You want to keep your family safe. This resource book will help you strengthen your relationship with your family beyond just annual reunions. It's about planning emergencies or disasters to ensure everyone's safety at family-owned facilities. This book equips you with life skills for evacuating, sheltering in place, finding safety, recovering, and returning to a "normal" life after a disaster.

Purchase

How does your company or agency survive a disruption or disaster? You must design a Continuity of Operations Planning (COOP) or Business Continuity Management System (BCMS). This book walks you through Risk Assessment, Business Impact Analysis (BIA), creating a tailored document library that meets ISO 22301 requirements, employee training, and a testing package. These processes are designed to make your company more resilient.

Purchase

What do you need to be industry-compliant and foster a healthy work environment? This book guides you in implementing an ESH Management System for your organization amidst various OSHA, EPA, and Health standards. Our goals include raising ESH awareness and promptly addressing risks and hazards while enhancing the workplace. Our comprehensive system aligns with federal, state, and local ESH regulations, constituting the Environmental, Safety, and Health Management System (ESHMS). Tailored to your needs, this system equips employees to understand safety laws, assess, mitigate risks, and lead healthier lives – vital life skills that bolster workplace resilience. As new OSHA and EPA requirements emerge along with healthcare costs, adopting and testing such a system promises peace of mind and greater work-family resilience.

Purchase

Why is an ISMS (Information Security Management System) crucial? As cyberattacks increase in complexity, data centers require advanced "sniffers" to swiftly detect and prevent malicious code in LAN/WAN data flow. Traditional manual systems lead to delayed detection and response, giving attackers up to 12 hours before a response. Timely response, ideally within 6 hours, is essential to thwart attacks. Automated IDS (Intrusion Detection System) with real-time detection and swift response is the optimal defense for identifying "zero-day threats." Not all organizations possess this technology, often facing incidents post-attack.

Purchase

This book represents articles written from July 2014 to 2015. The intent is to use best practices for continuity, risk, recovery, and resilience. With correctly implemented planning, emergency response, incident management, crisis management, disaster recovery, and personal recovery plans developed, maintained, and tested will keep you, your business, and your family safe. Could you survive and protect your family and employees through a disaster or disruption? The intent of this book is to give you the life skills needed to evacuate, shelter in place, lockdown, navigate to a place of safety, recover from an incident, and get back to a normalized lifestyle.

Purchase