All Posts (5853)

Sort by

Go Two-Factor or go Home

Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.

Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain it while you’re sitting there sipping your 700-calorie latte as you use your laptop. Or, you can be tricked—via a phishing e-mail—into giving out your super strong password. The simple username/password combination is extremely

Read more…

Bank Account depleted, Company sues

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace.

Bank of America got back about $400,000, but the hospital is reeling because the hospital says the bank had been alerted by someone with the Chelan County Treasurer’s staff of something fishy. The bank processed a transfer reque

Read more…

8 Reasons for an Employee Handbook

8 Reasons Your Business or Church Should Have an Employee Handbook

1) Introduces Employees to the Organization’s Culture, Mission, and Values
2) Communicates to Employees What is Expected of Them
3) Educates Employees About What They Can Expect From Management and Leadership
4) Helps Ensure Key Church Policies are Clearly and Consistently Communicated
5) Showcases the Benefits the Organization Offers
6) Ensures Compliance with Federal and State Laws
7) Helps Defend Against Employee Claims
8) Lets

Read more…

8028232080?profile=original

Edward Bernays

Enrique Suarez Presents:

Edward Bernays: The Father of Public Relations and Architect of the Consumer Mind

The Century of the Self

Edward Louis Bernays was an Austrian-American pioneer in the field of public relations and propaganda, referred to in his obituary as "the father of public relations". He combined the ideas of Gustave Le Bon and Wilfred Trotter on crowd psychology with the psychoanalytical ideas of his uncle, Sigmund Freud. He felt this manipulation was necessary in societ

Read more…

The Russians have come…again—in the form of hackers. Not long ago Russian cyber criminals busted into the U.S.’s State Department system and mangled it for months.

This time, they got into a computer system at the White House. Luckily, this system did not hold any classified information, but nevertheless, the hackers got ahold of President Obama’s private itinerary. So it just goes to show you just what hackers a world away can do.

This isn’t the first time that the White House has been hacked int

Read more…

How Hackers are Hacking Smarthomes

“My house was hacked!” Had you said this 25 years ago, people would have thought a burglar vandalized it with an axe. Say it today and nearly everybody will know what you mean: A thief or prankster “broke” in to your house via its connected-to-the-Internet gadgets.

If something’s connected, like your refrigerator, the possibility of hacking exists. All of these smarthome gadgets make it to market without a lot of attention on security, leaving them with “back doors” through which hackers could en

Read more…

    SMACT.doc

 

All are requested to go through my blog on SMACT and read through the following Risks Involved:

 

1. It is fact that by 2017, Indias 75 million smartphone users will double to around 158 million.

2. India 244 million existing internet users will swell to about 350 million.

3. India is having its Digital India Intitiave under way in full swing where it connecting its 21 million villages with fibre optic

network.

4. 100 Smart City Initiave has started with a budget allocation of about $ 1.

Read more…
Views: 86
Comments: 0

Having a house run like the Jetsons’ is becoming increasingly possible: It’s called home automation. If you’re not familiar with the futuristic cartoon family, the Jetsons, just about everything in their house was automated. Today, we can have the following:

  • Sensors that make noise when a door or window opens are nothing new, but real-time video surveillance of a home’s interior and exterior, viewed remotely through a smartphone thousands of miles away, is relatively new technology.
  • Controlling th
Read more…

How to recognize Online Risks

Would you give up your bank account and credit card numbers to a stranger on the street after he approaches and asks for them? Of course not. But that’s essentially what people do when they’re tricked by online crooksters into revealing sensitive personal information, including their Social Security numbers.

One of the most common ways this is done is through phishing.

  • The phishing attack is when the thief sends out thousands of the same e-mail. If enough people receive the message, sooner or late
Read more…

What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale?

Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though this begs the question, who on earth would want a coffee mug with a photo of a stranger’s child on it, there’s actually a market for this.

Koppie Koppie has taken photos of kids from Flickr. Koppie Koppie is actually

Read more…

1 Billion Records hacked

Billions and billions—it’s only a matter of time before this becomes the number of hacking incidents in a single year, because just in 2014, over one billion records were hacked out of 1,500 different hacking incidents, says a recent report.

Some other findings from the report:

  • A little over half the breaches involved credit card numbers, Social Security numbers and other personal information.
  • Most hacking incidents occurred in the U.S.
  • 55 percent of the incidents involved retailers, primarily affec
Read more…

At the start of the year, we all made our resolutions for 2015. Now it’s March—how are you doing on your resolutions? If you’ve already broken a few, no worries; New Year’s doesn’t have the monopoly on making goals to better yourself. This is especially true with digital safety. At a time when there are so many security breaches, it’s important to commit to strengthening your digital defenses year-round.

When making goals, it’s important to emulate people who have already mastered what you’re try

Read more…

Watch Out for Tax Scams!

Spring is here (at least in some parts of the world in the northern hemisphere)! The bees are buzzing, the flowers are blooming, and the accountants are working late because for those in the U.S., it’s tax season! Scammers love tax season—there is a lot of money moving around as people pay taxes and receive tax refunds. And they have developed many ways to take advantage of that and steal your hard-earned money.

The Internal Revenue Service (IRS) maintains a list of the scams that they call the D

Read more…

Whether you’re an animal person or not, you have to admit that puppies are pretty darn cute. So cute that there are YouTube Channels, Facebook accounts, and Buzzfeed newsletters devoted to the subject. Unfortunately, there’s a not so cute PUP out in the world, and it wants access to your device. What I’m talking about is a potentially unwanted program (PUP). What is an unwanted program? It’s software or an app that you don’t explicitly want on your device. PUPs usually are bundled with freeware

Read more…

Don't be scammed into paying Back Taxes

It’s easy to scam someone who did something wrong by telling them they need to fix their mistake. This is why thousands of people get scammed into paying back taxes to the IRS—the IRS has nothing to do with these scams, of course, but the predators prey on peoples’ fear of Uncle Sam. It all begins with the fraudster making a phone call, pretending to be an IRS employee.

They have other tricks up their sleeve too, such as making the caller ID show a number that appears to be coming from the IRS an

Read more…

I remember my teachers always telling me there are no stupid questions. When it comes to identity theft, this is especially true. The more you know about identity theft, the better prepared you will be to prevent it from happening to you. Here are some commonly asked questions about identity theft.

What is identity theft?

Identity theft is when a person pretends to be you to access money, credit, medical care, and other benefits. They acquire your identity by stealing and using your personal infor

Read more…

Project Schedule, P50 Anyone?

8028231078?profile=original

Developing a schedule needs to be approached with success in mind. Dividing the project or portfolio into smaller manageable pieces called sub-projects is a good principle, a strategy acceptable and recommended in various industries. However, as the number of activity grows in the schedule, completeness, integration, and alignment challenges becomes the next hurdle. Key dates ends up not supporting each other. Probability of one activity finishing on time cancels out by the lower probability of

Read more…

Give me a break! In the next month, students will get the week off for spring break—a much needed reward after months of hard work and, for some, gnarly winter weather. Spring break means free time, family vacations, trips with friends, and timeless memories.

But, spring break can pose some risks to your online reputation and your identity. So whether you are going to party it up in the Caribbean or you are taking the kids to Disney World, here are some tips to keep you digitally safe this spring

Read more…

Here’s good advice from a sheriff’s office about how to protect your house.

Burglars and home invaders don’t give a flying hoot if you keep thinking, “It can’t happen to me and this is a safe neighborhood.” In fact, the issue isn’t how safe your neighborhood is or how watchful your neighbors are. The issue is how easy it is to simply break into your home.

Think of the other safety precautions you take daily even though the odds of an unfortunate outcome are very small, such as making sure you take

Read more…

Can an App really act as a Bodyguard?

In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.

But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in a parking garage at night?

No.

Apps meant for personal security are simply one layer of protection but in no way should be relied upon for personal protection. I mean, come on!!!! IT’S AN APP!!!!!!!

For the iPho

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead