All Posts (5948)

Sort by

8028246875?profile=original

Official: Japan Dodged Global Financial Crash Because Of Bankers’ Poor English

 

Source:

MintPress News

This article was written on June 29, 2913

Aso said bankers did not speak English well enough to understand the complex financial instruments that undid other major global players. 

Japan can thank a poor grasp of English among the country’s bankers for the country’s weathering the 2008 global credit crisis virtually unscathed, according to Finance Minister Taro Aso.

Aso said senior Japanese bankers d

Read more…

Gee, if your home is connected to lots of different devices, doesn’t it make sense that your cybersecurity integrates all your connected devices? Meet the Bitdefender BOX, a network bulletproofing hardware cybersecurity tool for the home that embraces smart home protection focusing on the Internet of Things with remote device management offering next generation privacy protection.

BOX description:

  • One complete security solution for connected homes
  • Sets up to a router
  • Is controlled by the user’s mobi
Read more…

8028246683?profile=original

Twenty-seven Inspiring Quotes about Life and the Current World’s Condition and Comments

 

By:

Enrique Suarez


http://www.wix.com/suarezenrique/delta


suarezenrique@yahoo.com


1. "And those who were seen dancing were thought to be insane by those who could not hear the music."
- Friedrich Nietzsche

Comment: very powerful message that applies 100% in my life when I am connected with my inner being and when I say that peace supersedes prosperity and not the other way around. When human beings know themselves

Read more…

8028245864?profile=original

Video: This is what happens when you reply to spam email

 

Source:

 

James Veitch

 

TEDTalks

Published on Feb 1, 2016

Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, months-long exchange with a spammer who offered to cut him in on a hot deal.

https:/

Read more…

The role of the chief in any organisation, division or business unit is to set a firm direction for the organisation or team to follow.  That includes a clear purpose along with specific goals.  Sometimes they get it right, sometimes they don’t.

The last time the chief set direction, what did you have to say?  Did you have enough knowledge to talk sensibly about the challenges you all faced?  Were you able to bring your expertise to the table and really get people thinking?  Were you able to prov

Read more…
Views: 81
Comments: 0

Protect Yourself from Phishing

Everyone has received very obvious “phishing” e-mails: Messages in your in-box that have outrageous subject lines like “Your Account Will Be Suspended,” or, “You Won!”

While some phishing attacks are obvious, others look harmless, such as those in a person’s workplace in-box, seemingly from their company’s higher-ups.

Researchers point out that an e-mail may appear to come from the company’s HR department, for example. E-mails with an “urgent email password change request” had a 28% click rate, Wo

Read more…

What Factors Truly Drive Transformation?

A couple decades ago, back in 1992, W. Warner Burke and George Litwan collated a number of organizational change models into one holistic view of how organizational structure and design affects change.  With this research, Burke and Litwan developed the Causal Model of Organizational Performance and Change, otherwise known as the Burke-Litwin Model.

Their seminal framework achieves 2 things: First, it identifies 12 factors of change.  Note that this model is more comprehensive than the popularly

Read more…
Views: 419
Comments: 0

Disasters happen every day. Crashing hard drives, failing storage devices and even burglaries could have a significant negative impact on your business, especially if that data is lost forever. You can avoid these problems by backing up your data.

Backing up means keeping copies of your important business data in several places and on multiple devices. For example, if you saved data on your home PC and it crashes, you’ll still be able to access the information because you made backups.

A great way

Read more…

Senior Market Risk Professionals Set to Discuss FRTB Finalisation Paper

 

The Basel Committee on Banking Supervision (BCBS) recently released the long awaited revised new market risk framework, the Fundamental Review of the Trading Book ('FRTB'). The final text has prompted much discussion on Basel capital adequacy requirements with fundamental changes to and concerns over the internal models-approach, standardised approach, VaR to ES, trading book and banking book boundaries, and market illiquidi

Read more…
Views: 198
Comments: 0

A big mistake in risk management, especially when it comes to companies with newer programs, is underestimating the importance of standardized risk prioritization. Diving into identification and assessments without a sufficient framework inhibits prioritization. This can result in ineffective risk mitigation activities and duplicate work across departments, or even serious risks flying under the radar. The possibility of “missing” a serious risk is a disturbing one, but it’s impossible to be com

Read more…

Prevent Child Identity Theft

Here’s one for the know-it-alls: Kids are 35 percent more likely to become victims of identity theft than are adults. Betcha didn’t know that! This startling news comes from a 2015 Javelin Strategy & Release study.

Needless to say, the bulk of parents aren’t on top of this problem, unaware that thieves go after children’s SSNs like two-year-olds grabbing at candy. Thieves know that kids (and their parents) don’t monitor their credit reports. Thieves know that they can get away with their crime al

Read more…

Products to keep Kids safe online

Some people believe that monitoring your kids’ online activities crosses the line of privacy or trust. But monitoring and controlling online activities is, essentially, no different than controlling access to the cookie jar or TV or even locking a liquor cabinet.

Which brings me to a way that parents can always know exactly what their kids are doing in cyberspace. And control when, too. This is possible due to a type of software known as “parental control” that monitors the goings-on of any conne

Read more…

Benchmarking is a very powerful tool many organizations use to not only measure and gauge their performance against competition, but also to push themselves to be best-in-class.  Benchmarking is a source of competitive advantage and continuous improvement (Kaizen).

Wikipedia defines benchmarking as:

Benchmarking is the process of comparing one’s business processes and performance metrics to industry bests and best practices from other companies. Dimensions typically measured are quality, time and

Read more…
Views: 157
Comments: 0

13.1 million people were stricken by identity theft last year in America, reports a study by Javelin Strategy & Research which reveals:

  • Many people who don’t trust their banks are unwittingly doing things that make crime easier for crooks. This includes not using the bank’s protection services such as e-mail alerts.
  • Oddly, there are more victims than ever, but the total amount stolen is less. But that hardly matters when you consider that in the past six years, $112 billion have been stolen.
  • 18 per
Read more…

Cyber criminals have been attempting to extort money from individuals and companies for many years, and the latest attempt to take advantage of others is by using Ransomware as a Service, or RaaS.

A ransomware virus infects a computer when a user clicks a link and unknowingly download a malicious file. The ransomware virus then encrypts the computer’s files and promises to render them useless unless the victim pays a ransom. The cost varies greatly and groups sending these out can bring in hundre

Read more…

Ahead of the Fundamental Review of the Trading Book Summit taking place April 19-20, the Center for Financial Professionals have reviewed the Finalisation paper for the revised capital standard for market risk. Presenters and panelists will be presenting their findings of the paper and amending sessions in line with the changes.

With the Basel III capital framework for trading activities weaknesses being highlighted, resulting in undercapitalized trading book exposures ahead of the 2007-8 financi

Read more…

How to prevent IRS scams

Once a thief knows your Social Security number…you’re at very high risk for having your identity stolen.

A report on bankrate.com says that the IRS is warning of a cyber attack on its electronic filing PIN application. Thieves infiltrated it with malware in an attempt to claim other people’s refunds as their own. Over 450,000 SSNs were involved, and over 100,000 of them enabled the hackers to access an E-file PIN.

Endless scams are directed towards SSNs, like the classic phishing attack. A phishin

Read more…

Reduce your cost of claims by as much as an additional 30%.

Serving 13 countries, Gleason Technology works with Risk Managers to better monitor critical operations that could potentially lead to a hazard within the facility. Their patented location-driven technology time and date stamps any operation while verifying all objectives were within compliance and have met the standards set by the company. 

The results are incredible!

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead