All Posts (5854)

Sort by

Let’s cut to the chase:

  • Regularly back up the phone’s data! If this is done every day, you won’t have to worry much about losing important information if something happens to the phone—such as a ransomware attack.
  • Keep the phone’s software and applications updated.
  • Delete apps you no longer use, as these can reveal your GPS coordinates and garner data about you.
  • Never post about your vacation while you’re on vacation.

But there’s more:

  • Employ the device’s password-protect function (which may even be a
Read more…

Ever peruse Craigslist for a new home? Nothing against Craigslist for doing that, but that’s where Coty Houston and David Yost happened to find a very alluring four-bed home for sale; looked perfect for their five young kids.

Then they all got squashed by a bomb: The man who sold it to them was not a licensed Realtor. Matthew Boros, however, used to be a real estate agent, but he never renewed his license. But this time, he had climbed through the house’s window (after placing an ad for it on Cra

Read more…

Considering the current climate is loaded with regulatory and market changes, funds transfer pricing frameworks must be adapted in such a way to account for this without losing competitive edge. In order to optimise the practice of FTP, banks need to understand how it can be implemented alongside evolving regulations and market changes. This marcus evans conference will show banks how to shape their FTP methodologies according to regulations such as the liquidity and capital regulations and appl

Read more…

Considering the current climate is loaded with regulatory and market changes, funds transfer pricing frameworks must be adapted in such a way to account for this without losing competitive edge. In order to optimise the practice of FTP, banks need to understand how it can be implemented alongside evolving regulations and market changes. This marcus evans conference will show banks how to shape their FTP methodologies according to regulations such as the liquidity and capital regulations and appl

Read more…
Views: 260
Comments: 0

Beware of these 4 Scams

IRS

  • The e-mail (or phone call) says you owe money; if you don’t pay it immediately, you’ll be put in jail or fined.The scammer may know the last four digits of the victim’s Social Security number.
  • Caller ID will be spoofed to look like the call is from the IRS.
  • The e-mail will include an IRS logo and other nuances to make it look official.
  • The scammer may also have an accomplice call the victim pretending to be a police officer.
  • The victim is scared into sending the “owed” money—which goes to the thi
Read more…

Will Biometrics replace Passwords?

The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with a fingerprint or face scan using a smartphone.

The smartphone employment of such biometrics will drastically reduce hacking incidents, but will be problematic for those who do not own a mobile device. Major banks are already offering the fingerprint scan as a login option.

Other biometrics currently in use by banks are the eye scan, facial reco

Read more…

Entrepreneurs can successfully plan, launch and manage their own Regulation Crowdfunding campaigns and extend those campaigns beyond the reach of Title III of the Jumpstart Our Business Startups (JOBS) Act.

           

“Regulation Crowdfunding has significantly leveled the playing field for raising capital, but it has serious limitations,” said Timothy Daniel Hogan, CEO of Commonwealth Capital.  “For example, a company seeking capital through Regulation Crowdfunding can only use Regulation Crowdfu

Read more…
Views: 96
Comments: 0

8028252085?profile=originalThe insurance market has been under pressure to transform for many years now.

PWC identify five distinct pressure points: social, technological, environmental, economic and political. Their ‘2020: Competing for Future’ report describes how this is a time of massive and potentially disruptive change.

While the competitive landscape is experiencing significant shifts and technology continues to disrupt the market, insurers also have lots of opportunities to respond, adopt change, transform their ser

Read more…

What is Malvertising?

Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain.

And the real scary thing about malvertising is that these trick-ads have appeared on trusted, popular websites like the Weather Network, BBC, NFL and the New York Times.

Oh, and it gets worse: The malicious ad can be hidden, unseen by the site visitor, thanks to a special html code that allows the bad ad to be inside legitimate content. This trick-c

Read more…

Our team at RiskMinds Live uncover the burden of a principles-based regulation, BCBS-239, with Krishnan Ranganathan ahead of this year’s RiskMinds Asia conference in Hong Kong this October…

What is BCBS-239?

