This post first appeared on Risk Management Monitor. Read the original article. Last week, after already experiencing heavy rainfalls and flooding, New Orleans was preparing for tropical storm Barry, expecting the storm to overflow or even breach the city’s levees. Flights in and out of the city were cancelled, as were concerts and other public (more…)
Insulin Pumps Recalled After Hacking Vulnerability Revealed
This post first appeared on Risk Management Monitor. Read the original article. After the U.S. Food and Drug Administration (FDA) expressed concern this week that some of its internet-connected insulin pumps are vulnerable to hacking and could not be patched, medical device manufacturer Medtronic Plc has announced that they would offer an exchange for the (more…)
Beyond Pride: Building Strong Diversity and Inclusion Programs
This post first appeared on Risk Management Monitor. Read the original article. Today, June 28, marks the 50th anniversary of the Stonewall riots, demonstrations widely considered the most formative event to formally start the fight for LGBTQ rights in New York City and the United States as a whole. As June comes to a close (more…)
2017 Disaster Relief Oversight: Strategy Needed to Ensure Agencies’ Internal Control Plans Provide Sufficient Information, Jun 28, 2019
This post first appeared on GAO Reports. Read the original article. What GAO Found Of the six agencies GAO selected for review, only the Department of Education submitted its internal control plan for disaster relief funds by the statutory deadline. The Department of Defense did not submit an internal control plan. The Departments of Agriculture, (more…)
2017 Disaster Relief Oversight: Strategy Needed to Ensure Agencies’ Internal Control Plans Provide Sufficient Information, Jun 28, 2019
This post first appeared on GAO Reports. Read the original article. What GAO Found Of the six agencies GAO selected for review, only the Department of Education submitted its internal control plan for disaster relief funds by the statutory deadline. The Department of Defense did not submit an internal control plan. The Departments of Agriculture, (more…)
Global Heat Waves Signal Climate Risks
This post first appeared on Risk Management Monitor. Read the original article. India is currently suffering under a heat wave that has lasted over a month, with temperatures reaching a record 118 degrees Fahrenheit (48 degrees Celsius) in New Delhi on June 10 and 122 degrees (50 degrees Celsius) in the western city of Churu. (more…)
Workers Compensation Insurance Gaps Expose Employers to Injury Lawsuits
This post first appeared on Risk Management Magazine. Read the original article. Many in the risk management community may be surprised to learn that workers compensation is not the exclusive remedy for their injured employees. While we generally think of workers compensation in this way, employers have learned the hard way that, over time, state (more…)
Aviation Security: TSA Has Taken Steps to Conduct More Risk-Informed Covert Tests and Address Vulnerabilities, Jun 25, 2019
This post first appeared on GAO Reports. Read the original article. What GAO Found TSA revised its covert test processes in 2016 and has recently taken steps to document and use a risk-informed approach for covert testing. The Department of Homeland Security requires that agencies use risk information to make decisions, and TSA issues annual (more…)
Aviation Security: TSA Has Taken Steps to Conduct More Risk-Informed Covert Tests and Address Vulnerabilities, Jun 25, 2019
This post first appeared on GAO Reports. Read the original article. What GAO Found TSA revised its covert test processes in 2016 and has recently taken steps to document and use a risk-informed approach for covert testing. The Department of Homeland Security requires that agencies use risk information to make decisions, and TSA issues annual (more…)
Inside a Business Email Compromise Operation
This post first appeared on Risk Management Monitor. Read the original article. A new report from cybersecurity company Agari’s Cyber Intelligence Division outlines the operations of a business email compromise (BEC) gang in West Africa, showing that criminals who engage in BEC online theft can have a diverse portfolio of online criminal activity that they (more…)