Business Tag

qode

Extending Business Continuity to Your Employees

27 September in Business Continuity Planning

To those of you who have lived in a coastal area as an advancing hurricane takes aim at your community, you know the store shelves are bare 48 hours before the storm is set to arrive, people are lined up at service stations for fuel and the hardware store is sold out of plywood and tape. It's inevitable, it always happens. Even people who live in hurricane-prone areas wait until they know the storm is coming to make preparations. We all know that bad things...

Ten Tips to Safely Announce a Reduction in Force (RIF)

27 September in Corporate Security

We are closing out 2012 amid financial uncertainty. Our political leaders are trying to reach an agreement to reign in run-away government spending and increase insufficient government revenues and begin to gain control over our ever-growing national debt. We face the very real possibility that the U.S. economy may suffer and potentially drift backward into recession in 2013. Coupled with the unknown impact of the implementation of national health care, our uncertain financial times are causing many businesses both large and small to pare back...

Internet Scams Target Law Firms: Protecting Your Legal Reputation and Your Bank Account

27 September in Legal Security

Lawyers’ Identities Being Used for Fake Websites and Solicitations It was reported in September 2012, that a scam surfaced in which the identity of a Texas attorney, who had not practiced in years, was used to set up a fake law firm website using the attorney’s maiden name, former office address, and portions of her professional biography. In this same report, other attorneys complained about the theft of their names and professional information to solicit legal work. All attorneys should be on the alert for this...

Cyber Series: 10 Ways to Improve the Security of a New Computer

27 September in Business Continuity Planning, Corporate Security

A sobering reminder about computer security Computers, laptops, iPads, and mobile devices offer windows to the world. At the same time, the world is looking back at us. We trust our computers with personal information, banking, bill paying, connecting with family, shopping, and surfing the internet. We constantly communicate with family members, friends, business colleagues through emails, text messaging, and social networks. With this ease of use comes great responsibility. Most importantly, we need to keep our information and the information of others safe and secure...

Cyber Series: The Cyber Threat – What Are the Experts Saying?

27 September in Business Continuity Planning, Corporate Security

In our last Rampart Group communication, we began by advising our readers that we are launching a regular blog series to provide you critical cyber protection tips and information.  Below is post #2.  In this blog series, Rampart Group will continue to outline for you and your business the breadth and depth of cyber threats on a national and global scale.     The Cyber Threat – What Are the Experts Saying? The cyber threat is growing and evolving. Cyber crimes cost approximately $400 billion per year worldwide,...

Rampart Group Our company

Cyber Series Launch: Protecting Your Vital Assets in a Cyber Threatened World

27 September in Corporate Security, Crisis Response

Rampart Group is launching a regular blog series to provide you critical cyber protection tips and information.  These tips will help you keep your information safe, ensure you are current on FBI recommended protocols for your organization’s information safety, and relay federal cyber legislative updates we think you’ll want to know about.   Below is our first blog post in this series, outlining the breadth and depth of cyber threats on a global and local scale.     Humans are the weak link in cyber security It is a fact that...