“We screwed up”. Michael Horn, head of VW’s US operations, offered a stark apology and admission of cheating on diesel emissions. “Our company was dishonest with the EPA, and the California Air Resources Board and with all of you” was the confession offered by Mr. Horn during a press conference to discuss the now explosive findings of devices added to their cars to fake the appearance of passing emissions tests. The scandal, like most acts of deception, will widened into a predictable pattern of
All Posts (5948)
Most organisations, although to my surprise not all, have a strategic plan with defined objectives. The challenge is to ensure you have the right objectives. Ask yourself, with the objectives we are pursuing, what question are we answering? Are we even asking the right question?
When it comes to strategic plans and objectives, we have a tendency to immediately start thinking about how to implement the first idea that comes into our head. We start asking ourselves, how am I going to pull this off?
Companies that want to employ at-home workers for their call centers to save money and reduce the hassles of office space have to look at security considerations. In addition to thorough vetting of the agents and their equipment, organizations also need to ensure that the security is top-notch. A cloud-based contact center combats these issues. Here are some considerations:
- Will it anger customers to have an agent who can’t speak clear English? Not only does poor speech of the employee drive some
Bad guys hacked bad guys. Hmmm, whose side should we take?
Ashleymadison.com got hacked. This site helps and suggests married people cheat. The hack threatens millions of users, potentially revealing their credit card information, addresses, real names, pictures and content of their chat logs.
This dating site has 37 million users and is owned by Avid Life Media. Their other sites, Established Men and Cougar Life, were also hacked.
The hackers responsible call themselves The Impact Team. They objec
Proactive Risk Management will be at the ASIS 2105.
Visit us at the booth 967: Proactive Risk Management
Proactive Risk Management Inc. (PARM) is a leading multinational provider of risk management and security services. By taking a global and integrated approach to risk management and by recruiting the security industry’s top talent, PARM has been able to provide an unmatched level of service based on four interconnected pillars: business intelligence, incident management, loss prevention & secur
Editor’s Note: In this week’s guest blog security expert Robert Siciliano explains how to protect your IT systems and your business from hardware failure. To learn more, download our new e-book, “5 Things Small Businesses Need to Know about Disaster Recovery.”
It is September and that means National Preparedness Month: an ideal time to get involved in your community’s safety. Make plans to stay safe, and this includes keeping ongoing communications alive. National Preparedness Month culminates Se
Once you become active online…and especially once you become “connected” with a smartphone…your privacy will be in sizzling hot demand—and in fact, you can bet that as you read this, it is already being invaded in ways that you couldn’t possibly imagine. Here are some of those ways, provided by wired.com:
- Someone could be collecting information on you via a keylogger: It’s a little tool that records your keystrokes, that someone secretly inserts into your computer. A keylogger, however, can also
Last month, SoulCycle, a well-known high-end cycling business, filed for an initial public offering. In the midst of this exciting transition from private to public, SoulCycle was hit with a lawsuit for violating the Credit Card Accountability and Disclosure Act. One might assume that the company was outed by a compliance agency or regulator. But, surprisingly, this lawsuit comes from a disgruntled former customer, Rachel Cody, who felt she was being "robbed" by the cycling mogul she once truste
http://corporatecomplianceinsights.com/how-coso-destroyed-risk-management/
I have published an article with Corporate Compliance Insights on COSO and risk management. I would like to get this groups opinion on the article: Pros and Cons and hear your arguments for why you agree or disagree? Basically, I truly believe that risk management and the growth of risk practice must have one component of internal controls as a building block but it is time for risk to depart from COSO and develop more r
You’ll probably be shocked to learn that last year, thousands of cars with keyless entry technology were stolen in London, says a report from wired.com.
But fact is, the more connected a vehicle is to the cyber world, the more hackable the vehicle is—and the hack could be to steal the vehicle or hurt the owner.
Rule: Anything that’s connected, especially via WiFi can be hacked.
The article notes that recently, a Jeep Cherokee was hacked with a smartphone via its Internet-connected navigation and en
Catfishing is when someone creates a phony online account—and not necessarily to scam someone for financial gain. An article on vice.com tells all about a person who’s been catfishing for eight years.
She started in middle school by creating “Joey” on MySpace. She then commented, as “Joey,” on her real MySpace page to make herself appear that some cool kid named Joey thought she was pretty.
She got older and didn’t have friends. Don’t blame her for this. Her mother was an addict and father behind
Jeanette Franzel, board member of the Public Company Accounting Oversight Board (PCAOB), recently spoke at the American Accounting Association (AAA), according to The Wall Street Journal. She says audit-oversight inspections show a twenty percent increase (since 2013) in internal-control deficiencies of company audits. Inspections also indicate that 36 percent of company audits now have internal-control deficiencies, which constitutes a threefold increase from five years ago.
Franzel indicated th
Enrique Suarez Presenting:
Define Your Digital Strategy—Now
Source:
Ross, Jeanne W.
Sebastian, Ina
Fonstad
Center for Information Systems Research (CISR)
M.I.T
2015-06-18
Abstract: The confluence of social, mobile, analytics, cloud, Internet of Things, and other powerful, readily accessible technologies is disrupting businesses in all industries. Success requires a coherent digital strategy that is informed by the capabilities of these technologies. Leaders guide investment decisions by focusing on eithe
As recent data breaches have shown, cyber attacks are particularly threatening to government entities handling sensitive data like Social Security numbers. Unfortunately, state agencies struggle to hire cybersecurity professionals.
The cause of this staffing shortage? There simply aren’t enough qualified people for the job[i]. Thankfully, change is in the air.
To attract skilled cybersecurity experts, some state governments are expanding IT internships for high school and college students. Many ar
This past April, an Air Force reconnaissance airplane caught fire. At the time, 27 airmen were on the plane, and all their lives were put in danger. What went wrong and caused this costly error? According to U.S. Air Force investigators, the mistake traces back to an error in vendor management. In this case, a vendor failed to properly secure an oxygen tank, resulting in a “highly flammable oxygen-rich environment that ignited.”
Findings also indicate that problems with the military contractor ma
Years ago negative interest rates were unheard of. Modeling assumptions (often purposely) excluded them due to their extremely low probability, it simply seemed counter intuitive that they could even be present in a market, and certainly if they did they seemed as if they’d be a rare blip and not a prolonged market environment.
Fast forward to today, and negative rates are rampant across the Euro Zone and continue to be a critically important issue in global finance. While the Bank of England has
National Preparedness Month is happening right now. It’s the perfect time to take action for you and your community. It’s all about making plans to remain safe, and when disasters do strike, to keep communications going. September 30th is the culmination of NPM, with the National PrepareAthon! Day.
If a burglar sees your Facebook status that you are traveling on vacation and then enters your house, and takes $10,000 worth of valuables, it’s safe to say you as the homeowner facilitated the theft.
It sounds almost like science fiction, even in this cyber age: A thief hacks into your computer and encrypts your files, meaning, scrambles the information so you can’t make sense of any of it. He demands you pay him a big fat payment to “unlock” the encryption or to give you the “key,” which is contained on the thief’s remote server.
You are being held ransom. The FBI’s Internet Crime Complaint Center has sent out a warning to both the common Internet user and businesspeople about this ransomwar
The New York Times author David Leonhardt recently published a puzzle that I recommend all governance personnel attempt. Take a second to give it a try before reading this blog, but if you’re pressed for time, I’ll outline the basic premise.
The puzzle asks that you find the rule in the following pattern of numbers by guessing other sets of numbers that may or may not obey the rule. The sequence that obeys the rule is:
You may think you have the puzzle figured out already, and if you guessed, say,
Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges.
Though there are about 800 of such forums, Darkode was among the worst (or shall I say “best”?), presenting a serious threat to worldwide computers. Gone is Darkode’s ventures of buying, selling and trading malware, and exchanging hacking strategies—to actually carry out crimes, not just fun br