threats (9)

Cybersecurity vulnerabilities are an increasing concern for every company in every industry. Year over year, data breaches increase by 75%. Why are they becoming more prevalent, and how can you protect your business?

8028282501?profile=originalBefore you can protect your company from a data breach, you have to understand why they’re occurring. So let’s look at some statistics:

  • 81% of hacking-related breaches leveraged either stolen and/or weak passwords
  • 70% of employees reuse passwords at work
  • Ransomware is the top variety of
Read more…

Cyber Wack-a-mole - It's not a game

It can be all to easy to get caught in the trap of cyber wack-a-mole, where as soon as you need with one cyber threat several more appear. The link that follows will take you to a short (2 minute) video that outlines the the situation most of us find ourselves in.

www.naganresearchgroup.com/CWAM.mp4.

Take a look. I appreciate your feedback.

Thanks.

Read more…

Managing Cyber Exposure vs Cyber Risk

Much effort is being expended, rightly so, in addressing cyber risks. However, it is a frustrating exercise since new risks and threat vectors are arising daily, even hourly. If you would like to stop playing cyber wack-a-mole and get on the offensive watch this video. It only takes 5 minutes and will explain why understanding and managing your cyber exposures provides a way to take the offensive.

Hope you enjoy and gain something from it.

Managing Cyber Exposure Video

Read more…

8028246465?profile=original

Europe Is Disintegrating While Its Citizens Watch Indifferent

 

Source:

Originally Published by Inter Press Service

A Superb Commentary from Roberto Savio

Global Research, February 05, 2016

We are witnessing the slow agony of the dream of European integration, disintegrating without a single demonstration occurring anywhere, among its 500 million citizens. It is clear that European institutions are in an existential crisis but the debate is only at intergovernmental level.

This proves clearly that Euro

Read more…

RISKS… What are you?

8028243454?profile=originalIt is inspirational to hear words that rhyme where a line and a stanza impart a meaning using the song-like attributes of the articulated statements. The command of a poem makes one remember. It helped some University students recall difficult formulas in integral and differential calculus. It is real and it does work. I’ve used it a lot during my college years singing “The Integral of u” to the tune of “The Wonder of u.”

I have always wanted to write about risk-based management principles in a p

Read more…

Some five to ten years ago, a Project Controls colleague asked an interesting question. It is about the analysis/reports that our PC Group completes periodically. Some of the reports are “as required” but most times on a fixed cycle; e.g. bi-weekly, monthly, quarterly and annually.

He asked us, “What are the attributes of a good variance analysis?”

Reflecting on the questions, all which matter most, came pouring forth. While writing the bulleted central piece of what a good analysis/report is like

Read more…

Feds warn of more Online Predators

What goes on in the home life of a 14-year-old girl such that she feels there’s nothing better to do than send nude photos of herself to a man whom she’s been corresponding with online? Though this goes well-beyond the parents not bothering to find out what their kids do online, another huge issue is the proliferation of online predators.

tumblr_inline_nij30dCpJX1qa344h.jpg

And for parents who DO care enough to monitor their kids’ cyber activities, here’s some unsettling news: A 2013 survey called  Digital Deception: Exploring the

Read more…

Security Risks of Web 2.0

Introduction

Let’s start with what’s Web 2.0 before getting in to the risks.

The term Web 2.0 is commonly associated with web applications that facilitate interactive information sharing, interoperability, user-centered design and collaboration on the World Wide Web.

For some of you still not clear of what’s Web 2.0 let me put it down in a different way. Web 2.0 is Facebook or MySpace or Linkedin or Twitter or the blogs or the Wikis or any web site which allows the visitor to interact by posting up

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead