safety (115)

What is a Cache?

Perhaps someone has told you that you need to “clear your cache,” but what does this mean and why should you do it? A cache is a folder of recently visited webpages, which is stored on your computer’s hard drive, and maintained by your Internet browser.

The purpose of a cache is to speed up the loading of webpages. Your computer’s hard drive collects data from websites that you visit, so that when you visit them again, certain aspects of the previously visited pages (such as graphics) don’t have

Read more…

According to a new Intel Security study, more than 2,000 American parents and kids ages 8-16 were surveyed to unveil some interesting things.

  • 79% of the juvenile respondents learned online safety from their parents.
  • 35% of them said they’ve been a cyberbully.
  • 27% of them said they have met, or would meet, a person in real life who they initially met online.

Technology is often blamed for all of this. But what drives these behaviors is the same force that drives the schoolyard bully to trip the bookw

Read more…

With all the increased news coverage of kids running off with adults they met online, and kids dying by suicide supposedly due to online bullying, many parents are wondering if their worries about their kids being online are justified.

We hardly hear about how social media has benefited kids. There’s nothing inherent about electronic communications or electronic media that makes it bad for kids. There will always be bad people out there—online and offline.

An article on commonsensemedia.org lists

Read more…

What is the Cloud?

You’ve probably heard of people storing information in “the cloud,” but what does that really mean, and is it safe to put your data there?

The cloud is best described as a network of servers offering different functions. Some servers allow you to store and access data, while others provide an online service. You may be familiar with “cloud services” offered by companies such as Google and Adobe.

The term “cloud” comes from cloud computing, which is essentially using a group of computer resources t

Read more…

Did you know that, once again, Facebook has changed its privacy policies? At the top of the FB page is a lock icon. Click it for more privacy settings.

What do visitors see? To view how visitors see your Facebook page, go to “Timeline and Tagging,” then hit “Review what other people see on your timeline/View As.”

Posts by friends. Click “Timeline and Tagging” to prevent a visitor’s unwanted post from showing. Then click “Enabled,” as this will allow you to “review posts friends tag you in before t

Read more…

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.

So how devastating would it be if someone got a hold of your social media accounts?

They could really wreak some havoc, like sending dirty links to all of your followers on Twitter. Or worse, take personal

Read more…

Burglars don’t usually depend upon the light of the moon to break into homes; they depend on the daylight—because that’s when they know most homes are empty! The kids are in school, the adults are at jobs or shopping…duhhh, even a halfwit burglar knows this is an opportune time!

Therefore, you should get a home security system that’s designed to repel robbers in both the dead of day, not just night. This includes while you’re home. And when you are home, a burglary turns into a “home Invasion” wh

Read more…

Protect Yourself from Online Fraud

Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft occur.

  • Imagine snail-mailing vital information like your SSN, bank account number, a duplicate of your driver’s license and your credit card number. At some point in the delivery process, someone opens the letter and see the contents. Elec
Read more…

Trolls get Dose of Reality

Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.

Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are collectively male.

Recently Schilling tweeted how proud he was that his daughter, Gabby, will be playing softball as a pitcher for Salve Regina University. Schilling got a lot of responses. And some were disgusting, incl

Read more…

5 Online Security Tips You need to know

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.

Passwords

  • Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each account. But people—including those who’ve been around for a long time—continue using the same password and ridiculously weak passwords, like password1 and princess.
  • A v
Read more…

6 Ways to halt Online Tracking

“On the Internet, you can be ANYBODY!”

Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.

  • Don’t feel you must use your full, real name when filling out forms or whatever, just because it’s asked or even a “required field.” Of course, you’ll want to use your real name when registering online with a bank, for instance, or making a purchase
Read more…

Having a house run like the Jetsons’ is becoming increasingly possible: It’s called home automation. If you’re not familiar with the futuristic cartoon family, the Jetsons, just about everything in their house was automated. Today, we can have the following:

  • Sensors that make noise when a door or window opens are nothing new, but real-time video surveillance of a home’s interior and exterior, viewed remotely through a smartphone thousands of miles away, is relatively new technology.
  • Controlling th
Read more…

How to recognize Online Risks

Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their Social Security numbers.

One of the most common ways this is done is through phishing.

  • The phishing attack is when the thief sends out thousands of the same e-mail. If enough people receive the message, sooner or late
Read more…

What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale?

Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though this begs the question, who on earth would want a coffee mug with a photo of a stranger’s child on it, there’s actually a market for this.

Koppie Koppie has taken photos of kids from Flickr. Koppie Koppie is actually

Read more…

Promote Child Home Safety

A recent controversial SuperBowl commercial from a major insurance company depicted a young boy who died as the result of numerous preventable household accidents such as poising and falls. The commercial got lots of traction via social media. Although it was presented tactfully, many people didn’t approve. The truth hurts and sometimes isn’t pretty. However the message was clear; so many child deaths are preventable!

“I’m home!” If your child is not reliable at notifying you they’ve arrived home

Read more…

Why install a Home Security System?

Question: No. 1 reason people get a home security system?

Answer: Recently burglarized; The majority of the people I hear from who want to install a home security system were recently burglarized. It often takes adversity or even tragedy for us to wake up to the realities of a harsh world.

Of course, even for people who’ve never been victims of a robbery, prevention of a burglary or home invasion is a top reason people get home security systems.

Home burglary is a very common crime. But deterring b

Read more…

Learning to trust your Intuition

The old TV show “Star Trek” has and episode where Spock is telling Kirk of a human flaw called intuition. Spock was all about analysis and logic, while Kirk often relied upon intuition to solve problems. Intuition is a complex human sense that isn’t entirely understood or even believed to be real by some. Some call it mothers intuition or women’s intuition. But I believe everyone has it even though some don’t know how to properly cultivate it for their benefit.

Intuition vs. Analysis

A Rice Univer

Read more…

15 Top Facebook Privacy Tips

You wouldn’t have to worry about privacy issues on Facebook if you didn’t post sensitive, private information on Facebook…such as information that one day can be used against you. And really, you should share only what you consider “professional” information, even with family. Just stop with the nonsense.

At any rate, it’s important to know how to use Facebook’s privacy features, which change from time to time. Here are useful tips.

  1. Go to Start, then Account, then Privacy Settings, then Edit Your
Read more…

The Security Costs of being too Social

One of the arguments against being very virtually social is that nobody is SO important that everyone wants to know, for instance, that this person is going to be at the local sports bar watching the Super Bowl (or almost nobody; sad to say, some celebrities have half the world following them).

Another argument, however, against tweeting and posting your every move is that this tells burglars when you’ll be away from your house.

So, you’re important enough to post every detail of your life on Face

Read more…

What is a Remote Administration Tool (RAT)?

Ever felt like your computer was possessed? Or that you aren’t the only one using your tablet? I think I smell a rat. Literally, a RAT.

A RAT or remote administration tool, is software that gives a person full control a tech device, remotely. The RAT gives the user access to your system, just as if they had physical access to your device. With this access, the person can access your files, use your camera, and even turn on/off your device.

RATs can be used legitimately. For example, when you have

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead