social (54)

8028234687?profile=originalEnrique Suarez Presenting:

Sowing the GMO Seeds of Depopulation?

Read more…

8028233475?profile=originalEnrique Suarez Presenting:

George Washington, Thomas Jefferson, Alexander Hamilton, John Adams and James Madison Slammed Runaway Inequality
Source: Washington's Blog
 
Global Research, April 22, 2015

The primary author of the Constitution – and later president – James Madison wrote:

The great object [of political parties] should be to combat the evil: 1. By establishing a political equality among all. 2. By withholding unnecessary opportunities from a few, to increase the inequality of property, by an

Read more…

How Hackers use LinkedIn to Scam

Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.

An article on blog.sungardas.com was written by a white-hatter (his job is to try to hack his clients’ systems so that they know how to make them more impenetrable to the bad guys). The author says he’d make a beeline to Linked

Read more…

8028232268?profile=originalPresented by Enrique Suarez

Source: Eric Zuesse

Global Research, May 09, 2015

Oxfam’s recent report, “WEALTH: HAVING IT ALL AND WANTING MORE” contains shocking figures that the press haven’t sufficiently publicized; so, the findings and the reliability of their sources will be discussed here. The results will then be related to the central political debate now going on in the U.S. Presidential contests for 2016, which is about equality and inequality.

First, the findings:

1. The richest 80 individual

Read more…

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.

So how devastating would it be if someone got a hold of your social media accounts?

They could really wreak some havoc, like sending dirty links to all of your followers on Twitter. Or worse, take personal

Read more…

Intel Security has compiled a list of the top ways cybercriminals play with the minds of their targeted victims. And the chief way that the cybercriminals do this is via phishing scams—that are designed to take your money.

The fact that two-thirds of all the emails out there on this planet are phishy tells me that there’s a heck of a lot of people out there who are easily duped into giving over their money. I’m riled because many of these emails (we all get them) scream “SCAM!” because their subj

Read more…

Just when you think it was safe to believe your Social Security number can’t get stolen…news breaks of the Anthem data breach. Over 80,000,000 patient records were compromised, including SSNs and home addresses. Like a meteor striking the earth, a disastrous ripple effect is underway, with patients getting hit up with phishing e-mails.

If you ever suspect your SSN has been stolen, some suggest contacting the IRS and Social Security Administration and notify them of your situation. The thief can d

Read more…

The Security Costs of being too Social

One of the arguments against being very virtually social is that nobody is SO important that everyone wants to know, for instance, that this person is going to be at the local sports bar watching the Super Bowl (or almost nobody; sad to say, some celebrities have half the world following them).

Another argument, however, against tweeting and posting your every move is that this tells burglars when you’ll be away from your house.

So, you’re important enough to post every detail of your life on Face

Read more…

Crown Equity Holdings Inc. (OTCQB: CRWE) has been experiencing momentum that coincides with the development of the  CRWE-PR Network

The network is a portal for local news, city data and content of interest within the community. Communities are searchable by name and zip code.

National, world, sports and general topics are also covered with up to the minute updates across all sites. The CRWE PR Network offers  - local business listings, restaurant deals, coupon deals, classified ads, real estate l

Read more…

 

http://pennyomega.com/img/crwe_logo.jpgCrown Equity Holdings Inc. (CRWE)

Looking to deliver value for its stockholders in both the near and long term, CRWE is refocusing its strategic plan for future growth and services with its original online business-to-business (B2B) marketplace platform for manufacturers and small to large businesses on a global basis to sell and acquire various types of merchandise. CRWE has started updating its B2B business plan and strategies to move forward.

B2B is the term for transactions between businesse

Read more…

Social Media for Security and Risk Management Professionals

Everything you NEED to know

[Webinar]

social_bomb-300x225.png?width=400

Click Here

Social media is a growing influence on businesses and executive management.

Do you know they key issues affecting your business and how social media plays a role? 

This webinar is aimed at security and risk managers to help them quickly understand the issues, concerns and opportunities that social media presents.

The session will cover:

  • What social media really is for businesses
  • The big ones to be
Read more…

Providing a holistic overview on the widespread private use by employees and how many businesses embraced social media in their communications

Examining current social media compliance policies with case studies

Potential security risks, phishing scams, malware attacks,

Protection of (fair use of) intellectual property: The need to address the protection of intellectual property in policies and procedures of the proper business use of social media

Analysing the regulatory requirements on the use

Read more…

2011 Web Security Report

This security report examines Web behavior and the malware to which users are most frequently exposed. Analyzing Web requests from the Blue Coat WebPulse service, which weekly rates nearly three billion requests in real-time, this report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.

 

The 2011 Web-based threat landscape continues to become more sophisticated, utilizing a combination of techniques

Read more…

Social media guidance

Please find below links to interesting policy documents related to Social Media. These links have been compiled by Hilmar Nierop who kindly granted his permission to distribute them for your use.

These documents have informational value for all users of social media in various countries with their distinctive legal and communications culture. After all, the global use of social media has such an impact that it provides an international substance which reigns over local legal form(s), rules and r
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead