All Posts (5614)

Sort by

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number.

In a blog post, Cranor writes: “My phones immediately stopped receiving calls.” She was stiffed with “a large bill and the anxiety and fear of financial injury.”

Cranor was a victim of identity theft. She conta

Read more…

Cybersecurity Is Still A Boy’s Club

Cyberweapons are a constant and evolving threat to society. They have the potential to shut down entire electric power grids and bring companies to their knees. Securing networks against the threat is possibly the most pressing priority, and the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020 as a result.

One of most pressing priorities for companies in ensuring cybersecurity is what seems to amount to a massive talent shortfall. Current estimates place t

Read more…

I recently had one of the most cathartic conversations of my career. It was with a senior internal advisor who is now in audit but has held all kinds of roles in the organisation so he gets what support functions do, why they do it and, much to his chagrin, how they do it.

The organisation in question is doing something that many organisations do, changing from A to B after they changed from B to A say five years ago after changing five years before from A to B, you get the picture. In this case

Read more…
Views: 387
Comments: 7

Viruses as Cyberweapons for sale

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com.

In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping $1.3 million to figure out how to circumvent Apple’s iPhone security.

So driven is this “bug-and-exploit trade market,” that a bug-and-exploit hacking company, Hacking Team, ended

Read more…

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers.

But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different forms of monetary theft, such as bank accounts being cleaned out.

The cyber thieves controlled the victims’ computers via their TeamViewer accounts. Customers would witness their mouse arrow suddenly moving beyond the

Read more…

8028248473?profile=original

Building for Success

 

Microservices Essentials for Executives: The Key to High Velocity Software Development

 

Source:

Richard Li

forENTREPRENEURS

“Software is eating the world” – Marc Andreesen

Companies thriving in the new world order have technology as a core competency. They build complex cloud applications. They constantly bring new capabilities and features to the market. And despite the constant iteration and updates to their cloud application, their software is rock-solid reliable. How do they

Read more…

RCA and Risk

Root cause analysis (RCA) is the process of finding the event or condition that leads straight to an occurrence (another event). It is a systematic procedure used to identify the principal possible cause of risk. In risk-based management, root cause analysis (RCA) is more useful in predicting future events.

RCA is no longer a hindsight technique of investigation but a forward-looking one. It still relies on previous experience, statistics, and more heavily on data correlation. We are

Read more…

8028247896?profile=original

Do You Know Who you Are? Key Questions to Answer

By:

Enrique Suarez

"Empty handed I came to this world, empty handed  I leave this world"

Alexander the Great

Please answer the following questions to see if you know who you are:

 

1. Who are you?

If you answer that you are Peter, John, Patricia or whatever, my answer is, no this is your name. Again who are you?

If you answer by saying you are a journalist, a teacher, a doctor or whatever, my answer is no, this is your profession. Again who are you?

If you

Read more…

Identity Theft getting even worse

In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than double than for 2014.

The move from stripe cards to chip cards has motivated crooks to fasten their seatbelts and really take off with an accelerated mode of operation. For them, your Social Security Number is the pot of gold at the end of the rainbow. Thieves will use it to set up new accounts in the vi

Read more…

8028245480?profile=original

Post-Brexit: Imagine a New European Community and a New World

 

"Imagine a new European community and eventually planetary community will develop, replacing the centralized power systems with an alliance of interconnected autonomous communities setting the foundations for a new epoch based on solidarity among people and cooperation with the powers of nature. Imagine this growing planetary movement would share an essential ethical code and would replace the drive for personal profit with the drive

Read more…

Carders cashing out on Magstrip Cards

Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales.

Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $400 million. The cards were stolen from retail and hospitality businesses. If each card sells for $21 on secret carder shops, you can see how the hackers will rake in hundreds of millions of dollars.

As you may know, the U.S. is gradually switching over to chip cards. But it will be a while—a very long

Read more…

As a risk professional, you're under a lot of pressure to write documents. Maybe it's a methodology manual, validation report, or other document you’re expected to write for your regulator; a status report for the board; or even that very important email. Whatever it is, some of the following worries probably sound very familiar to you:

"I've got to write a report and I don't know where to start - what's the best way to do it?"

"It's taking me ages to edit this Word document - aren't there some cl

Read more…

This blog was inspired by a blog by sales specialist Anthony Iannarino called “Win More by Serving Your Buyers Where They Are”.  In my experience, not enough of us consider the need to “sell” our advice when we are influencing or advising inside our organisation.

The person or group you are influencing or advising will generally be in one of three phases.

Problem Compelled – They recognise the problem and they are compelled to do something about it.

Problem Uncompelled – They recognise the problem,

Read more…
Views: 66
Comments: 0

8028249059?profile=original

Research Shows the Power Your Thoughts Have on Health and Longevity

 

Source:

April McCarthy

Walking Times

March 1, 2016

Advances in health, education, disease prevention and treatments are high on the list of things that have allowed people to extend their lives, especially since chronic medical conditions and engaging in unhealthy behaviors are known risk factors for early death, however findings from a longitudinal study of over 6,000 adults suggests that certain psychological factors may be the st

Read more…

8028248280?profile=original

We Don't Need Leaders, We Need Good Ideas

 

Enrique Suarez Presenting:

Mondragon: A Company Without Owners

The Basic Principles of the MONDRAGON Co-operative Experience were approved at our first Co-operative Congress held in October 1987. They include a set of ideas forged over more than 30 years of operation as a co-operative, and are set out below in a condensed version:

Open admission
The MONDRAGON co-operative experience is open to all men and women who accept these Basic Principles without any

Read more…

Hacking Humans is Painfully Easy

Hackers can take over someone’s life in a matter of hours. Just ask Patsy Walsh.

Though she is not a tech savvy person, the grandmother of six did have a Facebook account, and that was all the hackers needed to take over her life. By using methods such as click baiting, the act of convincing someone to click on a fake link, and then gathering information, the hackers were able to use this info to get into other accounts, and eventually hacked things such as her power of attorney form, Social Secu

Read more…

As a parent, you may not be crazy about your child spending a lot of time “gaming.” Chances are good that your feelings are fueled by the fact that kids should play outside, be more social, and are getting addicted to tech or maybe the correlation between childhood obesity and excess computer time. It’s not pretty.

However, there’s another elephant in the room, perhaps squeezing out the obesity threat: the pedophile threat.

Recently on a Long Island college campus, a male student was found to be t

Read more…

Do you work for a corporation, especially in the U.S.? You may be at risk for tax return fraud.

ADP is a payroll provider. Hackers were able to acquire tax information of employees of U.S. Bank from ADP. Now, this doesn’t mean that ADP was directly hacked into. Instead, what happened, it seems, their authentication system was flawed and ADP failed to implement a protection strategy for the personal data to keep it safe from prying eyes.

The crooks registered ADP accounts by using the stolen data o

Read more…

If your car is in any way connected to the Internet, it can get hacked into. You know it’s only a matter of time before hackers begin infiltrating motor vehicles in droves, being that vehicles are plagued with hundreds to thousands of security vulnerabilities.

This hack is more serious than you think. Drivers and passengers should be aware that “flawed” and compromised vehicles can suddenly be overtaken remotely, forced into shutting down the engine in the middle of a highway or drive the car int

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead