All Posts (5613)

Sort by

8028248271?profile=original

Buddha Selected Quotes

Do not dwell in the past, do not dream of the future, concentrate the mind on the present moment.

Health is the greatest gift, contentment the greatest wealth, faithfulness the best relationship.

No one saves us but ourselves. No one can and no one may. We ourselves must walk the path.
 

You can search throughout the entire universe for someone who is more deserving of your love and affection than you are yourself, and that person is not to be found anywhere. You yourself, as m

Read more…

8028248258?profile=originalRisk is a double-edged sword for insurance companies. On one hand, customers buy coverage because their businesses face a variety of risks. On the other hand, risk management challenges for the insurance industry are numerous. These include risks like “underwriting, credit, market, operational, liquidity risks, etc.,” according to the National Association of Insurance Commissioners (NAIC).

Insurance companies operate under the increased scrutiny of a tightening regulatory environment. About a yea

Read more…

Hackers hacking Banks big time

“Anonymous” is an activist hacking group that has recently boasted that it will engage in 30 days of cyber assaults against “all central banks,” reports an article on cnbc.com.

And their bite is as big as their bark, as this announcement came soon after several major banks around the world were struck—and Anonymous proudly claimed credit. The banks that were apparently breached by Anonymous include:

  • Bangladesh Central Bank
  • National Bank of Greece
  • Qatar National Bank

Anonymous put up their plans on a

Read more…

8028246281?profile=originalDoes your organization rely on vendors or other third parties? In the likely event that it does, are your vendor management processes as thorough as they could be? When performing risk assessments of both current and prospective vendors, it’s difficult to ascertain that every variable has been accounted for. This is especially true for organizations like food and beverage companies; they receive ingredients that, if contaminated, can have serious (and sometimes fatal) effects on consumers.

The Fr

Read more…

8028245493?profile=original

Source:

Yuhyun Park

Chair, infollutionZERO Foundation

World  Economic Forum

The social and economic impact of technology is widespread and accelerating. The speed and volume of information have increased exponentially. Experts are predicting that 90% of the entire population will be connected to the internet within 10 years. With the internet of things, the digital and physical worlds will soon be merged. These changes herald exciting possibilities. But they also create uncertainty. And our kids are

Read more…

8028248290?profile=original

By:

 

Marcus Tullius Cicero

 

“A man of courage is also full of faith.”

“A home without books is a body without soul.”

“A letter does not blush.”

“A man's own manner and character is what most becomes him.”

“A tear dries quickly when it is shed for troubles of others.”

“Ability without honor is useless.”

“According to the law of nature it is only fair that no one should become richer through damages and injuries suffered by another."

“An unjust peace is better than a just war.”

“As I approve of a youth that

Read more…

Phishing Protection 101

Phishing-type e-mails are designed to trick the recipient into either downloading a virus (which then gives the hacker remote control of the computer) or revealing enough information for the thief to open credit cards in the victim’s name, get into their bank account, etc.

13D

There are many ways the crook can trick the victim. Here are telltale signs:

  • The message wants you to “verify” or “confirm” your password, username or other sensitive information.
  • And why must you do this? Because “suspicious act
Read more…

Guess who may be compromising the security of your Social Security Number.

The Social Security Administration!

Yep, that’s right. Did you know that 66 percent of the mail the SSA sends out contains someone’s Social Security number? This is what the inspector general of the SSA, Kimberly Byrd, says, and I believe it.

How many pieces of mail is this? Over 230,000,000. This situation is problematic.

  • The SSA claims it will cost over $19 million to reduce these mailings.
  • It also won’t happen anytime soon.
Read more…

We need YOUR opinion and help

Hello all, 

We are TSR Canada, a divison of The Staff Room, we are a Human Resources/HUman Capital and career coaching firm that offers seminars, conculsting as well as we have a few courses that will help you in your career. We are starting up our seminars again as of Septemer. We need to know if you prefer Morning seminars or afternoon? What week is best the first week of Sept or the second? What day works best...Monday to Thursday only and this will be conducted at our newest location in Picke

Read more…

8028246889?profile=original

Clarity of Message: Why You Need A Great Message & How To Create It

 

Source:

David Skok and Mike Troiano

 

for ENTREPRENEURS

 Intro

In the early stages of their business, founders often struggle to come up with really strong messaging to describe what they are selling, and this has a huge impact on their ability to raise money, find customers, and attract employees. This is not that surprising, as it can be really hard to arrive at great messaging that is simple and appealing. This post focuses on how

Read more…

8028246300?profile=original

Humans have Lives not Functions

 

Another extraordinary definition by Noam Chomsky of what a human being is that goes well beyond giving people "functions" in the economic system which dehumanize them. In other words, in the economic system when a worker or a craftsman produces  something of value on command, we might admire what he did but we despise what he is.

