Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
Butterfly Effect Communications, Stories and Strategies
19 episodes
7 months ago
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...
All content for Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters is the property of Butterfly Effect Communications, Stories and Strategies and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...
How trust has shifted news consumption and how to adapt. With guest, author Doug Levy | Part 3 of 3 with The Communications Golden Hour® author
Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
28 minutes
11 months ago
How trust has shifted news consumption and how to adapt. With guest, author Doug Levy | Part 3 of 3 with The Communications Golden Hour® author
Send us a textAuthor Doug Levy, of The Communications Golden Hour® Book, joins host Tim Conrad, APR, for the final of three episodes to discuss the roles of public information officers and crisis communications in emergencies and crises/issues.Listen For:01:08 - Who to trust?11:17 - Is that a trusted spokesperson?15:22 - They turned off the news and turned on an app22:53 - Finale - Three quick questionsConnect with Doug LevyLinkedIn | Website | Facebook | Instagram | Twitter | Amazon - Buy Bo...
Wildfires, Floods, and Chaos Communications: Management of Issues, Crises and Disasters
Send us a text Knowing what mitigations to have ahead of a cyberattack is one step in many as cybercriminals exploit vulnerabilities on mobile devices, computers and entire operations. Learn about the cyberattacks individuals and organizations face today from Kit Professionals' Hunter Geerts. Listen for: 1:20 Attack methods 12:18 Ransomware and phishing, with a side of mitigation 25:27 VIP impersonation, payroll and vendor fraud, and credential phishing 33:22 Finale - Three quick ...