Operations | Monitoring | ITSM | DevOps | Cloud

Risk Management


How MSPs Can Own the Risk Management Conversation

Against a backdrop of constantly evolving cybersecurity threats, it’s essential that MSPs understand how to own the risk conversation if they are to really help their customers effectively manage their security posture. In this blog, I want to look at what we mean by “owning the risk conversation”, and how MSPs can achieve this. For me, I look at it from the perspective of my own job.


In a World of Managing Risk, Do You Have Shiny Tech Syndrome?

There is always something new on the horizon when it comes to technology. Isn’t it human nature to want to wait for the next 'new' model car, the next 'bigger' TV or the next 'faster' smart phone? The newest release might be more appealing – especially to higher-ups, who want the latest and greatest trending technology. But there are hidden risks associated with waiting to implement a new tool or solution.


Why You Need Continuous Compliance and Risk Management

Continuous compliance and risk management can help keep your organization safe as the threat landscape changes and expands each year. IT Ops teams aren’t just working on a single machine, or even a few; they are working across technologies, across teams, at scale and expected to work fast while also considering the requirements of cost and compliance and trying to navigate around skills gaps that continue to appear.

7 Excellent Examples of High-Risk Businesses in 2022

It may sound terrifying to get classified as a "high-risk business," but it's not the end of the world. Your risk to credit card processors will determine how you are classified. It has no connection with how successful your company might be. Contrarily, a high-risk business can result in substantial revenues for the bank, processors, and merchants if appropriately handled.

Five Hidden Security Risks You May Find with Traditional Backup Mechanisms

It’s always been important for managed services providers (MSPs) to exercise backup best practices but this has become even more important with the pandemic having reset employees’ expectations around remote work. Up to 74% of professionals believe that remote work is here to stay according to Growmotely, while 16% of companies globally are already completely remote and 40% offer hybrid working.


Gain visibility into manufacturing OT assets to reduce cyber risk

As manufacturing operational technology (OT) ecosystems grow more connected and complex, they become vulnerable to cyberattacks. In fact, the manufacturing sector was the most attacked industry in the world in 2021, according to IBM’s X-Force Threat Intelligence Index 2022. Manufacturing surpassed finance and insurance in the number of cyberattacks for the first time in five years. A large part of the industry’s vulnerability is due to a lack of visibility.

Internal Social Media Platforms and Risk Management

Whether you're in the IT, finance, or HR departments of any company, chances are high that your team is using some form of social media to collaborate on projects. While internal social media platforms may boost employee engagement, knowledge sharing, and day-to-day decision-making, they also pose a variety of hazards in compliance and litigation that are often neglected. The following are some potential dangers you should be aware of before implementing internal social media in your business, along with suggestions for coping with such dangers.

How a telecom company elevated integrated risk management and security

Managing risk and compliance in telecommunications is no easy feat. When a telecom company operates in underserved remote and rural communities—including hurricane-prone island markets and mountainous regions in the southwestern US—it can be even trickier. That’s where communications services company ATN International, based in Massachusetts, found itself. The company wanted a platform to elevate its integrated risk management (IRM) program.


The Core Components of a Successful Travel Risk Management (TRM) Solution

Organizations with a global reach often require employees to travel near and far. Now more than ever, businesses have a duty of care to ensure the safety, well-being, and security of their workforce, no matter the destination. To ensure traveling employees are kept safe, organizations must prepare their people for potential risks and keep them informed throughout their journey, providing further assistance and care if needed.


Taming the supply chain: Addressing vendor risks to the nth tier

Vendor risk ranks alongside cybersecurity, compliance, reputational, and financial risks as one of the top risks to any organization. With any risk, you need to identify, monitor, and mitigate that risk, especially when it comes to your supply chain. The question for someone in my role as a senior manager of compliance management is: What level of risk is being posed and why? Stated another way: Do I really know what my supply chain is doing?