As a proud COO of Continuity2, Lisa strives to provide intuitive and innovative solutions for the Business Resilience market and reshape the industry as we know it today. Lisa has been in the industry for over 10+ years, helping clients achieve their Business Continuity and Resilience objectives for continuous growth and success.
In the evolving landscape of cyber threats, staying ahead of ransomware trends is crucial for organizations. We've gathered seven insights from IT consultants
It’s been three years since leaked data surfaced, allegedly coming from more than 70 million AT&T users — although the company is adamant the data did not come from them.
In the digital age, fostering a culture of strong cyber hygiene is critical for protecting company assets in the cloud. We've gathered insights from
With visibility and a need for diversification across logistics providers and networks, many companies are choosing to switch from a single-supplier linear chain to an integrated network with a diverse range of sources.
Though the pandemic has been the greatest disruptor in the past decade, geopolitical events like the war in Ukraine and continuing issues in the Suez Canal and natural disasters like hurricanes and wildfires continue to wreak havoc on supply chains. Even very recently, the collapse of the Francis Scott Key Bridge near Baltimore in the USA is due to have a small effect on global supply chains even though the Port of Baltimore is not a major player in world shipping destinations.
In theory, diversification should at least halt some of the issues we typically see with supply chain disruptions. Rather than collect raw materials through a single supplier, many manufacturers choose to have one primary supplier and then others that they can also pull from should their initial link run into issues. This will then allow service to remain as consistent as possible.
“Cybercriminals are so good at what they do nowadays that it can be extremely hard to distinguish what’s a scam and what isn’t,” Lisa McStay, Chief Operating Officer at Continuity2, told Moonlock. “Pairing this with how Google’s search engine rewards pages that are receiving traffic/clicks, Google’s own system can inadvertently promote scams to users.”