During the financial crisis, banks were unable to understand quickly and accurately their overall exposures and other risk metrics having a bearing on their key risk decisions. In January 2013, BCBS-239 was introduced as a principles-based regulation to address this issue and improve the risk

Read more…
Views: 206
Comments: 0

8028247301?profile=original

Bridge Group 2016 Sales Development Metrics and Compensation Benchmark Report

Source:

David Skok

ForENTREPRENEURS

Intro

Sales development teams are taking a much more data-driven approach in recent years by closely tracking their metrics and performance. Benchmarking your performance against other companies offers a valuable way to see how your company stacks up against the competition.

We have collaborated again this year with The Bridge Group, an inside sales research and consultation organization,

Read more…

You’d think with all the media attention regarding data breaches, hackers and identity theft, that consumers would be more focused on their privacy and how to protect their information from prying eyes. Surprisingly, almost 70% of the people are clueless about how a criminal might have got a hold of their personal information.

We all have a lot going on in our lives, and this is exactly how identity thieves like us. Ever lurking, these criminals are counting on us being too busy to give any thoug

Read more…

Protect your Privacy on your iPhone

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.

Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps can gain this access and deactivate it. And there’s so much more to know…

Ads

  • The Limited Ad Tracking option controls how targeted the ads
Read more…

The risks of credit trading

An interview with Terry Benzschawel, Managing Director, Institutional Clients Group, Citigroup

Our team at RiskMinds Live got to grips with the risks of credit reading with Terry Benzschawel ahead of this year’s RiskMinds Americas conference, taking place in Chicago this September…

What are the key risk challenges that you are facing today?

I see two possible main sources of risk and a couple of lesser ones. First, I see the US Fed’s exit from QE and that of the European Central bank as having the

Read more…
Views: 101
Comments: 0

8028248691?profile=originalA couple of weeks ago, a colleague of mine came to tell me about a new finding that she knew I'd love: BCM helps reduce data breach costs.

All I could think was, 'FINALLY.'

This is something that I've been telling clients for years: BCM is more valuable to your business than you can possibly imagine.

The new research from Ponemon Institute found that data breaches now cost as much as $4m - to say nothing of reputational hits. And, you could face a double whammy with higher insurance premiums, too.

B

Read more…

How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.

What if he had had an iPhone on his person at the time he wandered off in the middle of some vast woods? Sure he could call, but then what? Android and iPhones have a “find my phone” feature that a parent can track down a lost

Read more…

8028249077?profile=original

Born to Star

Latest Secrets for Startup Success

When Vision Master and Execution Master Meet

Published by Intelliversity,
a 501(c)3 not-for-profit LLC

www.IntelliversityCampus.org

Introduction


Essential elements are drawn together by mutual attraction. When they hit critical mass, boom! A star is born. A star expands as more essential elements are drawn in, glowing brightly and nurturing life.

Your innovative business can grow in the same explosive way. This eBook holds the secret for igniting that kind

Read more…

Play your Trump Card

8028247465?profile=originalWhether you love him or hate him, it must be said that Donald Trump has been a master in getting some people to listen to him, to agree with him, even like what he has to say.  He cuts through all the clutter and paints a picture that many people want to see.

No matter who you are advising, your children, your spouse, your boss or a manager and their team in another department, sometimes the challenge is so great, you need a trump card.

In the card games of Bridge and 500 (the former was taught to

Read more…
Views: 98
Comments: 0

Segmentation.  Everyone’s doing it, but are you doing it right?  

Although segmentation should help target the right customers, it does not always bring the intended value. Inappropriately or incorrectly defined segments may lead management to make bad strategic decisions.

Market and Customer Segmentation defines a number of different groups of people or organizations, which our company aims to reach and serve.  The intent of the segmentation exercise is to two-fold:

1) Create the foundation for a

Read more…
Views: 146
Comments: 0

Be aware of all these Confidence Crimes

Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.

  • A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look very much like the typical company e-mail that the real person uses.
  • Example: The thief sends a trick e-mail (phishing) to a company employee he fo
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead