All Posts (6269)

Sort by

Will Biometrics replace Passwords?

The days of using a computer to access your bank account, using a password, may be coming to an end, to be replaced entirely (as some experts believe) with a fingerprint or face scan using a smartphone.

The smartphone employment of such biometrics will drastically reduce hacking incidents, but will be problematic for those who do not own a mobile device. Major banks are already offering the fingerprint scan as a login option.

Other biometrics currently in use by banks are the eye scan, facial reco

Read more…

Entrepreneurs can successfully plan, launch and manage their own Regulation Crowdfunding campaigns and extend those campaigns beyond the reach of Title III of the Jumpstart Our Business Startups (JOBS) Act.

           

“Regulation Crowdfunding has significantly leveled the playing field for raising capital, but it has serious limitations,” said Timothy Daniel Hogan, CEO of Commonwealth Capital.  “For example, a company seeking capital through Regulation Crowdfunding can only use Regulation Crowdfu

Read more…
Views: 102
Comments: 0

8028252085?profile=originalThe insurance market has been under pressure to transform for many years now.

PWC identify five distinct pressure points: social, technological, environmental, economic and political. Their ‘2020: Competing for Future’ report describes how this is a time of massive and potentially disruptive change.

While the competitive landscape is experiencing significant shifts and technology continues to disrupt the market, insurers also have lots of opportunities to respond, adopt change, transform their ser

Read more…

What is Malvertising?

Malevolent advertising is called malvertising. The “ad” is placed on a website by cybercriminals who want control of your computer for financial gain.

And the real scary thing about malvertising is that these trick-ads have appeared on trusted, popular websites like the Weather Network, BBC, NFL and the New York Times.

Oh, and it gets worse: The malicious ad can be hidden, unseen by the site visitor, thanks to a special html code that allows the bad ad to be inside legitimate content. This trick-c

Read more…

Our team at RiskMinds Live uncover the burden of a principles-based regulation, BCBS-239, with Krishnan Ranganathan ahead of this year’s RiskMinds Asia conference in Hong Kong this October…

What is BCBS-239?

During the financial crisis, banks were unable to understand quickly and accurately their overall exposures and other risk metrics having a bearing on their key risk decisions. In January 2013, BCBS-239 was introduced as a principles-based regulation to address this issue and improve the risk

Read more…
Views: 214
Comments: 0

8028247301?profile=original

Bridge Group 2016 Sales Development Metrics and Compensation Benchmark Report

Source:

David Skok

ForENTREPRENEURS

Intro

Sales development teams are taking a much more data-driven approach in recent years by closely tracking their metrics and performance. Benchmarking your performance against other companies offers a valuable way to see how your company stacks up against the competition.

We have collaborated again this year with The Bridge Group, an inside sales research and consultation organization,

Read more…

You’d think with all the media attention regarding data breaches, hackers and identity theft, that consumers would be more focused on their privacy and how to protect their information from prying eyes. Surprisingly, almost 70% of the people are clueless about how a criminal might have got a hold of their personal information.

We all have a lot going on in our lives, and this is exactly how identity thieves like us. Ever lurking, these criminals are counting on us being too busy to give any thoug

Read more…

Protect your Privacy on your iPhone

If you have an iOS device, you may be leaking personal information about yourself—without even knowing it—because you’re not familiar with the privacy settings.

Apps have “permissions,” meaning, they can access private information such as your social calendar stored on the phone, appointments, anything. Go to the privacy menu under “settings” to learn which apps can gain this access and deactivate it. And there’s so much more to know…

Ads

  • The Limited Ad Tracking option controls how targeted the ads
Read more…

The risks of credit trading

An interview with Terry Benzschawel, Managing Director, Institutional Clients Group, Citigroup

Our team at RiskMinds Live got to grips with the risks of credit reading with Terry Benzschawel ahead of this year’s RiskMinds Americas conference, taking place in Chicago this September…

What are the key risk challenges that you are facing today?

I see two possible main sources of risk and a couple of lesser ones. First, I see the US Fed’s exit from QE and that of the European Central bank as having the

Read more…
Views: 104
Comments: 0

8028248691?profile=originalA couple of weeks ago, a colleague of mine came to tell me about a new finding that she knew I'd love: BCM helps reduce data breach costs.

All I could think was, 'FINALLY.'

This is something that I've been telling clients for years: BCM is more valuable to your business than you can possibly imagine.

The new research from Ponemon Institute found that data breaches now cost as much as $4m - to say nothing of reputational hits. And, you could face a double whammy with higher insurance premiums, too.

B

Read more…

How many times have you read, or at least caught a headline, of the latest high profile missing child case? How many stories have we heard about the kid who got lost on a hike? His body was found several miles from where he’d been last seen, concluding a several-day search.

What if he had had an iPhone on his person at the time he wandered off in the middle of some vast woods? Sure he could call, but then what? Android and iPhones have a “find my phone” feature that a parent can track down a lost

Read more…

8028249077?profile=original

Born to Star

Latest Secrets for Startup Success

When Vision Master and Execution Master Meet

Published by Intelliversity,
a 501(c)3 not-for-profit LLC

www.IntelliversityCampus.org

Introduction


Essential elements are drawn together by mutual attraction. When they hit critical mass, boom! A star is born. A star expands as more essential elements are drawn in, glowing brightly and nurturing life.

Your innovative business can grow in the same explosive way. This eBook holds the secret for igniting that kind

Read more…

Play your Trump Card

8028247465?profile=originalWhether you love him or hate him, it must be said that Donald Trump has been a master in getting some people to listen to him, to agree with him, even like what he has to say.  He cuts through all the clutter and paints a picture that many people want to see.

No matter who you are advising, your children, your spouse, your boss or a manager and their team in another department, sometimes the challenge is so great, you need a trump card.

In the card games of Bridge and 500 (the former was taught to

Read more…
Views: 98
Comments: 0

Segmentation.  Everyone’s doing it, but are you doing it right?  

Although segmentation should help target the right customers, it does not always bring the intended value. Inappropriately or incorrectly defined segments may lead management to make bad strategic decisions.

Market and Customer Segmentation defines a number of different groups of people or organizations, which our company aims to reach and serve.  The intent of the segmentation exercise is to two-fold:

1) Create the foundation for a

Read more…
Views: 170
Comments: 0

Be aware of all these Confidence Crimes

Criminals often rely on tricking their victims to gain access to their passwords and other account information. This act of tricking is called social engineering, also known as a confidence crime, and it comes in many forms.

  • A type of phishing e-mail where the criminal targets someone specific is called spearphishing. The spearphishing e-mail will look very much like the typical company e-mail that the real person uses.
  • Example: The thief sends a trick e-mail (phishing) to a company employee he fo
Read more…

Crowd-Funding Success

The definition of the term “crowdfunding” has evolved in recent years. The term was originally used for donation-based crowdfunding only, but is now used to define capital-based crowdfunding — also known as Regulation Crowdfunding — under Title II (2) and then under Title III (3) of the Jumpstart Our Business Startups (JOBS) Act of 2012.

 

The JOBS Act has significantly leveled the investment playing field, encouraging a growing number of entrepreneurs to begin fielding their own crowdfunded offer

Read more…
Views: 63
Comments: 0

A Banker’s Guide to create a process based operating model and an insight into methods that would reduce transaction costs, increase productivity and minimise operational risks.

Key Features

  • Banking Processes Management 
  • Analysis of Case studies of Operational Risk Incidents.
  • Usage of tools for improving Operational Efficiency, with Case Studies.
  • Collection of relevant wholesome operational data at the granular level is explained by analysing Risk Incidents and providing Risk & Control Monitoring exa
Read more…
Views: 125
Comments: 0

According to QuickBase CEO, Allison Mnookin, “The low-code market has finally arrived.” Citizen development is helping enterprises slash IT backlogs and is empowering business users to build self-service solutions, particularly in the governance, risk, and compliance space.

When it comes to customizing and developing applications, it is often a catch-22. It can be difficult to get feedback without a prototype, yet you don’t want to develop a mockup until you understand exactly what the requiremen

Read more…

If your computer password contains the name of your dog, your favorite vacation spot, and an easy-to-remember numerical sequence, then you are breaking some basic rules of password safety. Even though “BusterBermuda789” might seem impenetrable to you, this is a password security experts say is vulnerable.

Here are five things to know about passwords:

  • A long, strong password goes a long way in helping prevent hacking.
  • Every account should have a different password.
  • A hacker’s password-cracking softwa
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead