{"id":935,"date":"2010-11-08T00:00:00","date_gmt":"2010-11-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/11\/08\/how-to-have-a-disastrous-crisis\/"},"modified":"2021-12-30T11:38:26","modified_gmt":"2021-12-30T11:38:26","slug":"how-to-have-a-disastrous-crisis","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/11\/08\/how-to-have-a-disastrous-crisis\/","title":{"rendered":"How to have a Disastrous Crisis"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"{filedir_1}4522819_smaller.jpg\" alt=\"\" width=\"125\" height=\"188\" border=\"0\" alt=\"image\" name=\"image\" \/><br \/><i>It can get better<\/i><br \/>These are the some things you should do when a crisis occurs if you really want things to go wrong.  (I.e. You don&#8217;t want to do these thing)<\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Panic<\/strong><br \/>\nPanic can take all sorts of forms:<br \/>\n<u>A failure to communicate<\/u> It can manifest it&#8217;s self in a communicative denial where the person or team fails to call in help from other groups or people.  This can be very damaging and costly.  There was one crisis I was brought to perform a post mortem on, where the team had failed to notify the management of a lost laptop. Expensive and wasteful expense.<\/p>\n<p><u>Reacting without following process or procedure<\/u> Just reacting or &#8220;shooting from the hip&#8221; can cause all sorts of chaos, both short term and long term.<\/p>\n<p><u>Overreacting<\/u>  It is very important to ensure that the organization responds with the appropriate level of urgency and energy.  Too much and you can excerabate the situation by having users or customers losing their trust in the organization.  This is damaging short term and long term.  Delivering the information in a calm and clear manner is very essential and the emotional. <\/li>\n<p>How do you not panic?  Have a plan, have the right people and the right attitude. <\/p>\n<p><strong>Loose focus on the objectives.  Focus on the technologies issues and not the business.<\/strong>.<br \/>\nAt all times,the following should be the goals of everyone involved: Protecting people, Protecting the environment, Protecting the business<\/p>\n<p><b>Waste times and resources<\/b><br \/>\nBefore a crisis occurs, make sure you have a good idea of the people, the capabilities and objectives of the organization. <\/p>\n<p><b>Focus on the immediate and forget about the long term implications.<\/b><br \/>\nIn the heat of the moment, you might be tempted to use an approach that might be ethically unsound  Respect the law and regulations, and people.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-935","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=935"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/935\/revisions"}],"predecessor-version":[{"id":3422,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/935\/revisions\/3422"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=935"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=935"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}