By:
Phishing-type e-mails are designed to trick the recipient into either downloading a virus (which then gives the hacker remote control of the computer) or revealing enough information for the thief to open credit cards in the victim’s name, get into their bank account, etc.

There are many ways the crook can trick the victim. Here are telltale signs:
Guess who may be compromising the security of your Social Security Number.

The Social Security Administration!
Yep, that’s right. Did you know that 66 percent of the mail the SSA sends out contains someone’s Social Security number? This is what the inspector general of the SSA, Kimberly Byrd, says, and I believe it.
How many pieces of mail is this? Over 230,000,000. This situation is problematic.
Hello all,
We are TSR Canada, a divison of The Staff Room, we are a Human Resources/HUman Capital and career coaching firm that offers seminars, conculsting as well as we have a few courses that will help you in your career. We are starting up our seminars again as of Septemer. We need to know if you prefer Morning seminars or afternoon? What week is best the first week of Sept or the second? What day works best...Monday to Thursday only and this will be conducted at our newest location in Picke
Source:
for ENTREPRENEURS
Intro
In the early stages of their business, founders often struggle to come up with really strong messaging to describe what they are selling, and this has a huge impact on their ability to raise money, find customers, and attract employees. This is not that surprising, as it can be really hard to arrive at great messaging that is simple and appealing. This post focuses on how
Another extraordinary definition by Noam Chomsky of what a human being is that goes well beyond giving people "functions" in the economic system which dehumanize them. In other words, in the economic system when a worker or a craftsman produces something of value on command, we might admire what he did but we despise what he is.
You can watch the video link below:
In a recent Wired.com expose’, they expose how the FBI has been secretly hacking civilian computers for about 20 years, but thanks to Rule 41, their ability to hack has been expanded.

Nevertheless, effective record keeping for these hacking incidents doesn’t exist. For instance, search warrants that permit hacking are issued using elusive language, and this makes it difficult to keep track of when the feds hack.
Also, it’s not required for the FBI to submit any reports to Congress that track the F
Worst Economy In 5,000 Years?
Source:
Washington's Blog
June 8, 2016
According to Bank of England economist Andy Haldane, Bank of America Merrill Lynch economist Michael Hartnett and others, we’ve got the lowest interest rates in 5,000 years: You can read the rest of this article in the link below:
Plains All American Pipeline, a major player in the oil and gas industry, faces $2.8 million in fines, and a grand jury indicted the company on 46 criminal charges – four of them felonies – according to The Wall Street Journal.
Additionally, a Plains employee is being individually charged and faces a multi-year prison term. This is part of a trend set in motion in 2015, when the Department of Justice announced a new policy. It now prosecutes corporate individuals for negligence in risk and compl
Interview with David Buck, Head of Integrated Stress Testing & Forecasting, Citizens Financial Group
As banks struggle to keep pace with regulatory updates while meeting capital requirements, there is a great desire to improve efficiencies so more focus can be placed on growth and profitability. Regulators have made it clear that risk management should be the centerpiece of banks’ strategic business plans, and many institutions are transitioning their processes to reflect this mindset.
David Buc
Whether you are the boss or a strategic advisor to the boss you establish boundaries to guide the decisions and hence behaviour of staff. What kind of boundaries have you set? I see three basic types:
• Hard – Thou shalt not cross.
• Flexible – Permission to bend the boundaries, up to a point, is implicit.
• Cushioned – Firm boundaries that allow staff to push up against them without getting “hurt”.
Hard boundaries are needed when the consequences are dire. Examples include safety and highly regul
Back in August of 2015, we discussed a vulnerability in Android’s operating system that put both personal and professional data at risk. This is just one example of the fact that improved technologies, while vital to continued growth, can bring with them serious cyber risks.
The World Economic Forum’s Global Risks Report 2016 reflects this idea. The report “examines the interconnections among the risks,” which multiply as technology improves.
According to The Huffington Post, “our cyber dependence
As much as you try, the unfortunate truth is that hackers are going to try to attack and access your WordPress website or blog, whether you like it or not. So, it is up to you to make sure you make the hacker’s job as difficult as possible. Here are some tips:

1. Use Plugins
One way to make your WordPress account less appealing is to use security plugins. These vary in quality, and you might have to purchase some of them, too. Just make sure to do some research before buying them, and when you do,
Yes, believe it or not, ransomware has become such a booming business for thieves, that these cyber thugs even provide bona fide customer service departments to guide their victims!

When ransomware infects your computer, it holds your files hostage; you can’t access them—until you pay the hacker (usually in bitcoins). Once paid, the crook will give you a decryption “key.” Sometimes the fee will go up if you don’t pay by a deadline. Fees may a few to hundred to several hundred dollars to way more
Hackers and wannabe hackers can easily purchase cheap tools of the trade online. The security firm Dell SecureWorks Inc. confirms this in their latest report and adds that underground markets for hackers, including those from Russia, is thriving.

The “Dark Web” is the go-to place for hackers looking for guidance and tools like malware. Yes, you can buy malware. If you don’t want to be the hacker, you can hire a hacker.
There’s any number of reasons why a non-techy person would want to hire a hacke
As a leader of an organization, one of the most important tasks is managing enterprise governance, risk, and compliance (GRC). At its core, a compliance program is a set of internal policies and procedures that are put in place at an organization to ensure compliance with all laws and regulations.
The importance of a robust compliance program is especially true in the wake of increasing regulations such as SOX, PCI, and HIPAA and the rapid transformation that has occurred in technology over the l
What a very interesting experiment: Researches randomly deposited 297 USB drives (aka USB stick, flash drive, thumb drive) around the University of Illinois Urbana-Champaign campus. They wanted to see just how many, and how soon after dropping them off, they’d be collected by people.

Turns out that 48 percent of the drives were taken and inserted into computers. The report at theregister.co.uk says that in some cases, this was done minutes after the drives were left in the public spots.
Picking up
By this point, the Volkswagen scandal is old news (we first blogged about it last October). Yet details about the case continue to emerge, most recently about board accountability. As of last week, a Volkswagen “internal probe into its emissions-cheating scandal found no evidence of wrongdoing by members of senior management…” In other words, VW’s Board didn’t know about the deception until it was too late.
This might appear to be a good thing, but actually VW is making its situation worse. Why?
Source:
DUBAI | Andrew Torchia
REUTERS
Saudi Arabia aims to create the world's biggest sovereign wealth fund, a $2 trillion behemoth that can throw its weight around global markets, but the fund's growth abroad is likely to be slowed by its responsibility for aiding the economy at home.
Building the Public Investment Fund (PIF) into "the largest fund in the world by far" is a cornerstone of radical economic reforms announced by Deputy Crown
Interview with Daniel Damon, Managing Director, Loan Capital Markets, US Bank
A number of new challenges and issues affecting leveraged finance have recently emerged. The continued pressure of the Interagency Guidance means institutions are concerned of falling foul of the regulators. In addition, the current market trends of rising interest rates and falling oil prices have heavily impacted the creation and funding of leveraged loans, making it harder and harder to manage them in the current reg