All Posts (5963)

Sort by

When you hear the dictum, “You should protect yourself from identity theft,” do you equate this with pushing a wheelbarrow loaded with rocks up a hill? It would actually be more accurate to picture slicing into a fresh apple pie, because identity theft protection is as easy as pie. Check out the following things you should do—without breaking any sweat:

RISK.jpg

  1. Examine your credit card statements once a month to catch any unauthorized charges. Even a tiny charge should not be blown off, since often, thie
Read more…

Why use a VPN?

If you want to be a pro at privacy, here’s a tip: When it’s time to go online, whether it’s at an airport lounge, coffee house, hotel, or any other public Wi-Fi spot, don’t log into any of your accounts unless you use a virtual private network (VPN).

A VPN is a technology that creates a secure connection over an unsecured network. It’s important to use because a hacker can potentially “see” your login information on an unsecured network. For instance, when you log in to your bank account, the hac

Read more…

CNN’s latest news headlines reads, “28 years for salmonella: Peanut exec gets groundbreaking sentence.” This story relates to the Peanut Butter Corporation of America’s (PBC’s) bankruptcy, and the largest food recall in the United States due to salmonella. Known as one of the deadliest salmonella outbreaks, the PCA’s case is linked to nine deaths on top of 714 affected and sickened. 

Stewart Parnell, PCA’s owner, received a 28 year prison sentence, while his brother and food broker for PCA, Micha

Read more…

The Internet helps us connect and share with people around the world, but there are some people with whom you definitely shouldn’t be sharing your information. Although it’s not pleasant to think about, it’s not just friends and family that can see your online posts, bad guys can too, including criminals and even sex offenders.

So, when you take a photo of your kids in your backyard, know that if you post that picture on social media, a predator can potentially obtain the GPS coordinates of where

Read more…

What is a Hacker?

You probably think you know what a “hacker” is, but the images portrayed in the media can be misleading. You may be thinking of a geeky-looking guy who causes peoples’ computers to get infected with viruses or cracks passwords to raid the accounts of big business. This is one kind of hacker, but in a broader sense a hacker is a person (male or female) who uses their programming skills and technical knowledge to create and modify computer software and hardware by finding their weaknesses and expl

Read more…

Commonwealth Capital is proud to announce a New Venture Capital Fund specifically designed for Start-Up and Early Stage Companies.

We have access to many sources of capital for varying stages of a company’s existence. More importantly, we are looking to invest in start-up and early stage companies through our inaugural venture-capital fund, Commonwealth Capital Income Fund I.

Unlike most venture-capital firms, we’ve taken the mystery out of the application and funding process. We’re upfront about

Read more…

State sponsored Attacks big Problem

The U.S. Office of Personnel Management, an identity database, was attacked by hackers rather recently, and they hit the jackpot: More than 21 million federal workers are at risk of identity theft for perhaps the rest of their lives, reports an article on forbes.com.

The hackers from overseas now have security clearance documents for these employees that contain some very sensitive personal information. And nobody can take these documents away from the hackers.

That’s the problem with these centra

Read more…

Twitters ups its Security Game

Twitter recently announced its new tool to help with management and monitoring of its users’ accounts: the Twitter data dashboard.

An article on lifehacker.com details what this new tool will offer. For instance, you will not need to use your real name on Twitter—and I have to admit, this is an odd way to promote the tool, because I’m sure that scads of Twitter users haven’t been using their real name for years. It’s not as though Twitter can tell that “Emily White” is really Sashea Fiopwieei.

Any

Read more…

8028238879?profile=originalAs a Future Labour Government Becomes Reality, Tories Panic as Bankers See Gravy-Train Crashing

Source:

Anthony Bellchambers

Global Research, September 28, 2015

Goldenballs bankers and hedge-fund, casino-operation directors are even now making enquiries to emigrate to Dubai or New York, in the future, as it becomes clear that a radical reforming, British Labour government is more than likely in 2020.

Multinational companies currently protected by the Conservative government will be forced in future t

Read more…

7 Ways to protect Yourself Online

The biggest mistake that you can make to threaten your online safety is to treat the online world different—as far as your private information—than you would treat the physical world. In other words, if someone walked up to you and said, “Hi, can you please provide me with your name, address, birth date, home phone, cell phone, email, usernames, passowords all your friends names and all their contact info?” I think not.

What sane person would pass out cards with their Social Security number, birt

Read more…

Jeremy Corbyn’s Economic Vision

8028238486?profile=original

Enrique Suarez Presenting:

Jeremy Corbyn’s Economic Vision

Source:

Stephen Lendman

Global Research, September 27, 2015

America, Israel and Britain are the developed world’s most unequal countries. Wealth disparity in all three are extreme and widening – government-sponsored hellishness for their ordinary citizens, finding it increasingly harder to get by on stagnating low incomes, reduced benefits and rising cost of food, shelter, healthcare and other essentials.

Western governments overall are dismis

Read more…

One of the reasons you—and many others—don’t have your alarm on during the day is because you know you’ll keep forgetting to turn it off every time you want to step into the garage or go outside. So you just keep it off. And that’s not smart because many home invasions and burglaries occur during daylight hours.

Typically, home security systems require you to push buttons.

  • What if you panic and forget the code?
  • What if you accidentally disable it?
  • What if your naughty visiting nephew messes with it?
Read more…

You have the best IT security, but dang it…the bad guys keep getting in. This means someone inside your house keeps opening the back door and letting the thieves slip inside. You have to find out who this enabler in your company is, and it may be more than one.

They don’t know they’re letting in the crooks, because the crooks are disguising themselves as someone from your company or a vendor or some other reputable entity.

After figuring out who these welcome-mat throwers are, you then have to con

Read more…

The US-EU Transatlantic Free Trade Agreement: Big Business Corporate Power Grab

Enrique Suarez Presenting:

The US-EU Transatlantic Free Trade Agreement (TAFTA): Big Business Corporate Power Grab

Source:

Colin Todhunter

Global Research, September 24, 2015

The Transatlantic Free Trade Agreement (TAFTA) between the US and EU intends to create the world’s largest free trade area, ‘protect’ investment and remove ‘unnecessary regulatory barriers’. Corporate interests are driving the agenda, with the public having been sidelined. Unaccountable, pro-free-trade bureaucrats from both side

Read more…

Seniors big Target for Romance Scams

Janet N. Cook, 76, was duped by a dashing younger man. A report at nytimes.com explains that in July 2011 she connected with Kelvin Wells via a dating site.

Next thing, this seemingly-together man was in trouble and needed lots of money. Cook got burned; she sent the crook nearly $300,000 (amazing; just try to get a friend to give you $100).

The FBI’s Internet Crime Complaint Center warns:

  • If that wonderful man (or woman) sounds too good to be true and speaks poetically, e.g., “We were meant to be
Read more…

Volkswagen – The Cost of Deception

“We screwed up”. Michael Horn, head of VW’s US operations, offered a stark apology and admission of cheating on diesel emissions. “Our company was dishonest with the EPA, and the California Air Resources Board and with all of you” was the confession offered by Mr. Horn during a press conference to discuss the now explosive findings of devices added to their cars to fake the appearance of passing emissions tests. The scandal, like most acts of deception, will widened into a predictable pattern of

Read more…

Do you have the right ojectives?

Most organisations, although to my surprise not all, have a strategic plan with defined objectives. The challenge is to ensure you have the right objectives. Ask yourself, with the objectives we are pursuing, what question are we answering? Are we even asking the right question?

When it comes to strategic plans and objectives, we have a tendency to immediately start thinking about how to implement the first idea that comes into our head. We start asking ourselves, how am I going to pull this off?

Read more…
Views: 76
Comments: 0

Ins and Outs of Call Center Security

Companies that want to employ at-home workers for their call centers to save money and reduce the hassles of office space have to look at security considerations. In addition to thorough vetting of the agents and their equipment, organizations also need to ensure that the security is top-notch. A cloud-based contact center combats these issues. Here are some considerations:

  • Will it anger customers to have an agent who can’t speak clear English? Not only does poor speech of the employee drive some
Read more…

Cheating Website hacked hard

Bad guys hacked bad guys. Hmmm, whose side should we take?

Ashleymadison.com got hacked. This site helps and suggests married people cheat. The hack threatens millions of users, potentially revealing their credit card information, addresses, real names, pictures and content of their chat logs.

This dating site has 37 million users and is owned by Avid Life Media. Their other sites, Established Men and Cougar Life, were also hacked.

The hackers responsible call themselves The Impact Team. They objec

Read more…

Visit Proactive Risk Management at ASIS 2015

Proactive Risk Management will be at the ASIS 2105.

Visit us at the booth 967: Proactive Risk ManagementASIS 2015

Proactive Risk Management Inc. (PARM) is a leading multinational provider of risk management and security services. By taking a global and integrated approach to risk management and by recruiting the security industry’s top talent, PARM has been able to provide an unmatched level of service based on four interconnected pillars: business intelligence, incident management, loss prevention & secur

Read more…
Views: 37
Comments: 0

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead