All Posts (5620)

Sort by

Trusting too much brings Trouble

There will always be the person who lives on the Equator to whom you can sell an electric heater. As they say, there is a sucker born every minute.

This is why cyber criminals will always have a field day, like the crook who posed as a tax man who got an elderly couple to send $100,000 to an offshore bank account after he tricked them.

This was a fear-based scam. The other two categories are compassion and self-interest. And just because a person can’t be frightened doesn’t mean that their heart s

Read more…

I was helping an organisation develop a risk appetite statement recently. The board members had not previously been exposed to such a “device” and as you would expect were a little reticent. While I pride myself on being able to communicate the value of more formal approaches to risk management in a way that it makes sense for people, it remains the single hardest part of the process. Every now and then you hear something said back to you that is better than anything you said before.

On this occa

Read more…
Views: 84
Comments: 0

Risks of Public WiFi

Wired internet or wireless WiFi, the warnings are out there: Don’t visit any websites that you have important accounts with when using a public computer (hotel, airport, café, etc.).

Visiting even a more trivial account, such as an online community for cheese lovers, could sink you—in that a cyber thief might get your username and password—which are the same ones you have for your bank account, PayPal and Facebook.

Why is public Wi-Fi such a bad thing for shopping and banking and other such activi

Read more…

8028234687?profile=originalEnrique Suarez Presenting:

Sowing the GMO Seeds of Depopulation?

Read more…

Criminals use six basic principles to influence and steal. In the first post we discussed:

  • Reciprocation: Do something nice for a person and they will feel obligated to return the favor.
  • Social Proof: This is the “It’s okay if everyone else does it” approach.
  • Commitment and Consistency: Get someone to verbally or in writing commit to something, and this will increase the chances they’ll follow through.

Robert Cialdini is a psychologist who studied influence for nearly 30 years, condensing his findin

Read more…

8028234291?profile=originalEnrique Suarez Presenting:

The YouTube video of 12-year-old Victoria Grant speaking at the Public Banking in America conference last month has gone viral, topping a million views on various web sites.

Monetary reform - the contention that governments, not banks, should create and lend a nation's money - has rarely even made the news, so this is a first. Either the times they are a-changin', or Victoria managed to frame the message in a way that was so simple and clear that even a child could under

Read more…
Views: 75
Comments: 0

8028232497?profile=originalEnrique Suarez Presenting:

 Carey Wedler

Global Research, May 22, 2015
The Anti-Media 21 May 2015

On Wednesday, the Justice Department announced that 5 major banks will be fined a total of about $5.7 billion. The banks plead guilty to manipulating global currency and interest rates as far back as 2007. Citigroup, JPMorgan Chase, Barclays the Royal Bank of Scotland, and Swiss bank, UBS, will pay fines that symbolize the government’s desire to reign in the power of the financial elite.

The New York Tim

Read more…

3 Ways Criminals influence to steal

Criminals use six basic principles of Influence to steal. In this post we will discuss the first 3. The ability to influence boils down to science. By applying some science, anyone can learn to be more influential. It’s easy to influence sheep and cattle. It’s a bit more complicated to influence people. But many people can be influenced as easy as a cow. Criminals understand this the same way sales people do. The derivative of “confidence” is con. All influence in some way is designed to gain yo

Read more…

IMG_1266-500x333.jpg?width=300Sally Beauty Holdings confirmed last week that its payment card systems had been compromised, but did not disclose the extent to which data had been breached.

The Texas based retailer is the next in a string of security incidents that include Target and Sony Pictures, and comes a year following the company disclosing a breach of 25,000 customer records.

If the risk is high, and best practices of organizations like NIST, ISO, and SANS are known, then where are the gaps in these organization’s gover

Read more…

8028232685?profile=original

Enrique Suarez Presenting:

The Myth that Japan is Broke: The World’s Largest “Debtor” is now the Largest Creditor

Source: Ellen Brown

Global Research

Japan’s massive government debt conceals massive benefits for the Japanese people, with lessons for the U.S. debt “crisis.”

In an April 2012 article in Forbes titled “If Japan Is Broke, How Is It Bailing Out Europe?”, Eamonn Fingleton pointed out the Japanese government was by far the largest single non-Eurozone contributor to the latest Euro rescue eff

Read more…

8028234079?profile=originalEnrique Suarez Presenting:

Only One in Four Workers Worldwide Has a Stable Job

Source: Andre Damon
Global Research, May 20, 2015

Only one quarter of the world’s working population holds a permanent and stable job, according to a new report published by the International Labor Organization (ILO) Tuesday.

Even as the number of unemployed people worldwide remains significantly higher than before the 2008 crisis, the few jobs that have been created in recent years have been disproportionately part-time,

Read more…
Views: 66
Comments: 0

Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.

Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and commit fraud, destroy your website, you name it. They can do this many ways, including intercepting your activity with an imposter website where you input login details—that the hacker then obtains.

But public Wi-Fi

Read more…

8028234252?profile=originalEnrique Suarez Presenting:

“Is Islam violent? I would say absolutely not” Professor M. Steven Fish

8028233292?profile=original

It is the first major scientific effort to assess how Muslims and non-Muslims differ–and do not differ–in the contemporary world.

In this book, he seeks to quantify the correlation between Islam and violence and found that murder rates are substantially lower in Muslim-majority countries and instances of political violence are no more frequent. Using rigorous methods and data drawn from around the glo

Read more…
Views: 97
Comments: 0

8028232300?profile=original

Enrique Suarez

Master of Education & International Development

Harvard University

Presenting:

 Prof. John Kozy

The History of Knowledge: Darkness in the Academy

 As far as we can discern, the sole purpose of human existence is to kindle a light in the darkness of mere being.

                                                                                                                                                Carl Jung

Knowledge does not always prevail or even endure. When the Empire fell, the Ju

Read more…
Views: 94
Comments: 0

We Lucky Molecules

8028233280?profile=original

Enrique Suarez

Source:

 Investigative Reporter Robert Parry

Global Research, April 25, 2015

Scientists don’t know how many atoms and molecules there are in the Universe, but it’s clear that the vast, vast, vast majority find themselves locked in lifeless form – perhaps consumed by the fire of an exploding nova, or sucked into a black hole going who knows where, or simply frozen in the dark reaches of space.

A tiny, tiny, infinitesimal minority found themselves on Planet Earth and even there, the vast

Read more…

Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim.

Cyberbullying can happen to both adults and kids, but since it’s so common among youths, it’s good to know how to help your

Read more…

8028233475?profile=originalEnrique Suarez Presenting:

George Washington, Thomas Jefferson, Alexander Hamilton, John Adams and James Madison Slammed Runaway Inequality
Source: Washington's Blog
 
Global Research, April 22, 2015

The primary author of the Constitution – and later president – James Madison wrote:

The great object [of political parties] should be to combat the evil: 1. By establishing a political equality among all. 2. By withholding unnecessary opportunities from a few, to increase the inequality of property, by an

Read more…

Although there’s an unlimited number of ways to structure a deal, or a securities offering, the use of hybrid securities, such as; convertible notes or preferred stock, enables the entrepreneur to attract investors due to the recent ability to advertise the securities offering and compete with financial institutions for investor capital. Investors in today’s market are seeking short-term investments with relative safety and high yield.  If you provide this to the investor community, you will inc

Read more…

Tax ID Theft

Three things in life are guaranteed: death, taxes and tax-related identity theft. Michael Kasper would agree. Someone registered Kasper’s IRS.gov account, requested the document for his 2013 tax return, then filed a 2014 tax return.

The crook used a middleman—an innocent woman who answered his Craigslist ad for a moneymaking opportunity. He sent the money to her bank account, then she wired it to Nigeria, not knowing she was helping the crook.

Kasper’s account got busted into when the

Read more…

AAEAAQAAAAAAAANvAAAAJGFlOTIwNDljLTBkNWItNGFhNi04ODdmLTBmODlhYTZjMTNhZA.jpg

I recently wrote this article for TheConsultantLounge.  You can read the original article here:  http://theconsultantlounge.com/2015/04/top-business-frameworks-for-management-consultants/.

* * * *

Business frameworks and methodologies may be a concept foreign to many business professionals, but it is one near and dear to all management consultants.  As a management consultant, you will either have used many of these, or at least know what they are so you can nod in agreement when others talk about

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead