Identity thieves are after children’s Social Security numbers. With this number, a thief can do so many things like open a credit card account and rent an apartment. Kids’ SSNs have great appeal to crooks because:
Parents should consider…Continue
Added by Robert Siciliano on March 8, 2016 at 3:27pm — No Comments
You may be putting your company at risk simply by hiring a new employee. Why? Because that person could have a hidden, malicious agenda.
This is known as an inside threat, and it means that someone within your organization is planning or conducting activities meant to harm the company.
There is a pattern that most insider threats use: The first step is to gain access to the company’s system. Once they have access to the network, they will investigate it and…Continue
Added by Robert Siciliano on March 7, 2016 at 3:39pm — No Comments
Regular risk assessments are one of the most important pillars of any risk management department. Although performing risk assessments is now considered best practice, it’s easy to overestimate their comprehensiveness. As a result, some risk managers are doomed from the start to mediocre results.
For a quick check on the adequacy of your risk assessments, determine how many of the following 5 best practices your program has ingrained in its ERM process.…Continue
Added by Steven Minsky on March 4, 2016 at 8:24pm — No Comments
Do you shop at Amazon.com? Are you aware they have a back door through which hackers can slip in?
Let’s look at Eric’s experience with hackers and Amazon, as he recounts at medium.com/@espringe.
He received an e-mail from Amazon and contacted them to see what it was about. Amazon informed him that he had had a text-chat and sent him the…Continue
Added by Robert Siciliano on March 3, 2016 at 3:03pm — No Comments
Have you ever thought about the role strategic advisors such as accountants, lawyers, risk managers, auditors, HR managers, IT managers and many other back of house advisors play in the success of organisations? I mean really thought about it? You probably have.
If you are a strategic leader receiving the advice you have probably thought about the need for key expertise and advice that you can rely on. Key elements required to develop trust in the relationship.
If you are a…Continue
Added by Bryan Whitefield on March 2, 2016 at 10:59pm — No Comments
Your account passwords should be as unique as your fingerprint—to make them less hackable by crooks using password-guessing software that can run through millions of possible combinations in just minutes. And if you have an easy password, there may be a hit within 10 seconds.
Think this software can figure out your password of “password1” or “monkey”? These are among the most used passwords. Needless to say, so is “1password” and just “password.” And…Continue
Added by Robert Siciliano on March 2, 2016 at 3:30pm — No Comments