It’s one thing to bust into your kid’s diary and read it, but if your kids want the privilege of engaging in the cyber world, they need to understand that parents are justified in “spying” on them. Or are they? Depends on whom you ask and how far they go at “spying” on their kids.
Frankly It’s not spying at all and both kids and parents should get over it. It’s called parenting. My kids are still young, but as they get older there will be hardly a thing they do…Continue
Added by Robert Siciliano on January 29, 2015 at 3:43pm — No Comments
Twenty-seven Inspiring Quotes about Life and the Current World’s Condition and Comments by Enrique Suarez
1. "And those who were seen dancing…Continue
Added by Enrique Suarez on January 29, 2015 at 4:39am — No Comments
Interview with William Meehan, Executive Director, Capital Markets Trading Compliance at CIBC
The Volcker rule was published in December 2013 by US regulators and requires banks with over $10B trading assets and liabilities to prove that they are not participating in proprietary trading through the reporting requirements. It is a new regulation which has limited guidance from the regulators, causing confusion among banks. At the current time, the main focus for banks is to…Continue
Added by marcus evans N.A. Conferences on January 28, 2015 at 8:45pm — No Comments
“Survivor.” What comes to mind when you see or hear this word? A victim of a disease or of a perverted crime? A TV show? We’re all survivors in that every day, we do something to stay alive—life-saving things we don’t even think about as life-saving, such as eating healthy and exercising. People die every day from killing themselves with food.
Survival also may conjure up true spectacular stories of survival, like the man who cut off his arm to free himself…Continue
Added by Robert Siciliano on January 28, 2015 at 3:46pm — No Comments
Perhaps you’ve read that “HTTPS” at the start of a website address means that the site is secure, encrypted. However, a feature of the HTTPS can track you, says an article at theregister.co.uk.
HTTP is not secure. Carnegie Mellon University in a Register article states “HSTS”, which is “Strict Transport Security” redirects users to HTTPS. The HSTS authors decided that this redirection every single time was a bit much, so they came up with a feature that browsers…Continue
Last week, Insurance News Net’s Trish Ennis examined the relationship between occupational health, safety risk management and reputational risk.
Texas City refinery. Upper Big Branch…
Added by Steven Minsky on January 26, 2015 at 10:00pm — No Comments
Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your savings account can be wiped out in a flash.
Picture a scrawny nerd tampering with an automated teller machine (ATM)—the machine you use with your debit card to get cash. The thief places a device over the slot through which you slide your debit card. You have no idea it’s there. You swipe your card, and the device…Continue
Added by Robert Siciliano on January 25, 2015 at 9:02pm — No Comments
Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.
Added by Robert Siciliano on January 24, 2015 at 3:14pm — No Comments
When we talk about probability and risk as they relate to healthcare they are two terms that often get confused and misused. In November 2014 I attended a National Press Club luncheon featuring Anthony Fauci, M.D., director of the National Institute of Allergy and Infectious Diseases (NIAID). I attended Dr. Fauci’s lecture focused on the Ebola outbreak. As…Continue
What goes on in the home life of a 14-year-old girl such that she feels there’s nothing better to do than send nude photos of herself to a man whom she’s been corresponding with online? Though this goes well-beyond the parents not bothering to find out what their kids do online, another huge issue is the proliferation of online predators.
And for parents who DO care enough to monitor their kids’ cyber activities, here’s some unsettling news: A 2013 survey called …Continue
Added by Robert Siciliano on January 21, 2015 at 3:24pm — No Comments
You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.
How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could happen at an annual meeting of hackers called the Chaos Communication Congress, says an article at thegardian.com. His “victim” was defense minister Ursula von der…Continue
Added by Robert Siciliano on January 20, 2015 at 3:35pm — No Comments
One of the most frequently cited differences between Software-as-a-Service (SaaS) and On-Premise installations is the degree of flexibility between each type of solution. With SaaS solutions on the rise for GRC and Risk Management Software, more and more organizations are realizing that everything they thought they understood…Continue
Added by Steven Minsky on January 14, 2015 at 12:00am — No Comments
1. Death is something inevitable. When a man has done what he considers to be his duty to his people and his country, he can rest in peace. I think I have made that effort and that, therefore, I will sleep for eternity.
Lessons: Understand that being alive is an opportunity to celebrate the divine within us and therefore the divine in others. The main duty of a human being is to recognize that for dignity and prosperity to be realized, peace should be felt first for it is…Continue
Added by Enrique Suarez on January 11, 2015 at 12:31am — No Comments
Most people think of Risk Management in terms of finance, insurance and business. In healthcare, Risk Management seeks out errors with the potential to cause human harm. Risk Management consists of identifying, evaluating, and controlling the risk of these potential errors through a variety of quality control measures that become your medical practices’ Quality Control Plan. Risk Management is defined in ISO 14971 as the…Continue
Added by Prof. Maria Hardy, IMA(ASCP) on January 7, 2015 at 8:48pm — No Comments
Added by Steven Minsky on January 6, 2015 at 7:30pm — No Comments