Disasters and emergencies can be dirty, stinky, hazardous messes where you’ll want to protect your hands, skin, eyes, and airway. PPE, or Personal Protective Equipment, can help you with that …
15 Privacy Fencing Ideas for Security and Property Protection
Privacy and security are important considerations for many homeowners, especially for those interested in preparedness and self-reliance. A well-designed fence can help create a clear boundary around your property while …
How Apex Energy Scaled EHS Reporting to 429 Employees in Under a Year
When Jason Conley joined Apex Energy as Director of Health and Safety in 2022, the company’s entire safety program ran on paper. Incident reports, safety observations, management of change processes …
Poor Editing Undermines Good Safety Thinking – SafetyAtWorkBlog
There is a strong trend among occupational health and safety (OHS) professionals and leadership coaches to self-publish books. Printing technology has made this much easier than previously. Artificial Intelligence will …
Risks and Threats to International Peacecourse is a module of the REACT program, a five-week training course focused on peacebuilding and conflict prevention. This intensive five-day course (40 hours) provides …
Responding is Jason Lucas, senior manager, digital and content marketing, SHOEBOX Ltd., Ottawa. Many employers assume that valid occupational hearing evaluation requires a traditional sound booth. In practice, a booth …
European and International Human Rights Standards in Conflicts and Disasters (EIHRSCaD), 3rd Edition
The Third Edition of the Intensive Course ‘European and International Human Rights Standards in Conflicts and Disasters’ will take place at Sant’Anna School of Advanced Studies, Pisa, from 6 – …
Major crises rarely happen completely without warning. In many cases, there are subtle signs that begin to appear long before a situation escalates into a full-scale emergency. History has shown …
Estimated reading time: 6 minutes For most of my life, I took a loaf of store-bought bread with me whenever I went camping. I like having toast in the morning, …
12 ways attackers abuse cloud services to hack your enterprise
“Instead of abusing local binaries like PowerShell or WMI [Windows Management Instrumentation] to evade detection, adversaries now leverage native cloud administrative tools, APIs, identity systems, and management consoles to operate …