You can watch the video link below:

https://www.youtube.com/watch?v=vUH_a778uT4

Read more…

How the FBI hacks You

In a recent Wired.com expose’, they expose how the FBI has been secretly hacking civilian computers for about 20 years, but thanks to Rule 41, their ability to hack has been expanded.

11D-300x228.jpg

Nevertheless, effective record keeping for these hacking incidents doesn’t exist. For instance, search warrants that permit hacking are issued using elusive language, and this makes it difficult to keep track of when the feds hack.

Also, it’s not required for the FBI to submit any reports to Congress that track the F

Read more…

Worst Economy In 5,000 Years?

8028246865?profile=original

Worst Economy In 5,000 Years?

Source:

Washington's Blog

June 8, 2016

Lowest Interest Rate In 5,000 Years

 

According to Bank of England economist Andy Haldane, Bank of America Merrill Lynch economist Michael Hartnett and others, we’ve got the lowest interest rates in 5,000 years: You can read the rest of this article in the link below:

Worst Economy in 5,000 Years

Read more…


8028246098?profile=originalPlains All American Pipeline, a major player in the oil and gas industry, faces $2.8 million in fines, and a grand jury indicted the company on 46 criminal charges – four of them felonies – according to The Wall Street Journal.

Additionally, a Plains employee is being individually charged and faces a multi-year prison term. This is part of a trend set in motion in 2015, when the Department of Justice announced a new policy. It now prosecutes corporate individuals for negligence in risk and compl

Read more…

Interview with David Buck, Head of Integrated Stress Testing & Forecasting, Citizens Financial Group

 

As banks struggle to keep pace with regulatory updates while meeting capital requirements, there is a great desire to improve efficiencies so more focus can be placed on growth and profitability. Regulators have made it clear that risk management should be the centerpiece of banks’ strategic business plans, and many institutions are transitioning their processes to reflect this mindset.

 

David Buc

Read more…
Views: 100
Comments: 0

Whether you are the boss or a strategic advisor to the boss you establish boundaries to guide the decisions and hence behaviour of staff. What kind of boundaries have you set? I see three basic types:

• Hard – Thou shalt not cross.
• Flexible – Permission to bend the boundaries, up to a point, is implicit.
• Cushioned – Firm boundaries that allow staff to push up against them without getting “hurt”.

Hard boundaries are needed when the consequences are dire. Examples include safety and highly regul

Read more…

8028245283?profile=originalBack in August of 2015, we discussed a vulnerability in Android’s operating system that put both personal and professional data at risk. This is just one example of the fact that improved technologies, while vital to continued growth, can bring with them serious cyber risks.

The World Economic Forum’s Global Risks Report 2016 reflects this idea. The report “examines the interconnections among the risks,” which multiply as technology improves.

According to The Huffington Post, “our cyber dependence

Read more…

As much as you try, the unfortunate truth is that hackers are going to try to attack and access your WordPress website or blog, whether you like it or not. So, it is up to you to make sure you make the hacker’s job as difficult as possible. Here are some tips:

1. Use Plugins

One way to make your WordPress account less appealing is to use security plugins. These vary in quality, and you might have to purchase some of them, too. Just make sure to do some research before buying them, and when you do,

Read more…

Yes, believe it or not, ransomware has become such a booming business for thieves, that these cyber thugs even provide bona fide customer service departments to guide their victims!

When ransomware infects your computer, it holds your files hostage; you can’t access them—until you pay the hacker (usually in bitcoins). Once paid, the crook will give you a decryption “key.” Sometimes the fee will go up if you don’t pay by a deadline. Fees may a few to hundred to several hundred dollars to way more

Read more…

Hacker for hire a rising Trend

Hackers and wannabe hackers can easily purchase cheap tools of the trade online. The security firm Dell SecureWorks Inc. confirms this in their latest report and adds that underground markets for hackers, including those from Russia, is thriving.

The “Dark Web” is the go-to place for hackers looking for guidance and tools like malware. Yes, you can buy malware. If you don’t want to be the hacker, you can hire a hacker.

There’s any number of reasons why a non-techy person would want to hire a hacke

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead