Corporate Contingency Planning

Part 1

A few weeks ago I attended a seminar sponsored by Independent Solutions Insurance Inc (Edmonton) entitled "Seminar On Disaster Preparedness", during this seminar I heard stories from individual company owners who told us of their misfortunes and how they coped with their crisis. In both cases these crisis were caused by accident, however, a potential catastrophe nonetheless. These individuals told their stories about how they had to deal with their traumas from onset through to completion. From listening to these stories, it quickly became clear to me that there were similarities; was their insurance coverage adequate, how long could their companies survive, without being operational, do they have adequate funding to start operations again, could they find suitable temporary business accommodations, employee morale and retention to name but a few.

It is clear to most entrepreneurs that starting any new business involves risk and risk is one of the reasons, many of us are entrepreneurs. There is a certain thrill in taking the gamble and making a business work. Many entrepreneurs however, do not consider instituting measures to manage the inherent risk of doing business. While taking a risk and winning is fun, prudent business owners take care to minimize their risk, just as you would in any other type of business venture in which you are involved. We call this being "risk intelligent"; one needs to have a continuous process of analysis and communication as an integral part of any business.

So, What Are The Risks

Every day we are exposed to many risks which can cause a financial loss. Fraud, Accidents, property damage, illness and death are all risks we have to consider. However, other risks, such as the possibility of being sued or becoming disabled and unable to work, are also important. We each have to decide how we will protect our vital assets should a risk become a reality.

RISK; is anything that threatens the ability of a corporation to accomplish it's mission. A corporations mission is to earn profits by selling it's products and services.

What Can Be Done

Appropriate contingency planning strategies protect against catastrophic losses, regardless of the cause. A company needs to adopt a risk aware culture, identify their risks and put in place a plan which will mitigate their losses. This plan needs to incorporate the entire risks of the organization, separating your external risks from your internal exposures. This process can be achieved by completing a risk threat analysis which basically outlines your assets and the threats posed against these assets. A more comprehensive analysis can be obtained by hiring a professional consultant who can guide your through the process and assist in the education of staff and preparedness of your organization. A basic analysis will break down your company into four parts; people assets, property assets, income assets and goodwill. Once we have identified the risks posed against these assets, we can then begin to formulate a plan of action which will deal with the risks identified and have that plan written into the companies policies and procedures in order that all members of the company can familiarize themselves with their individual responsibilities.

In the event a disaster takes place and you have failed to plan, you are planning to fail in the management of a disaster, the consequence of your actions could be catastrophic to your organization. Ottawa's commitment to fighting white collar criminals and unnecessary corporate failures, introduced the Westray Bill. This bill is designed to protect organizations from fraud and the negligent acts of owners, directors and managers. Watch out for part 2 of this series of articles when we look at a risk analysis in greater detail and discuss some basic internal controls. Future articles will include topics relating to corporate occupational fraud, preventing industrial espionage, money laundering, corporate security in the millennium and investigating corporate thefts.

Marwen's Contingency Planning; is a discipline that enables people and organizations to cope with uncertainty by taking steps to protect it's vital assets and resources. We recommend, just as you would walk around your car checking for defects, occasionally you should do the same with your business.

Martin Maylor, Director of Marwen Consulting Group Inc., a corporate security consultancy based in the Edmonton area, who has been working with corporations for over 15 years assisting them in understanding the risks of doing business, corporate occupational fraud, who commits fraud, why fraud is committed and what a company can do to harden their defenses. Mr Maylor is a frequent speaker at business groups, associations and can be reached at m.maylor@marwen.ca, http://www.marwen.ca or 780 4978245.

cleaning help near Mundelein ..
In The News:

A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.

Top Ten Reasons To Create A One Page Business Plan

There is a story, about a business owner who wasn't... Read More

Regroup - How To Do It And Why It Works

Regroup?is this a new management trend? Not a chance! Regroup... Read More

Strategy Without Tactics is Futile

From time to time there seems to be a flurry... Read More

Hunters and Gatherers - Are You Serving Both Their Needs?

The University of Exeter in the United Kingdom recently published... Read More

Writing a Business Plan for Success in Business and for Funding

Writing a business plan to help you direct and manage... Read More

Family and Friends Referrals Make the Best Franchisees

As a franchisor it is imperative that you seek, find... Read More

Six Key Areas For Evaluating A Strategic Alliance

Strategic alliances are increasing at a rapid rate. It is... Read More

Business Plan: The Simplest Business Plan Ever

If you're a solo professional like I am, you know... Read More

What is a Shared Vision?

So what makes a vision successful? Everyday companies try to... Read More

Innovate Today for Great Leaps Forward Tomorrow

How often does your company make a quantum leap forward?... Read More

Business Plans Keep You On The Success Course

Where would your business be without a proper plan? A... Read More

The Importance of Value Mix

( * - the word 'product' can be substituted to... Read More

Succession Planning: Problems Getting Started

A survey released by the American Institute of Certified Public... Read More

Documenting the Exit Strategy in Your Business Plan

All investors greatly desire and are motivated by a clear... Read More

Are You Ready To Go International?

Although North Americans were the dominant population on the Internet,... Read More

SWOT Analysis Is No Magic 8 Ball

Q: A key investor in my business has suggested that... Read More

Strategic Acquisition Strategies for Small Businesses

Growth through acquisition should not be considered an option reserved... Read More

Balanced Scorecard Strategy Map

With the help of balanced scorecard strategy map, it is... Read More

The Tables Have Turned - Its Officially a Sellers Market

Private equity firms have raised so much capital over the... Read More

Changing Strategy Without Losing Your Customers - Three Vital Steps to Refining Your Strategy

American Eagle Outfitters and Wet Seal Stores have issued statements... Read More

Don?t Just Talk About the Weather, Use It to Advantage

A well known, national chain of restaurants discovered that certain... Read More

The Accountability/Alignment Process: Three Steps to an Accountable Organization

The Accountability/Alignment Process: Three Steps to an Accountable Organization Generating... Read More

GOT MEME? How to Attract Your Clients and Customers Attention

No "meme" isn't a typo and Got Milk, the more... Read More

Cost-cutting Essential to Maintaining Profits

Why cut costs now? Efforts are multiplying to cut costs... Read More

How to Write a Business Plan Market Analysis

Writing a business plan is an essential part of the... Read More

reliable maid service Wilmette ..