digital (121)

8028274262?profile=original

Another Successful Example on How to Compete: Putting Customers before Products (From Selling Hospital Beds to Protecting Patients)

Source:

 

MIT - CISR

Authors:

Moloney, Kate
Ross, Jeanne W.
Beath, Cynthia M.

Abstract: Hill-Rom Holdings started producing wooden furniture for hospitals in 1929. By 2017, the company was a diversified medical technology and services company. To leverage digital technologies, Hill-Rom was transforming from its traditional lines of business to a company that was leveragin

Read more…

Even if you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever had a MySpace page, this information is still out there, and you have to protect it. Here are some simple and easy ways that you can protect your digital life:

  1. Change Passwords – The first thing you should do is make sure you are regularly changing passwords. Make your passwords difficult to guess, and a mixture of letters, numbers, and symbols. Also, make sure that yo
Read more…

A shocking study by the National Associated for Information Destruction has revealed some terrifying information: 40% of electronic devices found on the second-hand market contains personal information. This information includes usernames and passwords, personal information, credit card numbers, and even tax information. Tablets were the most affected, with 50% of them containing this sensitive information, while 44% of hard drives contained the info.

What does this mean for you? It means that al

Read more…

8028254482?profile=original

The Digital Storm: Blowing Away the Human Mind

By John Stanton

Global Research, March 01, 2017

Technology is Like a Hammer: You Can Use it to Build a House or to Break Somebody's Head

(Enrique R. Suarez)

“Temporal compression, as it is technically called, is an event that concretely modifies everyone’s daily life at the same time. In the face of this acceleration of daily life, fear has become an environment even in a time of peace.

We are living in the accident of the globe, the accident of instantan

Read more…

Are You Ready for Digital Transformation?

Digital transformation means providing all our clients the possibility to interact with us via the channel they want, when they want. As a client experience leader, we will follow the client journey across all interaction channels”

You think you are ready for the digital transformation, but do you have the right foundation in place? Having a clear performance framework is the starting point for a successful digital transformation journey.

Ahead of the PEX Network’s 3rd Annual Operational Excellen

Read more…

8028245493?profile=original

Source:

Yuhyun Park

Chair, infollutionZERO Foundation

World  Economic Forum

The social and economic impact of technology is widespread and accelerating. The speed and volume of information have increased exponentially. Experts are predicting that 90% of the entire population will be connected to the internet within 10 years. With the internet of things, the digital and physical worlds will soon be merged. These changes herald exciting possibilities. But they also create uncertainty. And our kids are

Read more…

Don't pick up that USB Drive!

What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb drive) around the University of Illinois Urbana-Champaign campus. They wanted to see just how many, and how soon after dropping them off, they’d be collected by people.

Turns out that 48 percent of the drives were taken and inserted into computers. The report at theregister.co.uk says that in some cases, this was done minutes after the drives were left in the public spots.

Picking up

Read more…

8028246495?profile=original

Written by:

Mark Weinberger, Global Chairman and CEO, EY

 

Source:

World Economic Forum


As you read this article, you’re one of over 3 billion people connected to the internet right now. That’s nearly half of the people on Earth. Some of these people are shopping, catching up with friends, or, like you, reading the World Economic Forum’s Agenda. Others are managing global supply chains, responding to customer service requests, or building an app that’s going to change the world. As a CEO, I know that

Read more…

Pay attention to your IoT Device Security

Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat—turning the heat up remotely an hour before you get home to save money…and “smart” fitness monitors, baby monitors, watches…

Slow down. Don’t buy a single smart device until you ask yourself these 10 questions. And frankly, there’s a lot of effort in some of these questions. But, security isn’t always easy. Check it out.

  • Was the company ever hacked? Google this to find out.
  • If so, di
Read more…

How to recycle Old Devices

When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.

Your discarded smartphone, laptop or what-have-you contains a goldmine for thieves—because the device’s memory card and hard drive contain valuable information about you.

Maybe your Social Security number is in there somewhere, along with credit card information

Read more…

Curating and Creating Community

8028241262?profile=original

Curating and Creating Community

 Source:

Veronika SUMOVA

EC- EU Digital

24 June 2015

With more than 290 million (and counting) active social media users in Europe, online engagement continues to grow. Seeing that the community on our social media platforms can get very active, at the beginning of 2014 we (the social media team) started thinking how we can take this interaction a step further. Rather than creating something for our community, how can we create something with our community?

United in D

Read more…

There are many reasons someone might right-click on your image and “Save image as…”

Porn, Sex and Dating Sites

  • A woman might steal your blog headshot and use it for her dating site profile.
  • A perv might take the picture of your child off your Facebook page and put it on a porn site.
  • A person who runs a racy dating site might take your image and use it to advertise his service.

Scams

  • Someone might use, without your knowledge, a photo of your house for a rental scam.
  • Your motorcycle, jet ski, boat, puppy
Read more…

Hackers know small companies are more vulnerable to data breaches due to limited resources. Cybersecurity should always be a high priority. But when a company’s IT staff consists of maybe 1-2 people who are provided limited budgets and are constantly solving other tech problems, the focus on security suffers. And hackers aren’t the only problem. One significantly overlooked part of the security process “cleaning” the IT infrastructure.

IT staff being and small business owners must keep on top of:

Read more…

How to prepare for Digital Disasters

Editor’s Note: In this week’s guest blog security expert Robert Siciliano explains how to protect your IT systems and your business from hardware failure. To learn more, download our new e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”

It is September and that means National Preparedness Month: an ideal time to get involved in your community’s safety. Make plans to stay safe, and this includes keeping ongoing communications alive. National Preparedness Month culminates Se

Read more…

Define Your Digital Strategy—Now

8028237066?profile=original

Enrique Suarez Presenting:

Define Your Digital Strategy—Now

Source:

Ross, Jeanne W.
Sebastian, Ina
Fonstad

Center for Information Systems Research (CISR)

M.I.T

2015-06-18

Abstract: The confluence of social, mobile, analytics, cloud, Internet of Things, and other powerful, readily accessible technologies is disrupting businesses in all industries. Success requires a coherent digital strategy that is informed by the capabilities of these technologies. Leaders guide investment decisions by focusing on eithe

Read more…

Gone are the days of the fat wallet bursting at the seems, since smartphones can now contain most anything that a wallet does—except the driver‘s license. But don‘t write that possibility off just yet.

5W1.jpg

Forbes.com reports on a story from the Des Moines Register that the Iowa Department of Motor Vehicles is hot on the trail of getting driver‘s licenses into smartphones: an app that would contain all the applicable data, a scannable bar code and a two-step verification which would include a biometri

Read more…

How to plan for Digital Disasters

In this day and age, we should never hear someone proclaim, “Oh my God, my computer crashed! I lost everything!” You can’t lose something that’s been properly backed up.

So many people, including ones with businesses that rely upon cyber communication, continue to avoid backing up their digital data.

Nobody is exempt from the No. 1 rule of backing up your data. Anything could happen:

  • Hard drive crash
  • Accidental deletion
  • Water damage
  • Fire
  • Theft (offline)
  • Ransomware

The planning for digital disasters begin

Read more…

Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring

Read more…
Tax-289x151.png
The Independent reports that Ireland's Chartered Accountants are warning that "new OECD proposals on taxing hi-tech multinational companies will fundamentally change business landscape." 
 
The OECD has published a draft discussion on companies operating in the digital economy.  The question of determining tax liability for companies with a business model spanning multiple countries is a growing concern for national tax agencies. Outsourcing, offshoring, the use of tax havens and global e-commerce
Read more…

How do you get the balance right between customer service and security? The battle between banks and fraudsters is ongoing, with banks losing millions each year through fraud.

In addition, the rise of digital and mobile banking over the past few years has led to banks investing heavily in their fraud and security measures. These authentication devices alongside integrated malware detection and fraud monitoring systems can be a barrier to a satisfying, simple customer experience. How do banks prot

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead