All Posts (6242)

Sort by

Protect your Privacy on your iPhone

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.

Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps can gain this access and deactivate it. And there’s so much more to know…

Ads

  • The Limited Ad Tracking option controls how targeted the ads
Read more…

The risks of credit trading

An interview with Terry Benzschawel, Managing Director, Institutional Clients Group, Citigroup

Our team at RiskMinds Live got to grips with the risks of credit reading with Terry Benzschawel ahead of this year’s RiskMinds Americas conference, taking place in Chicago this September…

What are the key risk challenges that you are facing today?

I see two possible main sources of risk and a couple of lesser ones. First, I see the US Fed’s exit from QE and that of the European Central bank as having the

Read more…
Views: 103
Comments: 0

8028248691?profile=originalA couple of weeks ago, a colleague of mine came to tell me about a new finding that she knew I'd love: BCM helps reduce data breach costs.

All I could think was, 'FINALLY.'

This is something that I've been telling clients for years: BCM is more valuable to your business than you can possibly imagine.

The new research from Ponemon Institute found that data breaches now cost as much as $4m - to say nothing of reputational hits. And, you could face a double whammy with higher insurance premiums, too.

B

Read more…

How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.

What if he had had an iPhone on his person at the time he wandered off in the middle of some vast woods? Sure he could call, but then what? Android and iPhones have a “find my phone” feature that a parent can track down a lost

Read more…

8028249077?profile=original

Born to Star

Latest Secrets for Startup Success

When Vision Master and Execution Master Meet

Published by Intelliversity,
a 501(c)3 not-for-profit LLC

www.IntelliversityCampus.org

Introduction


Essential elements are drawn together by mutual attraction. When they hit critical mass, boom! A star is born. A star expands as more essential elements are drawn in, glowing brightly and nurturing life.

Your innovative business can grow in the same explosive way. This eBook holds the secret for igniting that kind

Read more…

Play your Trump Card

8028247465?profile=originalWhether you love him or hate him, it must be said that Donald Trump has been a master in getting some people to listen to him, to agree with him, even like what he has to say.  He cuts through all the clutter and paints a picture that many people want to see.

No matter who you are advising, your children, your spouse, your boss or a manager and their team in another department, sometimes the challenge is so great, you need a trump card.

In the card games of Bridge and 500 (the former was taught to

Read more…
Views: 98
Comments: 0

Segmentation.  Everyone’s doing it, but are you doing it right?  

Although segmentation should help target the right customers, it does not always bring the intended value. Inappropriately or incorrectly defined segments may lead management to make bad strategic decisions.

Market and Customer Segmentation defines a number of different groups of people or organizations, which our company aims to reach and serve.  The intent of the segmentation exercise is to two-fold:

1) Create the foundation for a

Read more…
Views: 169
Comments: 0

Be aware of all these Confidence Crimes

Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.

  • A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look very much like the typical company e-mail that the real person uses.
  • Example: The thief sends a trick e-mail (phishing) to a company employee he fo
Read more…

Crowd-Funding Success

The definition of the term “crowdfunding” has evolved in recent years. The term was originally used for donation-based crowdfunding only, but is now used to define capital-based crowdfunding — also known as Regulation Crowdfunding — under Title II (2) and then under Title III (3) of the Jumpstart Our Business Startups (JOBS) Act of 2012.

 

The JOBS Act has significantly leveled the investment playing field, encouraging a growing number of entrepreneurs to begin fielding their own crowdfunded offer

Read more…
Views: 63
Comments: 0

A Banker’s Guide to create a process based operating model and an insight into methods that would reduce transaction costs, increase productivity and minimise operational risks.

Key Features

  • Banking Processes Management 
  • Analysis of Case studies of Operational Risk Incidents.
  • Usage of tools for improving Operational Efficiency, with Case Studies.
  • Collection of relevant wholesome operational data at the granular level is explained by analysing Risk Incidents and providing Risk & Control Monitoring exa
Read more…
Views: 123
Comments: 0

According to QuickBase CEO, Allison Mnookin, “The low-code market has finally arrived.” Citizen development is helping enterprises slash IT backlogs and is empowering business users to build self-service solutions, particularly in the governance, risk, and compliance space.

When it comes to customizing and developing applications, it is often a catch-22. It can be difficult to get feedback without a prototype, yet you don’t want to develop a mockup until you understand exactly what the requiremen

Read more…

If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security experts say is vulnerable.

Here are five things to know about passwords:

  • A long, strong password goes a long way in helping prevent hacking.
  • Every account should have a different password.
  • A hacker’s password-cracking softwa
Read more…

  • The book examines the issues of Money Laundering and Financing of Terrorism.
  • It analyses 155 money laundering case studies, examines the impact of money laundering in 10 countries and elaborates on the three well known financial crises.
  • It looks at the risk holistically by examining the risks within each sector of the eco-system (for example: the election system, bank, hawala, real-estate) and also at the National level.
  • The applicable United Nation resolutions and FATF recommendations are explaine
Read more…

Set Privacy on these Social Media Apps

Just like older generations never thought that the dial phone in the kitchen could be dangerous (think phone scams), today’s kids don’t have a clue how hazardous smartphone apps can really be. They are a godsend to pedophiles, scammers and hackers. And let’s not forget other kids who just want to be cruel bullies.

Parents should have informative discussions with their kids about the various apps out there. And it’s okay to forbid particular apps you aren’t comfortable with. Like Musicly, search “

Read more…

The nature of risk has evolved in recent years, driven by advances in technology and an increasingly fraught geopolitic climate. In an age of globalization, companies must be aware of all major incidents across the world, as there are very few that will not have at least some kind of impact on larger companies.

Ownership of risk management is, however, often difficult to determine, and people seem unclear who is responsible. The role of the CFO has changed in recent years, and they have become es

Read more…

Cane

  • If you use a cane, take “cane-fu” classes if possible. Yes, it’s a thing.
  • A sturdy cane with a strong handle works best.
  • Do not assume you can fight with a cane just because you need one to walk.
  • Avoid a cane with a hidden knife or sword unless you specifically train to fight with a blade.
  • A person’s first instinct with a cane-like device for self-defense is to wield it in a horizontal path as though swinging a baseball bat. This is wrong, as it can easily be seen in progress by the person you’r
Read more…

First, let’s define Value Proposition.  Here’s what Wikipedia has to say:

A value proposition is a promise of value to be delivered and acknowledged.  Creating a value proposition is a part of business strategy. Kaplan and Norton say “Strategy is based on a differentiated customer value proposition. Satisfying customers is the source of sustainable value creation.”

Why is having a clear and compelling Value Proposition so important?

  • It solves a customer problem or satisfies a customer need.
  • It is th
Read more…

Risks while determining Pre-hire Talent Assessments as Part of a Predictive Talent Acquisition Strategy

Greta Roberts, CEO

Talent Analytics, Corp.

16-July-16

Over the past 30+ years, businesses have spent billions on talent assessments. Many of these are now being used to understand job candidates.  Increasingly, businesses are asking how (or if) a predictive talent acquisition strategy can include the use of pre-hire assessments?  As costs of failed new hires continue to rise, recruiters and hiring

Read more…
Views: 48
Comments: 0

The words “data breach” are often met by a clamor whenever they make headlines. Home Depot, Target, Ashley Madison, Heartland, Citibank, the list goes on and on. These breaches spent time in the limelight because of their magnitude; they affected hundreds of thousands – in some cases millions – of cardholders.

powerful-ERM-software-500x350.png?width=250But the reality is data breaches are far more common than large headline events like these would have us believe. According to a report published by the Identity Theft Resource Center, ther

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead