lets you send the same fax to multiple fax numbers at the same time. Also, you can have multiple people sending you incoming faxes to your inbox at the same time.

  1. Going Green

A traditional fax machine will print every fax whether it is important or not. It leads to a lot of waste in paper and ink over time. In the U.S. alone, fax machines consume more than 200 billion pages of paper each year. That is a lot of paper. When you rely on virtual faxing, you get the document to your email inbox. So you don’t need to print out the document unless you require a physical copy of the document for whatever reason.

  1. Greater Security

Online faxing is more secure than traditional faxing. In traditional faxing, even sensitive information is sent open through the fax machine. That is not the case with online faxing. In fact, you will receive encrypted files when someone sends you a fax, and only whoever has access to your email can access the document. You can protect sensitive information by restricting access to your inbox.

  1. Ease Of Recordkeeping

You can sort out files and documents electronically from your email with virtual faxing. You don’t need to store these faxes in a physical location like with traditional faxing. On the other hand, you can view a log of outgoing and incoming faxes on the online fax portal.

How Do Fingerprint Scanners Work?

Posted by rstapholz on
0
Business
How Do Fingerprint Scanners Work?

Many modern IoT (Internet of Things) apps rely on fingerprint sensors to identify users and for security and safety purposes. Fingerprint sensors have become commonplace in smartphones and wearable devices (as well as in smart home applications and the smart industry) for data security and entry identification. The importance of device fingerprinting is rising to protect our devices. However, when it comes to fingerprint sensors, two common types are in use today. These are capacitive sensors and optical sensors. Here is a look at how they work.

Optical Fingerprint Scanner versus Capacitive Fingerprint Scanner

Whether you want to identify yourself before entering a building or secure your phone, fingerprint sensors are a reliable way to add identification and security with ease. In the modern world, there are two common ways these sensors are being used, and that’s either through capacitive or optical sensors.

How Do Optical Fingerprint Scanners Work?

While optical fingerprint sensors might sound like new technology, it’s worth noting that they’ve been around for quite some time now. These scanners work by shining a bright beam of light over a user’s fingerprint after which a light-sensitive microchip takes a digital photo. The microchip makes a digital image of the fingerprint by looking at the print’s ridges and valleys, turning them into binary (0’s and 1’s). It then uses this information to create a code that’s unique to the user. The drawback of using this option, though highly improbable, is that digital photos can be reproduced.

How Do Capacitive Fingerprint Sensors Work?

Today, capacitive fingerprint scanners are quite common and are found on virtually all smartphones. Capacitive sensors measure a user’s fingerprint by using human conductivity to create an electrostatic field. It’s this field that helps create a unique digital image of the user’s fingerprint.

Let’s go a bit deeper. Capacitive fingerprint scanners use very small capacitor array circuits to track the details of a user’s fingerprint. The capacitive scanner features a conductive plate on which a user places their finger for scanning. When a user places their finger over the conductive plate, the ridges of their fingerprint alter the charge stored inside the capacitors – while the gaps/valleys leave the charge inside the capacitors unaffected. An amplifier integrator circuit inside the scanner then tracks these changes and records them using an analog to digital converter for analysis.

The technology behind capacitive fingerprint scanning is much more difficult to bypass since capacitive fingerprint sensors can’t read images while other types of materials will elicit varying changes in the charge inside the capacitor. While more expensive, capacitive sensors are also more secure and complex.

As technology advances and the Internet of Things continues to grow, accurate data collection via different sensors becomes even more important. Smartphones are a good example of how security sensors are rapidly changing how we go about things today. After all, it’s not so long ago that phones did not have fingerprint applications or touch screens on them.

Cyber-Compromised Data Risk Management

Posted by presspass on
0
Variety
Cyber-Compromised Data Risk Management

Join me May 6/21 at 9am EST!

Ransomware! Cyber-Crime! Data Risk Management! These are the things that keep Senior Executives awake at night. Join me as I talk with internationally recognized cyber security expert, John Beattie. John will clarify Ransomware; what it is, how it impacts organizations, and how organizations can prepare – and respond to – cyber/Ransomware attacks. John will also clarify for us the difference between Data Recovery and Disaster Recovery, and how the two can actually work together. We’ll also clarify the differences between RPO and RTOs and how during Ransomware attacks, these are almost never met. I’ll be talking to John about the concept of MVDL, which is something many need to hear. A very important episode.

Enjoy!

Show Logo w Microphone.jpg

GLOOM to BLOOM

Posted by presspass on
0
Variety
GLOOM to BLOOM

Join me Mar 4/21, 9am EST as I chat with global risk, ethics and governance strategist, and author, Andrea Bonime-Blanc.

‘Gloom to Bloom’: How Leaders Transform Risk into Resilience and Value’ is the latest book by Andrea Bonime-Blanc (Routledge, 2020). I chat with noted global risk, ethics and governance strategist, and author, Andrea Bonime-Blanc about some of the key megatrends that are affecting today’s business world, including the trend to increase the use of Artificial Intelligence (AI) and the considerations related to it. We’ll also talk about how categorizing risks using ESG&T considerations (environment, societal, governance, technology) can assist organizations in creating opportunities from risk to create a stronger sense of resilience – and value. Finally, Andrea will discuss the role of leadership and how they can transform risk ESG&T risk into resilience and value for clients, customers, partners, suppliers, and employees.

Don’t miss it!

Enjoy!

Show Logo w Microphone.jpg

Cyber Security: A Threat to Your Nation’s Influence & Leadership

Posted by presspass on
0
Variety
Cyber Security: A Threat to Your Nation’s Influence & Leadership

Join me Apr 1/21, 9am EST as I chat with national security expert Ray Boisvert.

Cyber Security is one of the biggest threats to nations, organizations, and individuals and ensuring we are well-protected is key to our future. In this episode I speak with ling-time recognized Cyber Security expert, Ray Boisvert. Ray will talk to us about the fast-pace changes in technology that are driving the needs to increase out data security practices and how criminal elements are keeping pace with these changes. We’ll also talk about why we need to move away from a Compliance-focused security program to put greater focus on basic risk management practices. Ray will also give some pointers on how we can enable our organizations to become more resilient to deal with the ever-increasing threat of Ransomware and other cyber crimes. We’ll even touch on Artificial/Augmented Intelligence (AI). Don’t miss this very important episode if you’re concerned about Cyber Security.

Enjoy!

Show Logo w Microphone.jpg

Cyber-Attack Response: A Focus on Resilience & Reputation

Posted by presspass on
0
Variety
Cyber-Attack Response: A Focus on Resilience & Reputation

Join me Jan 14/21, 9am EST as I talk to senior crisis management and business continuity consultant Mark Hoffman. We’ll discuss how the Crisis Management Team and the Cyber-Security team can work together to define a solid response, manage communications, and ensure quality decision making when a cyber attack occurs.

Cyber attacks are on the increase – don’t miss this!

Enjoy!

Show Logo w Microphone.jpg

How Secure Is My Tax Data?

Posted by presspass on
0
Business
How Secure Is My Tax Data?

When we enter a tax preparer’s office for the first time, we are unknown and have to provide not only our W-2’s and/or business records, we often need to provide copies of prior years tax returns, social security cards for all family members, birth certificates, and other highly personal and private information.  The office either makes paper copies or scans the information into some type of electronic filing cabinet.  In this era of rampant identify theft, often times we hesitate to provide such information, wondering how secure will our private information be in this accountant’s office.  This concern is very valid as hackers are trying to penetrate accountant’s systems now more than ever, because of the amount of private information that is contained in accountant’s computers.  How can you as the tax client know how secure your information is?  What steps should a tax office take to protect client data?

First, ask about the accounting firm’s privacy policy.  Is a copy provided on the firm’s website?  Is a copy provided with each tax return?  I have the company privacy policy posted on the website and have copies available in our waiting area.  This policy should disclose any 3rd parties that have access to your data and describe any outsourcing of services by the firm.  As a practice, I keep all work inside my office completed by employees under my supervision.

Second, what physical measures are in place to protect client data?  Does the office have a security system with 24-hour monitoring?  Not only does this office have 24-hour monitoring,  we also place any physical client data in locked desks and file cabinets at the close of business each night.  During business hours client data is kept out of sight of any outside parties entering the office for assistance.  All original information is returned to the client.  Any physical copies no longer needed are shredded into confetti.

Third and probably the most important step is how data is protected electronically.  All paid preparers are required by IRS publication 4557 to maintain a written electronic security policy.  In harmony with the IRS direction, my office uses a quality internet security software suite that provides a firewall, anti-virus protection, and malware protection.  To maintain security at a high level, our router and switch were recently upgraded.  High risk and threatening websites are blocked, so employees cannot access places they should not be going.   Employees are well trained on the “No-Click Policy”.  This policy reduces risk by not allowing the clicking on links and attachments in emails.  All clients are required to submit tax information by physical delivery, fax, or by upload to their client portal.  Next, what kind of backup systems are used?  In the event of disaster, theft, or data loss, will the office be able to restore my data?  We keep multiple on and off site secure backups.  One last necessary action is complete hard drive encryption.  All computers used to access client information must use hard drive encryption.  Without hard drive encryption a desktop or laptop computer is vulnerable if physically stolen.  Computers that have hard drive encryption require a password even before the operating system, such as Windows 10, starts.

Warning: No system is 100% safe from a data breach.  We do take all the precautions possible to protect and maintain client data in the best and most secure environment that we possibly can.

For the security and safety of your data, it is vital that you check with your accountant on the steps they take to protect and secure client data.  Click here for my podcast.

Enjoy this blog? Please spread the word :)

RSS
Follow by Email