SlideShare a Scribd company logo
1 of 28
http://blogs.citrix.com/2015/04/08/healthcare-past-present-future/
Forbes http://www.forbes.com/sites/davelewis/2014/12/16/sony-pictures-data-breach-and-the-pr-nightmare/
SC Magazine
http://www.scmagazine.com/a-look-at-anthems-pr-response-following-the-data-breach/article/396990/
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks
Your Organizational Security Probably Sucks

More Related Content

What's hot

Ten Countries Rubrics Ppt
Ten Countries Rubrics PptTen Countries Rubrics Ppt
Ten Countries Rubrics Pptgrieffel
 
Backlink For SEO - 100 List Backlink EDU And Gov PR High
Backlink For SEO - 100 List Backlink EDU And Gov PR HighBacklink For SEO - 100 List Backlink EDU And Gov PR High
Backlink For SEO - 100 List Backlink EDU And Gov PR HighHujan Hujan
 
69 edu blogs to comment
69 edu blogs to comment69 edu blogs to comment
69 edu blogs to commentPinoySeo32
 
Horror 2 covnvention research
Horror 2 covnvention researchHorror 2 covnvention research
Horror 2 covnvention researchguest55d149b
 
Comportamientos digitales
Comportamientos digitalesComportamientos digitales
Comportamientos digitalesErikaGomez97
 
Sport law case study 4 final exam presentation
Sport law case study 4 final exam presentationSport law case study 4 final exam presentation
Sport law case study 4 final exam presentationFrank Campo
 
Film 260 flipbook presentation
Film 260 flipbook presentationFilm 260 flipbook presentation
Film 260 flipbook presentationzoe73
 
The Flash Media Slideshow
The Flash Media SlideshowThe Flash Media Slideshow
The Flash Media SlideshowNas Far
 
Personal Persona Project - Zachary Pago
Personal Persona Project - Zachary PagoPersonal Persona Project - Zachary Pago
Personal Persona Project - Zachary PagoZachary-Pago
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectTerrill Marshall
 
Responsible consumption
Responsible consumptionResponsible consumption
Responsible consumptionGGBenqnairdelo
 
Presentation1
Presentation1Presentation1
Presentation1lbrese
 
Webstock 2010
Webstock 2010Webstock 2010
Webstock 2010Bogdana
 
110502 application review report 상훈
110502 application review report 상훈110502 application review report 상훈
110502 application review report 상훈덱 꼬꼬
 

What's hot (18)

Trabalho
TrabalhoTrabalho
Trabalho
 
Ten Countries Rubrics Ppt
Ten Countries Rubrics PptTen Countries Rubrics Ppt
Ten Countries Rubrics Ppt
 
Backlink For SEO - 100 List Backlink EDU And Gov PR High
Backlink For SEO - 100 List Backlink EDU And Gov PR HighBacklink For SEO - 100 List Backlink EDU And Gov PR High
Backlink For SEO - 100 List Backlink EDU And Gov PR High
 
Refrences
RefrencesRefrences
Refrences
 
69 edu blogs to comment
69 edu blogs to comment69 edu blogs to comment
69 edu blogs to comment
 
Horror 2 covnvention research
Horror 2 covnvention researchHorror 2 covnvention research
Horror 2 covnvention research
 
Tic marcela
Tic marcelaTic marcela
Tic marcela
 
Comportamientos digitales
Comportamientos digitalesComportamientos digitales
Comportamientos digitales
 
Sport law case study 4 final exam presentation
Sport law case study 4 final exam presentationSport law case study 4 final exam presentation
Sport law case study 4 final exam presentation
 
Film 260 flipbook presentation
Film 260 flipbook presentationFilm 260 flipbook presentation
Film 260 flipbook presentation
 
The Flash Media Slideshow
The Flash Media SlideshowThe Flash Media Slideshow
The Flash Media Slideshow
 
Personal Persona Project - Zachary Pago
Personal Persona Project - Zachary PagoPersonal Persona Project - Zachary Pago
Personal Persona Project - Zachary Pago
 
Thaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona ProjectThaddeus marshall Personal Persona Project
Thaddeus marshall Personal Persona Project
 
Responsible consumption
Responsible consumptionResponsible consumption
Responsible consumption
 
Presentation1
Presentation1Presentation1
Presentation1
 
27 million
27 million 27 million
27 million
 
Webstock 2010
Webstock 2010Webstock 2010
Webstock 2010
 
110502 application review report 상훈
110502 application review report 상훈110502 application review report 상훈
110502 application review report 상훈
 

Viewers also liked

zenaidaalmodovar8-12lppdFinalpaper (1)_KTchanges
zenaidaalmodovar8-12lppdFinalpaper (1)_KTchangeszenaidaalmodovar8-12lppdFinalpaper (1)_KTchanges
zenaidaalmodovar8-12lppdFinalpaper (1)_KTchangesZenaida Almodovar
 
Gebeurtenis
GebeurtenisGebeurtenis
Gebeurtenisarne314
 
연극의 이해 Report[1].pdf
연극의 이해 Report[1].pdf연극의 이해 Report[1].pdf
연극의 이해 Report[1].pdfseulbi yi
 
O sector q vale2 autoeuropa
O sector q vale2 autoeuropaO sector q vale2 autoeuropa
O sector q vale2 autoeuropaIdalina Leite
 
Mooi Figuur pijnverlichtingsdagen
Mooi Figuur pijnverlichtingsdagenMooi Figuur pijnverlichtingsdagen
Mooi Figuur pijnverlichtingsdagenEmmy Beuting
 
Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetWei Tsang Ooi
 
Os regimes autoritários tomam conta da europa
Os regimes autoritários tomam conta da europaOs regimes autoritários tomam conta da europa
Os regimes autoritários tomam conta da europaFernando Fagundes
 
016 Transsphenoidal approch microscopic
016 Transsphenoidal approch microscopic016 Transsphenoidal approch microscopic
016 Transsphenoidal approch microscopicNeurosurgery Vajira
 
IMAGING OF INTRAVENTRICULAR TUMORS
IMAGING OF INTRAVENTRICULAR TUMORS IMAGING OF INTRAVENTRICULAR TUMORS
IMAGING OF INTRAVENTRICULAR TUMORS Ameen Rageh
 
Herramientas digitales
Herramientas digitalesHerramientas digitales
Herramientas digitalesdevanyrv
 

Viewers also liked (18)

Resume Formosa Michelle
Resume Formosa MichelleResume Formosa Michelle
Resume Formosa Michelle
 
zenaidaalmodovar8-12lppdFinalpaper (1)_KTchanges
zenaidaalmodovar8-12lppdFinalpaper (1)_KTchangeszenaidaalmodovar8-12lppdFinalpaper (1)_KTchanges
zenaidaalmodovar8-12lppdFinalpaper (1)_KTchanges
 
Gebeurtenis
GebeurtenisGebeurtenis
Gebeurtenis
 
Poster
PosterPoster
Poster
 
Conflicto
ConflictoConflicto
Conflicto
 
연극의 이해 Report[1].pdf
연극의 이해 Report[1].pdf연극의 이해 Report[1].pdf
연극의 이해 Report[1].pdf
 
O sector q vale2 autoeuropa
O sector q vale2 autoeuropaO sector q vale2 autoeuropa
O sector q vale2 autoeuropa
 
Btbm
BtbmBtbm
Btbm
 
Paisagismo
PaisagismoPaisagismo
Paisagismo
 
Mooi Figuur pijnverlichtingsdagen
Mooi Figuur pijnverlichtingsdagenMooi Figuur pijnverlichtingsdagen
Mooi Figuur pijnverlichtingsdagen
 
Lecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the InternetLecture 1: Design Principles of the Internet
Lecture 1: Design Principles of the Internet
 
Os regimes autoritários tomam conta da europa
Os regimes autoritários tomam conta da europaOs regimes autoritários tomam conta da europa
Os regimes autoritários tomam conta da europa
 
016 Transsphenoidal approch microscopic
016 Transsphenoidal approch microscopic016 Transsphenoidal approch microscopic
016 Transsphenoidal approch microscopic
 
Balotario
BalotarioBalotario
Balotario
 
Regimes totalitários
Regimes totalitáriosRegimes totalitários
Regimes totalitários
 
IMAGING OF INTRAVENTRICULAR TUMORS
IMAGING OF INTRAVENTRICULAR TUMORS IMAGING OF INTRAVENTRICULAR TUMORS
IMAGING OF INTRAVENTRICULAR TUMORS
 
Healthy life
Healthy life Healthy life
Healthy life
 
Herramientas digitales
Herramientas digitalesHerramientas digitales
Herramientas digitales
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Editor's Notes

  1. Networking possible, internet not likely, no antivirus, if using windows you may have had one minimal type product installed.
  2. Regardless of the type of business or size of business you are part of, the way we approach security has changed forever. Gone are the days that a business can feel safe with their security design model. These days the attacks have become more sophisticated than ever. Your organization should no longer be thinking about “if” an attack will happen, but be planning for “when” an attack will happen. How does this change the scope of our organizational security strategies? It means that all organizations should step back and take a hard look at their current plan.
  3. Black Hat Hackers: These are folks that have extensive computer knowledge and deliberately look for new exploits. The types of exploits that allow them to obtain corporate and personal information that doesn’t belong to them. These teams can run like organizations with full Research and Development environments to develop the next attack or exploit.
  4. Two very recent breeches where one was handled very well and one was not. Sony didn’t have a PR plan in place. They were accused of staging and trying to promote a movie. Medical information, emails, personal information about actors, etc. In the end it was an employee that deliberately infected a machine to distribute data, leaking personal information about actors and actresses. They took too long to respond, causing a lot of speculation with journalists and even going as far as going after some of the journalists http://www.forbes.com/sites/davelewis/2014/12/16/sony-pictures-data-breach-and-the-pr-nightmare/. In a sharply worded letter sent to news organizations, including The New York Times, David Boies, a prominent lawyer hired by Sony, characterized the documents as “stolen information” and demanded that they be avoided, and destroyed if they had already been downloaded or otherwise acquired. The studio “does not consent to your possession, review, copying, dissemination, publication, uploading, downloading or making any use” of the information, Mr. Boies wrote in the three-page letter, which was distributed Sunday morning. This breech did not make Sony look good at all. Anthem Responded immediately, stayed in communication with their customers. They also are protecting their customers if they have identity fraud issues. Also offering additional protection for 2 years to their customers through a 3rd party. 80 million people impacted. Current and former customers, such as their names, birthdays, medical IDs, Social Security numbers, street addresses, email addresses, and employment information Once the attack was discovered, Anthem "immediately made every effort to close the security vulnerability, contacted the FBI, and began fully cooperating with their investigation," Anthem also launched a microsite, which customers could access via a link from the company's homepage, that includes an FAQ list
  5. no organization is safe from a hack or breech, but rethinking your approach and taking action can significantly reduce this risk.
  6. According to Sian John with Symantec, we can eliminate 80% of vulnerabilities just by patching our servers and workstations routinely. This includes updates anything and everything software related that your organization uses that patches have been issued for by the vendor. That leaves the remaining 20% of vulnerabilities to be resolved in the following recommendations.
  7. By routinely doing security checks; including penetration testing with 3rd party providers, you can help find security loopholes that need resolution. Even more importantly though, do not just sit on this information. Remediate the issues found. XP, SSL recommendations, etc.
  8. If your organization is running old equipment that is not being updated or maintained, it’s time to figure out how to get that replaced. Old legacy systems typically are highly vulnerable to today’s sophisticated attacks.
  9. By having a solid backup strategy in place can help you restore your business under even the worst security violation. For example, Cryptolocker encrypts data on network shares, backups etc. trojan is a common piece of malware that has been able to destroy organizational backups. Cloud, dr, replicated disk to another device (EMC) Avamar. Larger vendors, Commvault
  10. Relying on a single security vendor to protect your systems in no longer enough.
  11. Putting together a formal playbook with the appropriate people within your organization (legal/public relations) will allow for the correct public communication to protect your business.
  12. Putting together a formal playbook with the appropriate people within your organization (legal/public relations) will allow for the correct public communication to protect your business.
  13. Like many smaller organizations, you are now wondering how to protect your business from these new and complex security threats. More importantly as a small business owner I probably do not have a budget for the complex strategy as mentioned above. What can I do?
  14. Invest in one or two really good virus/malware protection software for your PC’s. One thing I have noticed is that in addition to virus protection on a PC, it has become crucial to have malware protection. Research and find software programs that you trust, and do regular system scans!
  15. Use a reputable provide that keeps up with backend system updates and offer you the latest and greatest software available. This will likely fulfill your business need for Email, and Office related products. For example, Microsoft’s Office 365 or Amazon’s product offerings would be considered reputable, and keep up with backend software updates that reduce the risk of security vulnerabilities.
  16. Use a reputable provide that keeps up with backend system updates and offer you the latest and greatest software available. This will likely fulfill your business need for Email, and Office related products. For example, Microsoft’s Office 365 or Amazon’s product offerings would be considered reputable, and keep up with backend software updates that reduce the risk of security vulnerabilities.
  17. This is still very important and should not be neglected. Using a legal representative to start this conversation is very important. Having a plan for public communication will go a long way for the reputation of your business.
  18. Like many smaller organizations, you are now wondering how to protect your business from these new and complex security threats. More importantly as a small business owner I probably do not have a budget for the complex strategy as mentioned above. What can I do?
  19. Protecting our organizations from the different levels of attacks out there is vital to organizational success. Some attacks are so severe that even an operating system rebuild will not eliminate the vulnerability, and others so severe that your backups can become destroyed. Now is the time for every organization to take a close look at their protection strategy and ramp up, because it will continue to become more difficult to protect our corporate data. This includes implementing a great public relations strategy for your customers and employees that promotes good communication and trust. Falling short on your overall response can risk the future success of your business.
  20. Protecting our organizations from the different levels of attacks out there is vital to organizational success. Some attacks are so severe that even an operating system rebuild will not eliminate the vulnerability, and others so severe that your backups can become destroyed. Now is the time for every organization to take a close look at their protection strategy and ramp up, because it will continue to become more difficult to protect our corporate data. This includes implementing a great public relations strategy for your customers and employees that promotes good communication and trust. Falling short on your overall response can risk the future success of your business.