Criminals use six basic principles of Influence to steal. In this post we will discuss the first 3. The ability to influence boils down to science. By applying some science, anyone can learn to be more influential. It’s easy to influence sheep and cattle. It’s a bit more complicated to influence people. But many people can be influenced as easy as a cow. Criminals understand this the same way sales people do. The derivative of “confidence” is con. All influence in some way is designed to gain yo
All Posts (5913)
Sally Beauty Holdings confirmed last week that its payment card systems had been compromised, but did not disclose the extent to which data had been breached.
The Texas based retailer is the next in a string of security incidents that include Target and Sony Pictures, and comes a year following the company disclosing a breach of 25,000 customer records.
If the risk is high, and best practices of organizations like NIST, ISO, and SANS are known, then where are the gaps in these organization’s gover
Enrique Suarez Presenting:
The Myth that Japan is Broke: The World’s Largest “Debtor” is now the Largest Creditor
Source: Ellen Brown
Global Research
Japan’s massive government debt conceals massive benefits for the Japanese people, with lessons for the U.S. debt “crisis.”
In an April 2012 article in Forbes titled “If Japan Is Broke, How Is It Bailing Out Europe?”, Eamonn Fingleton pointed out the Japanese government was by far the largest single non-Eurozone contributor to the latest Euro rescue eff
Enrique Suarez Presenting:
Only One in Four Workers Worldwide Has a Stable Job
Only one quarter of the world’s working population holds a permanent and stable job, according to a new report published by the International Labor Organization (ILO) Tuesday.
Even as the number of unemployed people worldwide remains significantly higher than before the 2008 crisis, the few jobs that have been created in recent years have been disproportionately part-time,
Public Wi-Fi is the location where you can get online: airport, airplane, coffee house, hotel, motel and more. Many people don’t give this a second thought, unaware of how risky this really is.
Public Wi-Fi is very non-secure, a goldmine for hackers who want to steal your identity and commit fraud, destroy your website, you name it. They can do this many ways, including intercepting your activity with an imposter website where you input login details—that the hacker then obtains.
But public Wi-Fi
“Is Islam violent? I would say absolutely not” Professor M. Steven Fish
It is the first major scientific effort to assess how Muslims and non-Muslims differ–and do not differ–in the contemporary world.
In this book, he seeks to quantify the correlation between Islam and violence and found that murder rates are substantially lower in Muslim-majority countries and instances of political violence are no more frequent. Using rigorous methods and data drawn from around the glo
Enrique SuarezMaster of Education & International Development Harvard University Presenting: Prof. John Kozy |
|
The History of Knowledge: Darkness in the Academy
|
Enrique Suarez
Source:
Investigative Reporter Robert Parry
Scientists don’t know how many atoms and molecules there are in the Universe, but it’s clear that the vast, vast, vast majority find themselves locked in lifeless form – perhaps consumed by the fire of an exploding nova, or sucked into a black hole going who knows where, or simply frozen in the dark reaches of space.
A tiny, tiny, infinitesimal minority found themselves on Planet Earth and even there, the vast
Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim.
Cyberbullying can happen to both adults and kids, but since it’s so common among youths, it’s good to know how to help your
The primary author of the Constitution – and later president – James Madison wrote:
The great object [of political parties] should be to combat the evil: 1. By establishing a political equality among all. 2. By withholding unnecessary opportunities from a few, to increase the inequality of property, by an
Although there’s an unlimited number of ways to structure a deal, or a securities offering, the use of hybrid securities, such as; convertible notes or preferred stock, enables the entrepreneur to attract investors due to the recent ability to advertise the securities offering and compete with financial institutions for investor capital. Investors in today’s market are seeking short-term investments with relative safety and high yield. If you provide this to the investor community, you will inc
Tax ID Theft
Three things in life are guaranteed: death, taxes and tax-related identity theft. Michael Kasper would agree. Someone registered Kasper’s IRS.gov account, requested the document for his 2013 tax return, then filed a 2014 tax return.
The crook used a middleman—an innocent woman who answered his Craigslist ad for a moneymaking opportunity. He sent the money to her bank account, then she wired it to Nigeria, not knowing she was helping the crook.
Kasper’s account got busted into when the
I recently wrote this article for TheConsultantLounge. You can read the original article here: http://theconsultantlounge.com/2015/04/top-business-frameworks-for-management-consultants/.
* * * *
Business frameworks and methodologies may be a concept foreign to many business professionals, but it is one near and dear to all management consultants. As a management consultant, you will either have used many of these, or at least know what they are so you can nod in agreement when others talk about
Enrique Suarez
Source:
Andre Damon
Five major international banks are expected to plead guilty as soon as next week to criminal charges in the US related to their deliberate manipulation of global foreign exchange markets, which allowed them to rake in billions of dollars at the expense of retirees, university endowments and municipalities.
Citigroup, JPMorgan Chase, Royal Bank of Scotland Group, Barclays and UBS are expected to plead guilty to felony fraud and antitrus
LogicManager has long believed that an Enterprise Risk Management methodology, also known as a risk-based approach, is the best way of accomplishing any type of organizational governance. With risk as the common factor, governance activities become standardized and comparable, enabling better decision making.
As it turns out, the International Organization for Standardization, or ISO, agrees.
ISO 19600:2014 is a guideline for compliance management software systems, designed to establish an effecti
The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be trying to capture your login information so they can use it to access your accounts impersonating you later on.
This behavior is called “shoulder surfing”, but it doesn’t always mean that someone is literally look
Disclaimer: Much of this article is based on the PowerPoint presentation Lean Thinking 101 developed by Operational Excellence Consulting.
* * * *
Lean Management is a management philosophy based on the Toyota Production System (TPS). This management philosophy was coined "Lean" only in the 1990s. The objective of Lean Thinking is to eliminate everything that does not add value (i.e. "waste") from the customer's perspective.
The general approach to Lean is learn-by-doing and to foster a culture of
It’s the Interest, Stupid! Why Bankers Rule the World
Source:
Global Research, November 08, 2012
In the 2012 edition of Occupy Money released last week, Professor Margrit Kennedy writes that a stunning 35% to 40% of everything we buy goes to interest. This interest goes to bankers, financiers, and bondholders, who take a 35% to 40% cut of our GDP. That helps explain how wealth is systematically transferred from Main Street to Wall Street. The rich get
Did you know that, once again, Facebook has changed its privacy policies? At the top of the FB page is a lock icon. Click it for more privacy settings.
What do visitors see? To view how visitors see your Facebook page, go to “Timeline and Tagging,” then hit “Review what other people see on your timeline/View As.”
Posts by friends. Click “Timeline and Tagging” to prevent a visitor’s unwanted post from showing. Then click “Enabled,” as this will allow you to “review posts friends tag you in before t
Hackers love LinkedIn because it links them in—straight through the portal of the targeted company. Geez, how much easier could this be, what with all the publically-exposed e-mail addresses of key players (and also worker bees) in big companies that someone wants to hack.
An article on blog.sungardas.com was written by a white-hatter (his job is to try to hack his clients’ systems so that they know how to make them more impenetrable to the bad guys). The author says he’d make a beeline to Linked