All Posts (5852)

Sort by

8028230883?profile=originalPresented by:

Enrique Suarez

http://www.wix.com/suarezenrique/delta

School children in Nepal’s Matatirtha village practice an earthquake drill in the event of a natural disaster. A 7.8-magnitude earthquake in Nepal on Apr. 25, 2015, has endangered the lives of close to a million children. Credit: Department of Foreign Affairs and Trade/CC-BY-2.0

8028231065?profile=original

UNITED NATIONS – The death toll has now passed 3,300, and there is no telling how much farther it will climb. Search and rescue operations in Nepal entered

Read more…
Views: 101
Comments: 0

Protect Yourself from Online Fraud

Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft occur.

  • Imagine snail-mailing vital information like your SSN, bank account number, a duplicate of your driver’s license and your credit card number. At some point in the delivery process, someone opens the letter and see the contents. Elec
Read more…

Trolls get Dose of Reality

Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.

Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are collectively male.

Recently Schilling tweeted how proud he was that his daughter, Gabby, will be playing softball as a pitcher for Salve Regina University. Schilling got a lot of responses. And some were disgusting, incl

Read more…

Risk Leadership: What is the purpose of a policy or a framework?

 

I have seen many, many corporate policies and frameworks in my time.  The one great tendency of the authors of policies and frameworks is to put way too much information into them.

The other day I decided to sit down and sort out the difference between a policy, a framework and “the rest” of the information that one needs to provide so that the intent of the policy can be fulfilled.  I hope this helps clear it up in your head if you

Read more…
Views: 84
Comments: 0

Who Really Controls the World?

8028231692?profile=original

Enrique Suarez Introducing:

Prof. Dr. MUJAHID KAMRAN is Vice Chancellor, University of the Punjab, Lahore, Pakistan

Since I entered politics, I have chiefly had men’s views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they better not speak above their breath when they speak in co

Read more…

5 Online Security Tips You need to know

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.

Passwords

  • Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each account. But people—including those who’ve been around for a long time—continue using the same password and ridiculously weak passwords, like password1 and princess.
  • A v
Read more…

6 Ways to halt Online Tracking

“On the Internet, you can be ANYBODY!”

Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.

  • Don’t feel you must use your full, real name when filling out forms or whatever, just because it’s asked or even a “required field.” Of course, you’ll want to use your real name when registering online with a bank, for instance, or making a purchase
Read more…

Lost your Master Password, do This

You have a master password, from your password manager, for 28 accounts. Life has been so easy since!

But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager service has a different solution.

Yet how do you lose a master password in the first place? If it’s impossible to remember,then it may not be a good master password, regardless it should be written down somewhere in a se

Read more…

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through the air when an infected person coughs or sneezes. It’s not a very fun illness to have.

Viruses don’t just affect humans; there are viruses that can a

Read more…

8028233263?profile=originalPresented by:

Enrique Suarez

http://www.wix.com/suarezenrique/delta

Why Universal Poverty is the Only Sensible Choice for Humanity

 

Source: Kevin Karn, 2013

It's easy to show that the best course for the future of mankind is to reduce everyone in the world to poverty. To see this, examine the diagram below:

 

The diagram shows three possible income/wealth distribution scenarios for the world: the bottom scenario where everyone in the world is living in poverty; the middle scenario, where most of the wo

Read more…

8028232867?profile=originalGabor Mate

Presented by:

Enrique Suarez

An Interview on Health and Politics

Doctor Gabor Maté is the award-winning author of the books When the Body Says No, Hold On To Your Kids, and In the Realm of Hungry Ghosts. He was recently invited to speak at a conference of the Saskatoon Tribal Council, which includes seven Saskatchewan First Nations. Mr. Meili took the opportunity to interview Dr. Maté about his writing and the intersection between health and

Read more…

The Purpose of an Organization

8028231890?profile=originalHenry Ford

Edwards Deming described the purpose of an organization in New Economics, on page 51, as:

"The aim proposed here for any organization is for everybody to gain - stockholders, employees, suppliers, customers, community, the environment - over the long term."

Like so much of what Deming said that makes sense to me. It is my sense the "conventional wisdom" would state something more along the lines of the purpose of a company is to make money. I would not agree. Rewarding the owners is impo

Read more…

Keyloggers log wirelessly

Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to the gadget’s owner over the Internet.

The device looks like a USB wall charger, and this “KeySweeper” can be created with instructions from Samy Kamkar, a hardware hacker and security researcher who developed the

Read more…

Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once in a while, but sometimes this can seem like a daunting task, so here’s some tips for you to get started.

First, begin by emptying your trash or recycle bin on your computer and clearing your browser cache of temp

Read more…


The RIMS Risk Maturity Model, co-developed by LogicManager CEO, Steven Minsky, and the RIMS Risk Management Society, has been adopted by yet another governance body in an attempt to formalize how organizations achieve risk management competency.

The NAIC specifically identifies the Risk Maturity Model (RMM) as an effective tool for evaluating the state of an organizations program, and indicates that Insurers should strive to meet a ‘Repeatable’ level of Enterprise Risk Management maturity in eac

Read more…

8028230496?profile=originalThe Baker/baker complex, as illustrated in Joshua Foer’s Moonwalking with Einstein, states that if you ask one person to remember a baker and another to remember a man named Baker; the person asked to remember the proper noun will struggle far more than the person asked to recall the bread maker.

Same word, two very different outcomes because one provides your memory with context, while the other floats independently, devoid of the connections and methodology that improve our recall.

At LogicManag

Read more…

It's a Security System and More

WARNING: Removing this video surveillance camera to kill evidence of your robbery will do you chickenfeed because the video of you is being stored in the cloud!

Today’s security systems are so much more evolved than they were 20 years ago, even 10 years ago.

We’ve all heard of the bright light that goes on over the garage when someone steps onto the driveway. That’s so old that some burglars aren’t miffed by this in the least. However…such a motion detection system can also trigger video surveilla

Read more…

Identity Theft Protection 101

What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts.

Account takeover is also someone hacking into your computer and getting the password for your PayPal account, then sucking it dry. ID theft is an extremely common occurrence. The damage incurred by ID theft runs along a continuum, from light to heavy. At its worst

Read more…

How to identify Tax Scams

The IRS isn’t your biggest enemy during tax season. It’s the criminals who pretend to be IRS reps and then con people out of their money. They contact potential victims chiefly through phone calls and text messages.

Typically, the message is threatening in tone and/or content, informing the target they’ll be arrested if they don’t immediately send the IRS owed money. The threat may also be deportation or a driver’s license suspension (that last one is really silly, but people actually do fall for

Read more…

Go Two-Factor or go Home

Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.

Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain it while you’re sitting there sipping your 700-calorie latte as you use your laptop. Or, you can be tricked—via a phishing e-mail—into giving out your super strong password. The simple username/password combination is extremely

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead