All Posts (5984)

Sort by

Risks while determining Pre-hire Talent Assessments as Part of a Predictive Talent Acquisition Strategy

Greta Roberts, CEO

Talent Analytics, Corp.

16-July-16

Over the past 30+ years, businesses have spent billions on talent assessments. Many of these are now being used to understand job candidates.  Increasingly, businesses are asking how (or if) a predictive talent acquisition strategy can include the use of pre-hire assessments?  As costs of failed new hires continue to rise, recruiters and hiring

Read more…
Views: 48
Comments: 0

The words “data breach” are often met by a clamor whenever they make headlines. Home Depot, Target, Ashley Madison, Heartland, Citibank, the list goes on and on. These breaches spent time in the limelight because of their magnitude; they affected hundreds of thousands – in some cases millions – of cardholders.

powerful-ERM-software-500x350.png?width=250But the reality is data breaches are far more common than large headline events like these would have us believe. According to a report published by the Identity Theft Resource Center, ther

Read more…

Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail.

How a hacker circumvents two-factor authentication:

  • First collects enough information on the victim to pull off the scam, such as obtaining information from their LinkedIn profile.
  • Or sends a preliminary phishing e-mail tricking the recipient into revealing login credentials for an account, such as a bank account.
  • The next phase is to send out
Read more…

Don’t just be a colour-ineror

When I was a wee kid working on a group project, we would always ask “Who is going to be the colour-ineror?  Well just last week a friend of mine reminded me of the term when I was listing support functions that sometimes struggle to make a difference to the business. 

I was listing finance, HR, IT, risk, compliance, audit and then said, “Even people in sexier functions like in marketing.” …  BANG, she pounced.  “You mean the colouring-in department!”  In her experience working on both sides of t

Read more…
Views: 91
Comments: 0

Looks like there’s some worms in Apple.

Not too long ago, dozens and dozens of iPhones were stolen from two Apple stores. How could this happen, what with Apple’s security? Simple: The thieves wore clothes similar to Apple store employees and obviously knew the innards of the stores.

They sauntered over to the drawers that held the new phones, acting nonchalant to avoid attracting attention. In fact, a new face in Apple attire at one of the stung locations wouldn’t raise eyebrows since new employe

Read more…

A ransomware attack is when your computer gets locked down or your files become inaccessible, and you are informed that in order to regain use of your computer or to receive a cyber key to unlock your files, you must pay a ransom. Typically, cybercriminals request you pay them in bitcoins.

The attack begins when you’re lured, by a cybercriminal, into clicking a malicious link that downloads malware, such as CDT-Locker. Hackers are skilled at getting potential victims to click on these links, such

Read more…

The Dark Web, according to LeakedSource, got ahold of 33 million Twitter account details and put them up for sale. Twitter thus locked the accounts for millions of users.

Twitter, however, doesn’t believe its servers were directly attacked. So what happened? The bad guys may have created a composite of data from other breached sources. Or, they could have used malware to steal passwords off of devices.

Nevertheless, the end result meant that for many Twitter accounts, there was password exposure—l

Read more…

Interview with Marsha Hopwood, Director, Operational Risk Management and Risk Governance, Allianz Life

 

New rules and regulations have proliferated across the financial sector, with no end seemingly in sight. Along with fast-paced technology, stirring more competitive pressures than ever; it is essential for banks and financial institutions to instill sound management to properly oversee and control heightened risks.

 

Marsha Hopwood, Director, Operational Risk Management and Risk Governance at All

Read more…
Views: 178
Comments: 0

Interview with Erin Straits, Senior Vice President, Director, Vendor Risk Management, Fifth Third Bank

 

Third party risk management continues to grow as an area of increasing concern for institutions, as the increased digital environment and several high profile incidents highlight the importance of strong third party risk practices.  Despite strong advances in this area, institutions still need to further enhance their third party programs to ensure they add value to the business. Financial inst

Read more…
Views: 127
Comments: 0

Facebook CEO Password dadada hacked

If you’ve heard this once, you need to hear it again—and again: Never use the same password and username for more than one account!

If this got Mark Zuckerberg’s (Facebook’s chief executive). Twitter account hacked, it can get just about anybody hacked.

A report at nytimes.com says that the OurMine hacking group takes credit for busting into Zuckerberg’s accounts including LinkedIn and Pinterest. It’s possible that this breach was cultivated by a repeated password of Zuckerberg’s.

According to OurM

Read more…

An impostor posed as Lorrie Cranor at a mobile phone store (in Ohio, nowhere near Cranor’s home) and obtained her number. She is the Federal Trade Commission’s chief technologist. Her impostor’s con netted two new iPhones (the priciest models—and the charges went to Cranor) with her number.

In a blog post, Cranor writes: “My phones immediately stopped receiving calls.” She was stiffed with “a large bill and the anxiety and fear of financial injury.”

Cranor was a victim of identity theft. She conta

Read more…

Cybersecurity Is Still A Boy’s Club

Cyberweapons are a constant and evolving threat to society. They have the potential to shut down entire electric power grids and bring companies to their knees. Securing networks against the threat is possibly the most pressing priority, and the cybersecurity market is expected to grow from $75 billion in 2015 to $170 billion by 2020 as a result.

One of most pressing priorities for companies in ensuring cybersecurity is what seems to amount to a massive talent shortfall. Current estimates place t

Read more…

I recently had one of the most cathartic conversations of my career. It was with a senior internal advisor who is now in audit but has held all kinds of roles in the organisation so he gets what support functions do, why they do it and, much to his chagrin, how they do it.

The organisation in question is doing something that many organisations do, changing from A to B after they changed from B to A say five years ago after changing five years before from A to B, you get the picture. In this case

Read more…
Views: 410
Comments: 7

Viruses as Cyberweapons for sale

It’s all about code—the building blocks of the Internet. Software code is full of unintentional defects. Governments are paying heavy prices to skilled hackers who can unearth these vulnerabilities, says an article at nytimes.com.

In fact, the FBI director, James B. Comey, recommended that the FBI pay hackers a whopping $1.3 million to figure out how to circumvent Apple’s iPhone security.

So driven is this “bug-and-exploit trade market,” that a bug-and-exploit hacking company, Hacking Team, ended

Read more…

Get an account with TeamViewer, and you will have a software package that enables remote control, online meetings, desktop sharing and other functions between computers.

But recently, customers of TeamViewer have reported remote takedowns of their computers that resulted in different forms of monetary theft, such as bank accounts being cleaned out.

The cyber thieves controlled the victims’ computers via their TeamViewer accounts. Customers would witness their mouse arrow suddenly moving beyond the

Read more…

8028248473?profile=original

Building for Success

 

Microservices Essentials for Executives: The Key to High Velocity Software Development

 

Source:

Richard Li

forENTREPRENEURS

“Software is eating the world” – Marc Andreesen

Companies thriving in the new world order have technology as a core competency. They build complex cloud applications. They constantly bring new capabilities and features to the market. And despite the constant iteration and updates to their cloud application, their software is rock-solid reliable. How do they

Read more…

RCA and Risk

Root cause analysis (RCA) is the process of finding the event or condition that leads straight to an occurrence (another event). It is a systematic procedure used to identify the principal possible cause of risk. In risk-based management, root cause analysis (RCA) is more useful in predicting future events.

RCA is no longer a hindsight technique of investigation but a forward-looking one. It still relies on previous experience, statistics, and more heavily on data correlation. We are

Read more…

8028247896?profile=original

Do You Know Who you Are? Key Questions to Answer

By:

Enrique Suarez

"Empty handed I came to this world, empty handed  I leave this world"

Alexander the Great

Please answer the following questions to see if you know who you are:

 

1. Who are you?

If you answer that you are Peter, John, Patricia or whatever, my answer is, no this is your name. Again who are you?

If you answer by saying you are a journalist, a teacher, a doctor or whatever, my answer is no, this is your profession. Again who are you?

If you

Read more…

Identity Theft getting even worse

In 2015, depending on the kind and type of identity theft we are talking about, identity thieves impacted 1.5 million people or more, says the Javelin Strategy & Research report. That’s more than double than for 2014.

The move from stripe cards to chip cards has motivated crooks to fasten their seatbelts and really take off with an accelerated mode of operation. For them, your Social Security Number is the pot of gold at the end of the rainbow. Thieves will use it to set up new accounts in the vi

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead