All Posts (6242)

Sort by

You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission.

So how does someone steal your image or use it without your permission?

Hacking

  • Hacking is one way, especially if passwords are weak and the answers to security questions can easily be figured out (e.g., “Name of your first pet,” and on your Facebook page there’s a picture of you: “My very first dog, Snickers”).
  • Malware can be installed on you
Read more…

What are Consumer Reports?

You’ve heard the term “consumer report.” Many times, I’m sure. But do you really know what one is? If you’re nodding your head, would you be able to explain it to a Martian? If not, then you probably do not have a solid understanding of what one is.

But lenders, landlords, creditors, employers and insurers certainly know what a consumer report is, because every time they’re about to deal with a new client, they put themselves at risk.

  • Is he in good health?
  • Will she stop paying her mortgage?
  • Will he
Read more…

Objectives over three time horizons

Last Blog I wrote about how you need to understand your motivation to make sure you are answering the right question when you set your objectives. This Blog asks you to think about setting objectives over three time horizons.


My colleague Dr Andrew Pratley introduced me to the Three Horizons of Growth concept introduced by Mehrdad Baghai, Lar Bradshaw, Stephen Coley and David White in their 1999 paper in the Journal of Business Strategy. Their thesis was that in order to sustain growth you need t

Read more…
Views: 171
Comments: 0

Have a small business? Great. Have two-factor authentication for your accounts? If you’re not sure of the answer to that question, you could be in trouble. October is National Cyber Security Awareness Month, the perfect time to learn more about cyber security. As a small business owner, you certainly have thought about data breaches. They don’t just happen to giants like Target and Sony. The common thread in many data breaches is that the hackers got the password.

Once a hacker has a password, th

Read more…

Chapter 9-Project Integration of my recently published book Risk-management in the World of Threats and Opportunities: A Project Controls Perspective discusses the challenges that many Project Managers are facing. One item that throws many to fits is project integration. It is a project requirement with varying level of complexities. Some have successfully toe the line but many just fail.

Integration happens throughout the project lifecycle using continuous collaboration. It becomes a big challen

Read more…

8028236299?profile=original

Canada: The Trans-Pacific Agreement Will Sap Whatever Is Left of Our Sovereignty

Source:

 Nadia Alexan

The Canadian Charger

7 October 2015

If you really think we live in a free and independent society, think again. What sovereignty are we left with, when we have already forfeited our birthright to multinationals?

What freedom are we talking about when a private company can challenge our laws in court, according to the various so-called free-trade agreements, negotiated by our governments in secret: NA

Read more…

Retirees Prime Targets for Identity Theft

Is it easier for crooks to prey on senior citizens, or is it that most targets are the seniors?

Well, one thing’s for sure: A disproportionate percentage of identity theft complaints come from people 50-plus (though I’m sure some readers would hardly consider 50-somethings to be seniors—but you get the point).

Some scammers go after seniors because they know that many older people have a lot of money saved up. And it’s also no secret that many seniors aren’t as sharp as they used to be, and also a

Read more…

Why You Should Use a Password Manager

Most experts in cybersecurity suggest that computer users utilize a password manager, and I think they have a great point. These managers ensure that you can use a unique, strong password for all online account. On the flip side, there are naysayers that state a password manager isn’t as safe as you might think, as if the master password is discovered, it could give someone access to all of your information. So, who is right?

According to a recently concluded survey conducted by uSamp and sponsor

Read more…

Taking Control of Our Money

8028238668?profile=original

Taking Control of Our Money

Source:

Public Banking Institute

This is a great introduction to public banking. America has plenty of money--but it's all under the control of private banks. This video uses economic reality, clips from "It's a Wonderful Life," and other methods to bring home the key points that banks create the money they lend, and that the privatization of finance has been a disaster. It explains public banking's potential to lower the costs of funding public goods--because, after all

Read more…

Beware of Apple ID Phishing Scams

You may have been scammed after you responded to an e-mail that appears it came from Apple. When hackers send e-mails that appear to come from a legitimate company like Apple (or Google, Microsoft, PayPal, etc.), with the objective of tricking the recipient into typing in passwords, usernames, credit card information and other sensitive data, this is called phishing.

Many phishing scams are in circulation, including the Apple one. Hackers know that tons of people have Apple accounts. So if they r

Read more…

8028238083?profile=original

Europe to Build Up New Centers of Power

Source:

Foreign Policy Diary/South Front

Global Research, October 07, 2015

People, who believe that the European Union is a monolithic entity that conducts business that benefits individual European nations, have made a huge mistake. Today, the EU is a crumbling bureaucratic intergovernmental organization with several centers of power serving their own interests.

Each of these are seeking to convert the EU into a super state controlling Western Eurasian, exploi

Read more…

What is a Password Manager?

Many people, including myself, make mistakes with their passwords and use them on site after site. To remain safe, it’s important to use a unique, strong password on every site you visit. How do you do this the easy way? Use a password manager.

According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager, the results indicate that people have some idea of the scale of the password challenge: More than half said they felt str

Read more…

Out with old risk metric, in with the new. Welcome to Expected Shortfall

 

The Basel Committee on Banking Supervision has been revising its market risk framework since 2012.  The result of its ‘fundamental review of the trading book’ (FRTB , BCBS 219) is expected to be implemented by January 2018, with 2016-17 scheduled for calibration and testing. The consultation phase for the new regulatory framework is still ongoing and has featured several Quantitative Impact Studies, highlighting the framewo

Read more…
Views: 606
Comments: 5

8028237083?profile=original

What’s Wrong with Britain? Poor Housing, Education and Health in Crisis

Source:

Lesley Docksey

Global Research, October 05, 2015

One glance on Sunday morning at The Guardian website demonstrated quite clearly what is wrong with Britain – and, probably, the rest of the ‘developed’ world. Three major concerns of the average household were news. And all three are connected, not just to each other, but to the way this country is being run.

Housing and the ‘Right to Buy’

This country has never recovered fr

Read more…

Volkswagen has been side-stepping environmental compliance standards by “programming some diesel-fueled cars to turn on emission controls only when being tested.” In the days since this discovery, Volkswagen has been hit with over 30 federal lawsuits and 40%+ decline in stock value, all stemming from the same source—poor Enterprise Risk Management.

In this case, poor risk management regarding their investment in diesel, without developing a mitigation plan for if the technology didn’t meet emissi

Read more…

8028238056?profile=original

Sweden To Offer Employees Six Hour Working Day In Bid To Increase Productivity And Happiness

Source:

https://uk.news.yahoo.com/sweden-offer-employees-six-hour-103853070.html#0epsWC

Many businesses in the Scandinavian country have already switched from the standard eight hour day according to the Science Alert website, who say the move has been hailed a success

Swedish businesses are hoping the six hour day can increase happiness

Swedish employers are moving towards offering workers a six hour day in

Read more…

Hackers know small companies are more vulnerable to data breaches due to limited resources. Cybersecurity should always be a high priority. But when a company’s IT staff consists of maybe 1-2 people who are provided limited budgets and are constantly solving other tech problems, the focus on security suffers. And hackers aren’t the only problem. One significantly overlooked part of the security process “cleaning” the IT infrastructure.

IT staff being and small business owners must keep on top of:

Read more…

Video Replay

Chicago, Illinois Chapter Meeting 
Chief Risk Officer (CRO) Panel – Challenges in the Current Environment

Date:               Thursday, August 20, 2015

Time:               

4:00 – 4:15 p.m.   Registration

4:15 – 5:15 p.m.  Presentation

5:15 – 6:00 p.m.  Networking and refreshments

Venue:                   DePaul University Department of Finance – 1 E. Jackson Blvd., 8th Floor, Room 8005, Chicago, IL

                                 Meeting space provided by DePaul University Department of Fi

Read more…
Views: 246
Comments: 0

8028236472?profile=original

Enrique Suarez Presenting:

“Everyone Is Doing It”: How Carmakers Manipulate Emissions Test Results

Source:

Tyler DurdenGlobal

Zero Hedge 3 October 2015

With Germany’s largest company by revenue, Volkswagen, deep in damage recovery mode, and the market still unable to decide just how systemic and profound the fallout will be from the emissions scandal which has already cost the job of VW’s CEO and which according to some will impact the GDP of Hungary and the Czech republic as much as -1.5%, many are

Read more…

When you hear the dictum, “You should protect yourself from identity theft,” do you equate this with pushing a wheelbarrow loaded with rocks up a hill? It would actually be more accurate to picture slicing into a fresh apple pie, because identity theft protection is as easy as pie. Check out the following things you should do—without breaking any sweat:

RISK.jpg

  1. Examine your credit card statements once a month to catch any unauthorized charges. Even a tiny charge should not be blown off, since often, thie
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead