All Posts (5852)

Sort by

IMG_1266-500x333.jpg?width=300Sally Beauty Holdings confirmed last week that its payment card systems had been compromised, but did not disclose the extent to which data had been breached.

The Texas based retailer is the next in a string of security incidents that include Target and Sony Pictures, and comes a year following the company disclosing a breach of 25,000 customer records.

If the risk is high, and best practices of organizations like NIST, ISO, and SANS are known, then where are the gaps in these organization’s gover

Read more…

8028232685?profile=original

Enrique Suarez Presenting:

The Myth that Japan is Broke: The World’s Largest “Debtor” is now the Largest Creditor

Source: Ellen Brown

Global Research

Japan’s massive government debt conceals massive benefits for the Japanese people, with lessons for the U.S. debt “crisis.”

In an April 2012 article in Forbes titled “If Japan Is Broke, How Is It Bailing Out Europe?”, Eamonn Fingleton pointed out the Japanese government was by far the largest single non-Eurozone contributor to the latest Euro rescue eff

Read more…

8028234079?profile=originalEnrique Suarez Presenting:

Only One in Four Workers Worldwide Has a Stable Job

Source: Andre Damon
Global Research, May 20, 2015

Only one quarter of the world’s working population holds a permanent and stable job, according to a new report published by the International Labor Organization (ILO) Tuesday.

Even as the number of unemployed people worldwide remains significantly higher than before the 2008 crisis, the few jobs that have been created in recent years have been disproportionately part-time,

Read more…
Views: 66
Comments: 0

Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.

Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and commit fraud, destroy your website, you name it. They can do this many ways, including intercepting your activity with an imposter website where you input login details—that the hacker then obtains.

But public Wi-Fi

Read more…

8028234252?profile=originalEnrique Suarez Presenting:

“Is Islam violent? I would say absolutely not” Professor M. Steven Fish

8028233292?profile=original

It is the first major scientific effort to assess how Muslims and non-Muslims differ–and do not differ–in the contemporary world.

In this book, he seeks to quantify the correlation between Islam and violence and found that murder rates are substantially lower in Muslim-majority countries and instances of political violence are no more frequent. Using rigorous methods and data drawn from around the glo

Read more…
Views: 99
Comments: 0

8028232300?profile=original

Enrique Suarez

Master of Education & International Development

Harvard University

Presenting:

 Prof. John Kozy

The History of Knowledge: Darkness in the Academy

 As far as we can discern, the sole purpose of human existence is to kindle a light in the darkness of mere being.

                                                                                                                                                Carl Jung

Knowledge does not always prevail or even endure. When the Empire fell, the Ju

Read more…
Views: 103
Comments: 0

We Lucky Molecules

8028233280?profile=original

Enrique Suarez

Source:

 Investigative Reporter Robert Parry

Global Research, April 25, 2015

Scientists don’t know how many atoms and molecules there are in the Universe, but it’s clear that the vast, vast, vast majority find themselves locked in lifeless form – perhaps consumed by the fire of an exploding nova, or sucked into a black hole going who knows where, or simply frozen in the dark reaches of space.

A tiny, tiny, infinitesimal minority found themselves on Planet Earth and even there, the vast

Read more…

Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim.

Cyberbullying can happen to both adults and kids, but since it’s so common among youths, it’s good to know how to help your

Read more…

8028233475?profile=originalEnrique Suarez Presenting:

George Washington, Thomas Jefferson, Alexander Hamilton, John Adams and James Madison Slammed Runaway Inequality
Source: Washington's Blog
 
Global Research, April 22, 2015

The primary author of the Constitution – and later president – James Madison wrote:

The great object [of political parties] should be to combat the evil: 1. By establishing a political equality among all. 2. By withholding unnecessary opportunities from a few, to increase the inequality of property, by an

Read more…

Although there’s an unlimited number of ways to structure a deal, or a securities offering, the use of hybrid securities, such as; convertible notes or preferred stock, enables the entrepreneur to attract investors due to the recent ability to advertise the securities offering and compete with financial institutions for investor capital. Investors in today’s market are seeking short-term investments with relative safety and high yield.  If you provide this to the investor community, you will inc

Read more…

Tax ID Theft

Three things in life are guaranteed: death, taxes and tax-related identity theft. Michael Kasper would agree. Someone registered Kasper’s IRS.gov account, requested the document for his 2013 tax return, then filed a 2014 tax return.

The crook used a middleman—an innocent woman who answered his Craigslist ad for a moneymaking opportunity. He sent the money to her bank account, then she wired it to Nigeria, not knowing she was helping the crook.

Kasper’s account got busted into when the

Read more…

AAEAAQAAAAAAAANvAAAAJGFlOTIwNDljLTBkNWItNGFhNi04ODdmLTBmODlhYTZjMTNhZA.jpg

I recently wrote this article for TheConsultantLounge.  You can read the original article here:  http://theconsultantlounge.com/2015/04/top-business-frameworks-for-management-consultants/.

* * * *

Business frameworks and methodologies may be a concept foreign to many business professionals, but it is one near and dear to all management consultants.  As a management consultant, you will either have used many of these, or at least know what they are so you can nod in agreement when others talk about

Read more…

8028234483?profile=original

Enrique Suarez

Source:

 Andre Damon

Global Research, May 15, 2015

Five major international banks are expected to plead guilty as soon as next week to criminal charges in the US related to their deliberate manipulation of global foreign exchange markets, which allowed them to rake in billions of dollars at the expense of retirees, university endowments and municipalities.

Citigroup, JPMorgan Chase, Royal Bank of Scotland Group, Barclays and UBS are expected to plead guilty to felony fraud and antitrus

Read more…
ISO-19600-Risk-Based-Compliance-Management-Diagram-500x463.png?width=300

LogicManager has long believed that an Enterprise Risk Management methodology, also known as a risk-based approach, is the best way of accomplishing any type of organizational governance. With risk as the common factor, governance activities become standardized and comparable, enabling better decision making.

As it turns out, the International Organization for Standardization, or ISO, agrees.

ISO 19600:2014 is a guideline for compliance management software systems, designed to establish an effecti

Read more…
Views: 371
Comments: 0

What is Shoulder Surfing?

The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be trying to capture your login information so they can use it to access your accounts impersonating you later on.

This behavior is called “shoulder surfing”, but it doesn’t always mean that someone is literally look

Read more…

AAEAAQAAAAAAAAJMAAAAJGQ0MTQ2ZjFiLWEwMGMtNGUxNy1iNzY2LTk5ZWMxNTU0ODRiZA.jpg

Disclaimer: Much of this article is based on the PowerPoint presentation Lean Thinking 101 developed by Operational Excellence Consulting.

* * * *

Lean Management is a management philosophy based on the Toyota Production System (TPS). This management philosophy was coined "Lean" only in the 1990s. The objective of Lean Thinking is to eliminate everything that does not add value (i.e. "waste") from the customer's perspective.

The general approach to Lean is learn-by-doing and to foster a culture of

Read more…

8028233088?profile=originalEnrique Suarez Presenting:

It’s the Interest, Stupid! Why Bankers Rule the World

Source:

Ellen Brown

Global Research, November 08, 2012

Web of Debt

In the 2012 edition of Occupy Money released last week, Professor Margrit Kennedy writes that a stunning 35% to 40% of everything we buy goes to interest. This interest goes to bankers, financiers, and bondholders, who take a 35% to 40% cut of our GDP. That helps explain how wealth is systematically transferred from Main Street to Wall Street. The rich get

Read more…

Did you know that, once again, Facebook has changed its privacy policies? At the top of the FB page is a lock icon. Click it for more privacy settings.

What do visitors see? To view how visitors see your Facebook page, go to “Timeline and Tagging,” then hit “Review what other people see on your timeline/View As.”

Posts by friends. Click “Timeline and Tagging” to prevent a visitor’s unwanted post from showing. Then click “Enabled,” as this will allow you to “review posts friends tag you in before t

Read more…

How Hackers use LinkedIn to Scam

Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.

An article on blog.sungardas.com was written by a white-hatter (his job is to try to hack his clients’ systems so that they know how to make them more impenetrable to the bad guys). The author says he’d make a beeline to Linked

Read more…

Chief Compliance Officers & Heads of NERC/FERC Compliance from Utilities professionals will join together to share fine-tuning concepts and complexities to build understanding for upcoming audits

 

Washington, DC– May 12, 2015 marcus evans, the world’s largest event management group, will host the Risk Based Compliance and Reliability Assurance for Utilities Conference on August 25-27, 2015 in Washington, DC. This premiere meeting will provide Industry leaders with insight into the recent launch

Read more…
Views: 98
Comments: 0

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead