security (276)

Are you getting a lot of scammy, spammy telemarketing calls? If you are, you know how annoying they can here. Fortunately, there are some apps out there that can help. Here are a few worth looking into:

CallApp

You can use CallApp to lookup numbers, and then decide if you want to answer it or not. It collects data from users, and then gives you this information when a call comes in. You can get CallApp Crawler for Android phones.

Call Control

This app offers reverse look up, call blocking, and it ca

Read more…

How To Determine a Fake Website

There are a lot of scammers out there, and one of the things they do is create fake websites to try to trick you into giving them personal information. Here are some ways that you can determine if a website is fake or not:

How Did I Get Here?

Ask yourself how you got to the site. Did you click a link in an email? Email is the most effective ways scammers direct their victims to fake sites. Same thing goes with links from social media sites, Danger Will Robinson! Don’t click these links. Instead, g

Read more…

Your Kids Digital Lives Are in Shambles

If you have a teenager, you probably have a battle in play: do you or do you not manage your teens mobile devices. Though some parents see this as an invasion of their child’s privacy,(which, frankly, is stupid) there are many reasons why you should start managing what they are doing online.

Some of these reasons make a lot of sense. Mainly, what your kid does at age 17 and under, is your responsibility, or in essence, your fault if they screw up. If they send a nude photo, that’s child porn, and

Read more…

Protect your USPS Mail from Getting Stolen

USPSID stands for U.S. Postal Service Informed Delivery. It is a good thing to sign up for because it informs you of your expected deliveries.

But there’s a problem: Someone ELSE could pose as you and sign up for this service, getting your mail before you have a chance to.

In fact, it has already happened. Crooks have signed up as other address owners and collected their mail.

This can lead to credit card fraud if some of that mail includes new credit cards or credit card applications.

And what if t

Read more…

Humans have evolved a new body part: the cell phone. One day it will be part of anatomical illustrations of the body in health and medical books probably an appendage on your head. I’m not a Dr. so don’t quote me.

For now, we have to figure out a way to keep this appendage juiced up without being lured into a data-sucking battery-charge station.

There’s even a name for this kind of crime: juice jacking. The kiosk is designed to appear like a legitimate battery charging station, when in fact, it wi

Read more…

Protect Yourself From Gift Card Scams

So maybe Christmas now means the very predictable gift card swap, but hey, who can’t use a gift card? But beware, there are a ton of scams. This includes physical, not just digital, gift cards.

Regardless of who gave you the card, you should always practice security measures. Below are two common ways that fraudsters operate.

Transform Gift Card to Cash Twice.

If someone gives you a $200 gift card to an electronics store and then it’s stolen, you technically have lost money, as this is the same as

Read more…

Global Internet Security Market Share

Internet security is an over-all phase that represents the many different activities individuals and companies decide to use shelter computers or computer networks which were attached to the Internet. One out of the everyday truths behind Internet security is that often the Internet by itself is not a secure environment. The Internet was originally considered as an open, carelessly linked computer network that could facilitate the no cost share of ideas and information. Data redirected over the

Read more…

Global Cloud Security Market Growth

Cloud security is a fast-growing service that offers a large number of the same exact functionalities as classical IT security. That includes securing most important information from theft, data leakage and deletion. Cloud security includes a set of policies and controls, which specialize in the security issues with the cloud by protecting applications, data, and infrastructure. The cloud computing market is liable to threats which include data breaches, data loss, and insecure application progr

Read more…

How to Protect You Frequent Flier Miles NOW

Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.

How do Hackers Steal Frequent Flyer Miles?

As with other types of ID theft, hackers use info that they have illegally obtained to access frequent flyer accounts. With more data breaches happening than ever before, hundreds of millions of records are exposed, and thus, hackers have g

Read more…

How Your Username Can Be used to Track You

You probably have a few usernames, or you might have just one that you use for every site. Either way, your user names can be used not just to identify you online, but it can also be used to track you and find out information about you. How do people track you based on your user name? They do the following:

They Start with a Google Search

The first thing people do to track your username is do a Google search. You will be amazed by all of the information that is out there. However, Google is not th

Read more…

Does Your Mobile Have Spyware on It?

You have a mobile phone, you might think it’s pretty safe, but what you might not realize is that these devices can have spyware on them. Keep in mind, many of the “signs” listed below are everyday normal phone behaviors. But combined, might mean spyware. Here are some of the signs:

Unusual Background Noise

While common, humming, static, or other weird noises could be a sign that someone is tapping your line. Though all phones might have strange noises from time to time, you should check if there

Read more…

Do Not take that Stupid Facebook Quiz

Where should you live in the world? What Game of Thrones family are you in? What is the food that best describes your personality? All of these answers are given and found by doing quizzes on Facebook. You have surely seen them if you use Facebook, and have may have taken these quizzes, but you definitely might want to consider stopping. If you have ever used one of these quizzes, you have probably given these third-party apps permission to access some of your personal data. Not only does this a

Read more…

There is a new Social Security scam in the news, and you should definitely know about it. The Acting Inspector General of Social Security, released a statement that warns people of this new scheme. Basically, scammers are impersonating Social Security Administration employees.

The scam started out fairly small and localized, but now, people from across the country are reporting that they are getting calls from people stating that they are from the Social Security Administration. The caller attemp

Read more…

Cyber criminals are constantly trying to stay one step ahead of the good guys, and there is now another scam out there that you should know about: synthetic identity theft. Basically, the criminals take information from someone, and then make up the rest. They also often use fake Social Security numbers, called CPNs, or “credit profile numbers,” or names.

This type of identity theft shows us that our credit system is more vulnerable than we might think. Basically, it is easy to create a credit fi

Read more…

It seems like 2017 broke records for all the wrong reasons…one of them being the worst year for data breaches in history.

According to reports, hacking was the most common way to collect this data, but almost 70% of exposures occurred due to accidental leaks or human error. This came down to more than 5 billion records. There were several well-known public leaks, too, including the Amazon Web Services misconfiguration. More than half of the businesses using this service were affected, including c

Read more…

You have probably heard the story before. Teenage girl takes some scantily clad photos and sends them to her latest boyfriend. “What could go wrong?,” she thinks. Well, a lot could go wrong, and an article on Vice.com really lays that out. You might think that the boyfriend is to blame for this 15-year old’s photos spreading like wildfire, but the truth is this: he deleted them soon after getting them…the photos got out because the teen kept them on her phone and some classmates took that phone.

Read more…

Vendor-Data-Breached-1024x512.jpg

What’s worse than a vendor that suffers a data breach that exposes your sensitive customer information? The answer: A vendor that waits almost six months to tell you about it.

That’s the issue that both Sears and Delta Air Lines are facing after a malware attack on each of the company’s online chat services vendors. Hundreds of thousands of customers’ payment information was accessed, including payment card account numbers, expiration dates, names, and addresses, reports Gizmodo. Sears and Delta

Read more…

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.

Recently, I was talking to employees of a credit union about what to do in a robbery. Before this presentation, police officers had staged a robbery in the same credit union. The fake robbery was so real, some of the tellers were brought to tears, thinking they were really getting robbed.

A

Read more…

All of us have cell phones these days, and if you are like the vast majority of the population, you access everything from social media to banking information right from your mobile phone. However, if you do this, which everyone does, you are putting yourself in the position to get hacked. With only your mobile phone number and a couple other pieces of information, a hacker can get into these accounts and your life could drastically change.

How does this work? If a hacker already has your mobile

Read more…

I recently created my next video tip. It only takes about 3 minutes. However, this one is not about cyber exposure in organization but rather some advice regarding your personal cyber exposure. You can find the post at:

https://mediaexplorers.lpages.co/cyber-security-tips-series-tip-2-your-personal-privacy-and-security/

The text copy is below.

Hi, this is Doug Nagan with my second cybersecurity tip.
However this one is not about the cybersecurity of your  organization but rather your personal priva

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!