October 2015 Blog Posts (48)

Fake IDs are everywhere

Okay, so you’re 18 or 19 and in college, and are stressed because you have to be 21 in order to gain entry to a night club or bar where you’d like to drink up a storm and mingle with a “more mature” crowd. Or really, you just want to meet someone.

Life sure is tough, isn’t it? You have to wait till you’re 21, but by then…you may be graduated from college (and a lot more mature, and thus, getting plastered would no longer have appeal). What a bummer, dude! The time to…

Continue

Added by Robert Siciliano on October 29, 2015 at 3:30pm — No Comments

Hiring? Approving Mortgages? In Terms of Risk, It's the Same Thing

By: Greta Roberts, CEO

Talent Analytics, Corp.

 

Imagine that Chris wants to buy a house and needs a mortgage. He applies online and is sent an email by an intern asking to schedule time to discuss his interest. The intern conducts the initial screening…

Continue

Added by Greta Roberts on October 28, 2015 at 7:47pm — 2 Comments

5 In-Demand Cybersecurity Specialties

There are numerous subspecialties within the booming cybersecurity field[i]. Here are some of the most in-demand professions:

Cybersecurity Engineer: This is the all-around, jack-of-all-trades, go-to guy or gal of cybersecurity. For all intents and purposes, a cybersecurity engineer is a hacker – but a good one. Using their advanced knowledge of malware, viruses, theft, DDoS attacks and other digital threats, cybersecurity engineers…

Continue

Added by Robert Siciliano on October 28, 2015 at 3:07pm — No Comments

Don't Be Lazy With Your Passwords

It can be tough being a responsible adult sometimes, and managing these responsibilities isn’t always a chore that I want to deal with. Can you relate? Managing life takes focus and effort, and managing your online life is no different. Most of us are lazy with our online accounts, especially when it comes to our passwords. It is easy to use the same password for every account, but this also makes it very easy for hackers to access your passwords.

You Need a…

Continue

Added by Robert Siciliano on October 27, 2015 at 3:47pm — No Comments

Sales Staff Targeted by Cyber Criminals

Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about the No. 1 way that hackers “get in”: the phishing e-mail. Salespeople are also vulnerable to falling for other lures generated by master hackers.

In a…

Continue

Added by Robert Siciliano on October 27, 2015 at 3:46pm — No Comments

How Passwords Get Hacked

If I wanted to crack one of your passwords, I could probably make a series of educated guesses and get pretty close. Why? Because people tend to stick with simple, easy to remember passwords, but these are the passwords that are easy to hack. According to Bill Carey, VP Marketing for the RoboForm Password Manager “Users need to take personal responsibility for their passwords and not assume that companies will keep…

Continue

Added by Robert Siciliano on October 26, 2015 at 2:52pm — No Comments

How to prevent your Pics from being lifted: Part 2 of 2

There are many reasons someone might right-click on your image and “Save image as…”

Porn, Sex and Dating Sites

  • A woman might steal your blog headshot and use it for her dating site profile.
  • A perv might take the picture of your child off your Facebook page and put it on a porn site.
  • A person who runs a racy dating site might take your image and use it to advertise his…
Continue

Added by Robert Siciliano on October 25, 2015 at 4:20pm — No Comments

Dept. of Homeland Security Computers Vulnerable

There’s a problem on the home front: security lapses in the computers of the Secret Service and Immigration and Customs Enforcement, says a report on townhall.com. These departments were recently audited, and weaknesses were revealed.

Recently, hackers got into the White House, State Department and the Office of Personnel Management, among other entities. And this has caused the public to wonder about just how strong cybersecurity is for the U.S. government. So thus,…

Continue

Added by Robert Siciliano on October 25, 2015 at 4:19pm — No Comments

How to Set Up a Password Manager

If you have made the decision to use a password manager for your personal cybersecurity, which I highly recommend, you will quickly find that you online world is safer, easier and more secure than ever before.

According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager, 63% of respondents reported forgetting a password, or had a password become…

Continue

Added by Robert Siciliano on October 24, 2015 at 3:54pm — No Comments

Killing Off Community Banks in Favor of Megabanks

Killing Off Community Banks — Intended Consequence of Dodd-Frank Act? “Orderly Liquidation Authority”. Consolidation of Megabanks

 …

Continue

Added by Enrique Suarez on October 24, 2015 at 2:06am — No Comments

Credit Card vs. Debit Card Fraud

One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you.

But if someone gets ahold of your debit card information, the second they use it, depending on the nature of the transaction, your bank account will be drained. And in some cases, you can kiss that money goodbye; you got scorched. More than ever, crooks are…

Continue

Added by Robert Siciliano on October 22, 2015 at 3:53pm — No Comments

Risk-Based Cybersecurity Prevents Cyber Attacks and Data Breaches

There are many prominent cybersecurity companies, including FireEye and Symantec. These companies “focus on blocking or detecting intrusions as they occur or responding to attacks after the fact,” …

Continue

Added by Steven Minsky on October 20, 2015 at 9:30pm — No Comments

Child Identity theft is becoming Solvable

You’ve seen TV commercials and print ads about identity theft, and the “victim” is always an adult. That’s not realistic. The actor-portrayal should be that of a child. Yes, a kid.

Children are 51 times more likely than adults to have their identity stolen, says research from Carnegie Mellon University’s CyLab.

Crooks want kids’ Social Security numbers. And crooks like the fact that kids are debt-free. Wow, with no debt to the child’s name, the thief could…

Continue

Added by Robert Siciliano on October 20, 2015 at 3:35pm — No Comments

Quantitative Easing Was a Bust; Let’s Try Higher Wages Instead

    

Quantitative Easing Was a Bust; Let’s Try Higher Wages Instead

 

Source:…

Continue

Added by Enrique Suarez on October 20, 2015 at 2:48am — No Comments

Public Services Under Attack through TTIP and CETA Atlantic Trade Deals

Public Services Under Attack through TTIP and CETA Atlantic Trade Deals

 

Source:…

Continue

Added by Enrique Suarez on October 20, 2015 at 2:30am — No Comments

Google Degenerates into Ministry of Truth; All Knowledge Must Now Be Pre-approved by Search Algorithm

Google Degenerates into Ministry of Truth; All Knowledge Must Now Be Pre-approved by Search Algorithm…

Continue

Added by Enrique Suarez on October 19, 2015 at 5:34pm — No Comments

It's Time for You to Use a Password Manager

If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.

According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager:

  • 42% write them…
Continue

Added by Robert Siciliano on October 19, 2015 at 3:56pm — No Comments

Protect your Identity when saying "I Do"

Who has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.

  • If you’re using any website or smartphone application to organize your wedding, make sure it’s protected with a password—a long password that contains zero clues about your wedding, identity or…
Continue

Added by Robert Siciliano on October 18, 2015 at 4:00pm — No Comments

The Password Reset Isn't How to Remember a Password

Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only opens one door.

If you are like most people, this key scenario is almost identical to the way you treat your account passwords online. What happens when you want to use a key, but…

Continue

Added by Robert Siciliano on October 17, 2015 at 4:18pm — No Comments

4 Ways to Prevent Business Surprises with Risk Identification

Nobody likes surprises in business. Using a risk-based approach to identify your organization’s likely vulnerabilities is highly recommended and vital to short-term and long-term success. Expanding regulations make compliance increasingly complex and expensive, and increases in deficient internal audit controls have heightened scrutiny of companies by the SEC,…

Continue

Added by Steven Minsky on October 16, 2015 at 5:00pm — No Comments

Monthly Archives

2017

2016

2015

2014

2013

2012

2011

2010

1999

Our Sponsors

Would you like to reach over 22,000 + Risk Professionals? 

REQUEST OUR MEDIA KIT

 

Advance Your Career - Take the Global Risk Academy Courses Below

Business Exchange

If your organization delivers products and services that bring value to our members, you are welcome to join our partnership program.

Companies are welcome to setup a business profile page in our Multimedia Business Directory. You will get full control of the page and can include cutting edge possibilities – videos, adverts, presentations, white papers, job offers, Press Releases, product information, company blog, news feeds and more.

CLICK HERE TO APPLY

Our Knowledge Partners

Request our MEDIA KIT

Badge

Loading…

Our Twitter feed

© 2017   Created by Boris Agranovich.   Powered by

Badges  |  Report an Issue  |  Terms of Service