All Posts (5613)

Sort by

Beware of Apple ID Phishing Scams

You may have been scammed after you responded to an e-mail that appears it came from Apple. When hackers send e-mails that appear to come from a legitimate company like Apple (or Google, Microsoft, PayPal, etc.), with the objective of tricking the recipient into typing in passwords, usernames, credit card information and other sensitive data, this is called phishing.

Many phishing scams are in circulation, including the Apple one. Hackers know that tons of people have Apple accounts. So if they r

Read more…

8028238083?profile=original

Europe to Build Up New Centers of Power

Source:

Foreign Policy Diary/South Front

Global Research, October 07, 2015

People, who believe that the European Union is a monolithic entity that conducts business that benefits individual European nations, have made a huge mistake. Today, the EU is a crumbling bureaucratic intergovernmental organization with several centers of power serving their own interests.

Each of these are seeking to convert the EU into a super state controlling Western Eurasian, exploi

Read more…

What is a Password Manager?

Many people, including myself, make mistakes with their passwords and use them on site after site. To remain safe, it’s important to use a unique, strong password on every site you visit. How do you do this the easy way? Use a password manager.

According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager, the results indicate that people have some idea of the scale of the password challenge: More than half said they felt str

Read more…

Out with old risk metric, in with the new. Welcome to Expected Shortfall

 

The Basel Committee on Banking Supervision has been revising its market risk framework since 2012.  The result of its ‘fundamental review of the trading book’ (FRTB , BCBS 219) is expected to be implemented by January 2018, with 2016-17 scheduled for calibration and testing. The consultation phase for the new regulatory framework is still ongoing and has featured several Quantitative Impact Studies, highlighting the framewo

Read more…
Views: 547
Comments: 5

8028237083?profile=original

What’s Wrong with Britain? Poor Housing, Education and Health in Crisis

Source:

Lesley Docksey

Global Research, October 05, 2015

One glance on Sunday morning at The Guardian website demonstrated quite clearly what is wrong with Britain – and, probably, the rest of the ‘developed’ world. Three major concerns of the average household were news. And all three are connected, not just to each other, but to the way this country is being run.

Housing and the ‘Right to Buy’

This country has never recovered fr

Read more…

Volkswagen has been side-stepping environmental compliance standards by “programming some diesel-fueled cars to turn on emission controls only when being tested.” In the days since this discovery, Volkswagen has been hit with over 30 federal lawsuits and 40%+ decline in stock value, all stemming from the same source—poor Enterprise Risk Management.

In this case, poor risk management regarding their investment in diesel, without developing a mitigation plan for if the technology didn’t meet emissi

Read more…

8028238056?profile=original

Sweden To Offer Employees Six Hour Working Day In Bid To Increase Productivity And Happiness

Source:

https://uk.news.yahoo.com/sweden-offer-employees-six-hour-103853070.html#0epsWC

Many businesses in the Scandinavian country have already switched from the standard eight hour day according to the Science Alert website, who say the move has been hailed a success

Swedish businesses are hoping the six hour day can increase happiness

Swedish employers are moving towards offering workers a six hour day in

Read more…

Hackers know small companies are more vulnerable to data breaches due to limited resources. Cybersecurity should always be a high priority. But when a company’s IT staff consists of maybe 1-2 people who are provided limited budgets and are constantly solving other tech problems, the focus on security suffers. And hackers aren’t the only problem. One significantly overlooked part of the security process “cleaning” the IT infrastructure.

IT staff being and small business owners must keep on top of:

Read more…

Video Replay

Chicago, Illinois Chapter Meeting 
Chief Risk Officer (CRO) Panel – Challenges in the Current Environment

Date:               Thursday, August 20, 2015

Time:               

4:00 – 4:15 p.m.   Registration

4:15 – 5:15 p.m.  Presentation

5:15 – 6:00 p.m.  Networking and refreshments

Venue:                   DePaul University Department of Finance – 1 E. Jackson Blvd., 8th Floor, Room 8005, Chicago, IL

                                 Meeting space provided by DePaul University Department of Fi

Read more…
Views: 162
Comments: 0

8028236472?profile=original

Enrique Suarez Presenting:

“Everyone Is Doing It”: How Carmakers Manipulate Emissions Test Results

Source:

Tyler DurdenGlobal

Zero Hedge 3 October 2015

With Germany’s largest company by revenue, Volkswagen, deep in damage recovery mode, and the market still unable to decide just how systemic and profound the fallout will be from the emissions scandal which has already cost the job of VW’s CEO and which according to some will impact the GDP of Hungary and the Czech republic as much as -1.5%, many are

Read more…

When you hear the dictum, “You should protect yourself from identity theft,” do you equate this with pushing a wheelbarrow loaded with rocks up a hill? It would actually be more accurate to picture slicing into a fresh apple pie, because identity theft protection is as easy as pie. Check out the following things you should do—without breaking any sweat:

RISK.jpg

  1. Examine your credit card statements once a month to catch any unauthorized charges. Even a tiny charge should not be blown off, since often, thie
Read more…

Why use a VPN?

If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN).

A VPN is a technology that creates a secure connection over an unsecured network. It’s important to use because a hacker can potentially “see” your login information on an unsecured network. For instance, when you log in to your bank account, the hac

Read more…

CNN’s latest news headlines reads, “28 years for salmonella: Peanut exec gets groundbreaking sentence.” This story relates to the Peanut Butter Corporation of America’s (PBC’s) bankruptcy, and the largest food recall in the United States due to salmonella. Known as one of the deadliest salmonella outbreaks, the PCA’s case is linked to nine deaths on top of 714 affected and sickened. 

Stewart Parnell, PCA’s owner, received a 28 year prison sentence, while his brother and food broker for PCA, Micha

Read more…

The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including criminals and even sex offenders.

So, when you take a photo of your kids in your backyard, know that if you post that picture on social media, a predator can potentially obtain the GPS coordinates of where

Read more…

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind of hacker, but in a broader sense a hacker is a person (male or female) who uses their programming skills and technical knowledge to create and modify computer software and hardware by finding their weaknesses and expl

Read more…

Commonwealth Capital is proud to announce a New Venture Capital Fund specifically designed for Start-Up and Early Stage Companies.

We have access to many sources of capital for varying stages of a company’s existence. More importantly, we are looking to invest in start-up and early stage companies through our inaugural venture-capital fund, Commonwealth Capital Income Fund I.

Unlike most venture-capital firms, we’ve taken the mystery out of the application and funding process. We’re upfront about

Read more…

State sponsored Attacks big Problem

The U.S. Office of Personnel Management, an identity database, was attacked by hackers rather recently, and they hit the jackpot: More than 21 million federal workers are at risk of identity theft for perhaps the rest of their lives, reports an article on forbes.com.

The hackers from overseas now have security clearance documents for these employees that contain some very sensitive personal information. And nobody can take these documents away from the hackers.

That’s the problem with these centra

Read more…

Twitters ups its Security Game

Twitter recently announced its new tool to help with management and monitoring of its users’ accounts: the Twitter data dashboard.

An article on lifehacker.com details what this new tool will offer. For instance, you will not need to use your real name on Twitter—and I have to admit, this is an odd way to promote the tool, because I’m sure that scads of Twitter users haven’t been using their real name for years. It’s not as though Twitter can tell that “Emily White” is really Sashea Fiopwieei.

Any

Read more…

8028238879?profile=originalAs a Future Labour Government Becomes Reality, Tories Panic as Bankers See Gravy-Train Crashing

Source:

Anthony Bellchambers

Global Research, September 28, 2015

Goldenballs bankers and hedge-fund, casino-operation directors are even now making enquiries to emigrate to Dubai or New York, in the future, as it becomes clear that a radical reforming, British Labour government is more than likely in 2020.

Multinational companies currently protected by the Conservative government will be forced in future t

Read more…

7 Ways to protect Yourself Online

The biggest mistake that you can make to threaten your online safety is to treat the online world different—as far as your private information—than you would treat the physical world. In other words, if someone walked up to you and said, “Hi, can you please provide me with your name, address, birth date, home phone, cell phone, email, usernames, passowords all your friends names and all their contact info?” I think not.

What sane person would pass out cards with their Social Security number, birt

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead