security (283)

Why install a Home Security System?

Question: No. 1 reason people get a home security system?

Answer: Recently burglarized; The majority of the people I hear from who want to install a home security system were recently burglarized. It often takes adversity or even tragedy for us to wake up to the realities of a harsh world.

Of course, even for people who’ve never been victims of a robbery, prevention of a burglary or home invasion is a top reason people get home security systems.

Home burglary is a very common crime. But deterring b

Read more…

Sixty different materials go into the printing of a U.S. passport. That little booklet of a thing contains up to 30 pieces of security—and you can’t see most of them. And good luck trying to get details on these security features.

The author of an article on gizmodo.com points out that he tried to get specifics from Homeland Security, but that the “forensic lab’s experts couldn’t discuss the security.” The author then sought answers from passport and forgery experts.

Holograms

When you see or hear

Read more…

Privacy used to mean changing clothes behind a partition. Nowadays, say “privacy” and people are likely to think in terms of cyberspace. Stay connected, and you risk losing your privacy.

Even if you’re not connected, don’t even own a computer or smartphone, information about you can still be out there on the Internet, such as a listing for your address and phone number or a way for someone to get it with a small fee if you live in owner-occupied property.

An article on wired.com points out that th

Read more…

Learning to trust your Intuition

The old TV show “Star Trek” has and episode where Spock is telling Kirk of a human flaw called intuition. Spock was all about analysis and logic, while Kirk often relied upon intuition to solve problems. Intuition is a complex human sense that isn’t entirely understood or even believed to be real by some. Some call it mothers intuition or women’s intuition. But I believe everyone has it even though some don’t know how to properly cultivate it for their benefit.

Intuition vs. Analysis

A Rice Univer

Read more…

Sad Scary State of Bank Security

Who needs guns, threatening notes to rob a bank when you can do it with just your fingertips inside your home?

A hacking ring in the eastern portion of Europe may be the most successful team of bank robbers to date, having purportedly robbed $1 billion from multiple banks. This can only be done by infecting computers with malicious software (malware) and sucking out all the money.

Obviously, these hackers aren’t dumb criminals, but they also play on poor security measures of the banks. Apparently,

Read more…

Mobile Apps Failing Security Tests

It’s been said that there are over a million different apps for the smartphone. Well, however many may exist, know that not all of them are passing security tests with flying colors.

You may already be a user of at least several of the 25 most downloaded apps And what’s so special about the top 25? 18 of them flunked a security test that was given by McAfee Labs™ this past January. And they flunked the test four months after their developers had been notified of these vulnerabilities.

App creators

Read more…

What happens when a Bank Account is hacked?

Who’d ever think that 50 years ago, your money was safer in your bank account than it is today in this “modern” age: remote theft. If you bank with a large or small bank, your account may be at risk by hacking rings.

However, most of the time, but not always, if your account is drained by a cyber thief, the bank will cover it for you.

The latest information is that a big attack is planned in the spring, but it’s the “It’s easier to get one dollar from a million people than it is to get a million b

Read more…

Online Data less safe than ever

It’ll get worse before it gets better: online data safety. It’s amazing how many people think they’re “safe” online, while one huge business or entity after another keeps getting hacked to the bone.

And “safety” doesn’t necessarily mean the prevention of your computer getting infected with a virus, or falling for an online scam that results in someone getting your credit card information. It’s also a matter of privacy. While targeted advertising (based on websites you’ve visited) may seem harmle

Read more…

Deadbolt, gotta gotta have It

Deadbolts aren’t hyped up; they really are superior to regular knob locks. Though we keep shaking our head in amazement whenever yet another news story comes out about a burglar or rapist who waltzed through an unlocked door and committed mayhem, it remains a hard fact that many criminals gain entry via physical force.

Yes, what you see in movies and TV shows is true: People CAN kick open a locked door—that’s either missing a deadbolt, has a faulty one or simply because a door jamb itself is jus

Read more…

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to go undetected as he steals your belongings. But unlike the burglar, who usually takes your stuff and leaves, an efficient rootkit can stick around for years doing its work, robbing your computer or m

Read more…

12 Home Security Mistakes We Make

Smart criminals love dumb homeowners, but even a dumb burglar can score big when the homeowner makes just a little slip in security measures.

3B.jpg

  1. Don’t nickel-and-dime your door locks; get high quality locks. A cheap lock is cheap.
  2. Don’t hide keys. Anyone knows to check under the flower pot or on top of the ledge above the door frame. Consider a keyless lock.
  3. Make sure valuables aren’t visible through windows—including those of your car.
  4. Flatten boxes that valuables came in like flat screen TVs so that
Read more…

Having the Privacy Talk with your Kids

Years ago, having “the talk” with your kids meant telling them where babies come from. Nowadays, “the talk” has a whole new meaning. Your kids may be able to explain in detail how a baby is created, but may be clueless (because so many adults are) about something called “data permanence.”

2P.jpg Don’t beat around the bush. Tell your kid outright, “If you post any racy images of yourself online—it will be there for the next million years for anyone to see. And it can be used against you.” Give this same

Read more…

Data Breach Aftermath

Haste certainly doesn’t make waste if you’ve suffered from an entity getting hacked resulting in a data breach. Don’t waste a single minute delaying notifying affected accounts! In the case of a credit card company, they will investigate; you won’t have to pay the fraudulent charges. The breached card will be closed, and you’ll get a new one. And there is more.

11D.jpg

All sounds simple enough, but the experience can be a major hassle. Below is what you should do upon learning your card has been breached

Read more…

Spy on your Kids yes or no

It’s one thing to bust into your kid’s diary and read it, but if your kids want the privilege of engaging in the cyber world, they need to understand that parents are justified in “spying” on them. Or are they? Depends on whom you ask and how far they go at “spying” on their kids.

2015-01-29-2W-thumb.jpg

Frankly It’s not spying at all and both kids and parents should get over it. It’s called parenting. My kids are still young, but as they get older there will be hardly a thing they do online that I won’t be aware of. Th

Read more…

Survival is about being Persistent

“Survivor.” What comes to mind when you see or hear this word? A victim of a disease or of a perverted crime? A TV show? We’re all survivors in that every day, we do something to stay alive—life-saving things we don’t even think about as life-saving, such as eating healthy and exercising. People die every day from killing themselves with food.

tumblr_inline_niw24gMjMV1qa344h.jpg

Survival also may conjure up true spectacular stories of survival, like the man who cut off his arm to free himself from a boulder because he was starving

Read more…

What is ATM Skimming?

Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your  savings account can be wiped out in a flash.

tumblr_inline_niqy05Zi1S1qa344h.jpg

Picture a scrawny nerd tampering with an automated teller machine (ATM)—the machine you use with your debit card to get cash. The thief places a device over the slot through which you slide your debit card. You have no idea it’s there. You swipe your card, and the device “skims” or reads your card’s

Read more…

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.

tumblr_inline_niomokY2oh1qa344h.jpg

  1. “Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand doesn’t mean it’s not worthy of as much
Read more…

Cryptocurrencies are an emerging method and protocol serving to facilitate the exchange of values between human beings.  These new virtualized valuation systems can link back to the material through fiat currencies.  Value is always relative.  A re-valuation of a cryptocurrency represents a devaluation of the material and an increase in value of the individual.  These cryptocurrencies provide us with great new pier-to-pier tools and protocols for transparency, privacy, security and real time ris

Read more…

Is Cybersecurity an Inside Job?

While security clearance and authentication processes are essential to physical and other security, the physical DC Navy Yard breach by Aaron Alexis and the state secret breaches by Edward Snowden illustrate some disturbing weaknesses in personal validation and authentication. These clearance breaches were very different in nature but show a range of how a person’s calculated action can subvert basic security measures.

Neither top secret clearance, sophisticated authentication nor the most adva

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead