World Travel Award nomination goes to FCm Travel

first_imgSource = e-Travel Blackboard: W.X Flight Centre’s corporate arm FCm Travel has just been nominated for not one, but two World Travel Awards under the Australasia sub-region.The awards in contention are ‘Australasia’s leading business travel agent’ and ‘Australia’s leading business travel agent’, and winners will be revealed at a gala event in New Delhi on the 14th of November.“We’ll be keeping a close eye on the results, which no doubt will be hotly contested in both categories,” said Rob Flint, FCm Travel Executive GM Asia.“Testament to our success is the fact that FCm’s operations across the Asia region are expected to be one of the biggest drivers of growth for our company worldwide.”The official online voting form is available to 183,000 registered travel agents and professionals worldwide through the World Travel Awards website. <a href=”http://www.etbtravelnews.global/click/1ecd5/” target=”_blank”><img src=”http://adsvr.travelads.biz/www/delivery/avw.php?zoneid=10&amp;cb=INSERT_RANDOM_NUMBER_HERE&amp;n=a5c63036″ border=”0″ alt=””></a>last_img read more

The 5th annual Jerusalem Beer Festival will showca

first_imgThe 5th annual Jerusalem Beer Festival will showcase more than 100 breweries from around the world at Independence Park in Jerusalem, August 26-27.The festival will feature mainstream, local and boutique breweries including Erdinger (Germany), Beamish (Ireland), Lindemans (Belgium), Belhaven (Scotland) and John Smith (England). Travelers and beer aficionados will taste unique brew flavors such as strawberry and caramel.“The Jerusalem Beer Festival is a highly-anticipated event that attracts the world’s top breweries to Israel in celebration of the delicate art of beer-crafting,” says Arie Sommer, Tourism Commissioner, North and South America. “This year’s festival will include brews for both the adventurous and traditional beer drinkers.”Visitors to the festival will also experience a wide array of Israeli foods, crafts and live brewing demonstrations by local beer artisans. Also, popular Israeli band Hadag Nachash and top Israeli DJs will perform.www.goisrael.com.last_img read more

New issue offers insights to build cybersecurity strategy to protect healthcare data

first_img Third-party risks – ensuring that vendors are also taking cybersecurity seriously Value of multifactor identification in limiting “both the likelihood and impact of data breaches” Staff training (and follow-up) in recognizing phishing scans and protecting passwords Effective security staffing models, including the importance of internal and external collaboration “Cyberleadership” and culture, including engagement of senior leaders in a cybersecurity oversight committee Governance and financing challenges, including the role of a Board-level IT committee Reviewed by James Ives, M.Psych. (Editor)Aug 25 2018Like other data-driven organizations, healthcare networks are vulnerable to potentially crippling cyberattacks – but may lag behind other sectors in preparing for and avoiding data breaches, according to a series of articles and commentaries in the Fall issue of Frontiers of Health Services Management, an official publication of the American College of Healthcare Executives (ACHE). This journal is published in the Lippincott portfolio by Wolters Kluwer.”Cyberattacks pose a real threat that all healthcare leaders and boards can and must address with strategic plans of action to prevent vulnerabilities, minimize risk, and respond to incidents when they do occur,” writes Frontiers Editor Trudy Land, FACHE, in an introductory editorial.Preventing Cyberattacks: ‘In Cybersecurity, Everyone Is a Stakeholder’The new issue highlights two feature articles in which healthcare executives share their insights and experiences with building an effective cybersecurity strategy to protect valuable but vulnerable healthcare data. Dennis W. Pullin, FACHE, of Virtua health system in Marlton, N.J., emphasizes the importance of process improvements and team culture. At Virtua, “Cybersecurity is a team effort,” Mr. Pullin writes. “From board trustees to frontline employees, everyone is held accountable for protecting the organization against cyberattacks.”Michael J. Reagin and Michael V. Gentry, FACHE, of Sentara Healthcare in Norfolk, Va., discuss the role of enterprise cybersecurity – walking readers through the essential integration of people, process, and technology involved in building a world-class cyber defense program. The authors write, “Partnering with a managed security services provider to build the key components of a program, rather than developing them completely in-house, can reduce costs and provide a higher level of expertise.”Related StoriesMany healthcare workers often care for patients while sick, study findsSleep disorders in patients with low back pain linked to increased healthcare visits, costsAlmost 74% of Americans show concern about burnout among healthcare professionalsIn a commentary, Dane C. Peterson and colleagues of Emory Healthcare in Atlanta point out that the costs of cyberattacks include real risks to patient safety and quality of care. One study reported a significant increase in a hospital’s 30-day mortality rate for acute myocardial infarction, lasting for years after a cyberattack. The authors highlight key components of the cybersecurity strategies outlined by the feature articles: Additional commentaries share perspectives from an insurer (Sean P. Murphy, FACHE, of Premera Blue Cross in Washington and Alaska) and a healthcare IT expert (Carla Smith of the Healthcare Information and Management Systems Society, Chicago).The editors and contributors hope that the cybersecurity-focused issue of Frontiers will increase awareness of the vulnerability to cyberattacks at every level of the healthcare system. “Through organization-wide training, leaders can raise critical security consciousness, explain the various threats, develop and disseminate policies and procedures, emphasize the severe consequences of an attack, and convey shared responsibility,” Trudy Land writes. “In cybersecurity, everyone is a stakeholder.”Source: https://wolterskluwer.com/last_img read more