online (129)

Your Kids Digital Lives Are in Shambles

If you have a teenager, you probably have a battle in play: do you or do you not manage your teens mobile devices. Though some parents see this as an invasion of their child’s privacy,(which, frankly, is stupid) there are many reasons why you should start managing what they are doing online.

Some of these reasons make a lot of sense. Mainly, what your kid does at age 17 and under, is your responsibility, or in essence, your fault if they screw up. If they send a nude photo, that’s child porn, and

Read more…

Protect your USPS Mail from Getting Stolen

USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.

But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.

In fact, it has already happened. Crooks have signed up as other address owners and collected their mail.

This can lead to credit card fraud if some of that mail includes new credit cards or credit card applications.

And what if t

Read more…

Protect Yourself From Gift Card Scams

So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.

Regardless of who gave you the card, you should always practice security measures. Below are two common ways that fraudsters operate.

Transform Gift Card to Cash Twice.

If someone gives you a $200 gift card to an electronics store and then it’s stolen, you technically have lost money, as this is the same as

Read more…

How Your Username Can Be used to Track You

You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:

They Start with a Google Search

The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not th

Read more…

Of course, we all wait eagerly for the budget every year. Most of the time it brings a big smile to our face or sometimes it takes our anxieties to the toughest level. Some new laws have been introduced in the last year budget. Section 194-IB is the example of such debutante. Earlier, there was only one section that has brought the rent under the umbrella of TDS and it was section 194-I. Now, the most wondering thing is why would section 194-IB brought in when section 194-I was already there. Th

Read more…

Do Not take that Stupid Facebook Quiz

Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this a

Read more…

Nike Believed in Something and Sacrificed Nothing

Unless you are just returning to civilization, you must have heard about an American controversy involving Colin Kaepernick and Nike’s “Believe in something even if it Means Sacrificing everything” advertisement. This comes as apart of the “Just do it” campaign which is under trademark registration rules. Well, say what you will about the ad and how it has been popularized, it seems that Nike has benefitted massively from the advertisement as the

Read more…

Special Courts and their Plight

Special Courts are up to their necks deep in corporate fraud cases with serious offenses. In this mess of serious offenses, many routine procedural errors and lapses are piling onto the pending cases and cluttering the justice system for corporates. In a pursuit, to "de-clog" the system, a 10-man government-appointed committee chaired by Mr. Injeti Srinivas are looking to bring about radical changes by restructuring corporate offenses. This attempt also comes as pa

Read more…

Have you started you a new food business but unable to run it for long? Are you wondering why it foils down when you have never left any recoupment of money invested? So here is your answer, Anyone can start a food and beverage business but there are very few who did not end up with fail. This article will help you to know what are the points that should be kept in mind while establishing a food and beverage business so that it will not make you disappoint and take you to the zenith of success.

F

Read more…

Proposed Changes in GST Form

August 7th Tuesday, the Lok Sabha passed 4 new bills in an attempt to GST procedures with a focus on empowering the MSME(Micro, Small and Medium Enterprises) sector. The government is also targeting to plug loopholes in existing laws and lightening ROC compliances requirements described as ‘complex’ by many a business owners. The new return filing system is expected to be put in place by the revenue department by January 2019 and would actively replace the current GSTR-3B and GSTR-1 returns.

In a

Read more…

You have probably heard the story before. Teenage girl takes some scantily clad photos and sends them to her latest boyfriend. “What could go wrong?,” she thinks. Well, a lot could go wrong, and an article on Vice.com really lays that out. You might think that the boyfriend is to blame for this 15-year old’s photos spreading like wildfire, but the truth is this: he deleted them soon after getting them…the photos got out because the teen kept them on her phone and some classmates took that phone.

Read more…

The Ponemon Institute released a shocking statistic: about 80% of all corporate data leaks is due to human error. In other words, it only takes a single staff member to cause a huge issue. Here’s a scenario: Let’s say that you have an employee, Betty. Betty is lovely. We love Betty. But when Betty is checking her personal email during her lunch break and sees she has an offer that promises a 10-pound weight loss in only a week, she clicks the link. She wants to learn more about it, so she clicks

Read more…

How to Get Started with Lean

8028261856?profile=originalNew Free Video: How to Get Started with Lean

The first video in Gemba Academy’s new Gemba Talk series is "How to Get Started with Lean."

8028261277?profile=original

Watch it here:

This series will answer the most common questions we receive, and will remain free and won’t require registration. To ask a question, or view the second video (How Much Does a Lean Journey Cost?), go here

8028261488?profile=original

Thinking about enterprise-wide lean training in 2018?

Gemba Academy offers very flexible enterprise training programs so all of your sites can learn

Read more…

If you haven’t yet heard, Equifax, one of the three major credit bureaus in the United States, has been hacked. What does this mean for you? It means that your Social Security number, and possibly even your driver’s license information, could be in the hands of hackers. Some are already calling this the worst breach of data in history.

How Did This Happen?

On September 7th, Equifax announced that a security breach occurred that could impact as many as 143 million people. Though this isn’t the larg

Read more…

Black Hat 2017 was an Amazing Event

In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss security.

For two decades, Black Hat has gained a reputation for demonstrations of some of the most cutting-edge research in information security as well as development and industry trends. The event has also had its

Read more…

ISPs invading Subscriber's Privacy

It’s hard to keep track of the news of politics these days, and even if you can, how do you know it’s even real? The political landscape has greatly changed since January, and there have been a lot of laws passed that will affect us all, including the repeal of a law that protected your privacy on the internet. Basically, with this repeal, your internet service provider, or ISP, can sell your browsing history to anyone.

If you use the internet, you will be affected by this law. Not only will this

Read more…

You might have heard about all of the scams out there, and think that you are pretty scam savvy. But, the truth is, most of us aren’t, and even a simple phone call could get you caught up in a big scam.

One such scam occurs when criminals call random phone numbers and ask questions, such as “Can you hear me?” When you say “yes,” they record it. They then bill you for a service or product, and when you try to fight it, they say…but you said ‘Yes.’ Not only does this happen with private numbers, it

Read more…

Getting Owned or Pwned SUCKS!

A well done New York Times article recently re-introduced this topic to the masses. Being “owned” isn’t new, but the term is not becoming part of popular culture. If you use the internet or are often on social media, odds are good that you have been OWNED. Whether you are called out for a misspelling on your latest Facebook post, or you were proven wrong after sharing a “fact” or post from another site…you have probably been owned.

The word “owned” comes from the hacker world, and real “ownage” i

Read more…

Even if you don’t realize it, your identity is all over the internet. Whether you posted to an internet forum in 1996 or you ever had a MySpace page, this information is still out there, and you have to protect it. Here are some simple and easy ways that you can protect your digital life:

  1. Change Passwords – The first thing you should do is make sure you are regularly changing passwords. Make your passwords difficult to guess, and a mixture of letters, numbers, and symbols. Also, make sure that yo
Read more…

If you employ remote workers, your IT staff has a unique challenge keeping your organization safe. Fortunately, using a combination of best practices for cybersecurity, user awareness campaigns, and a strong policy will help to keep data safe.

New advances in mobile technology and networking have given remote workforces a boost, and while policies for most remote workers generally depend on manager or company preferences, most businesses must accommodate a mobile workforce on some level…and here’

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead