All Posts (5985)

Sort by

8028231276?profile=originalThe Risk and Insurance Management Society (RIMS) has released two executive reports, “Why a Mature ERM Effort is Worth the Investment” and “Testing Value Creation through ERM Maturity.” Together, these reports look at recent findings that detail the benefits of investing in enterprise risk management.

Despite evidence that mature ERM programs add significant value, manyorganizations remain hesitant when it comes to adopting a software and streamlining their ERM processes.

Below, we have outlined t

Read more…
Views: 97
Comments: 0

How Will You Measure Your Life?

8028231664?profile=original

Enrique Suarez Presenting:

How Will You Measure Your Life?

 

By:

Clayton M. Christensen

Before I published The Innovator’s Dilemma, I got a call from Andrew Grove, then the chairman of Intel. He had read one of my early papers about disruptive technology, and he asked if I could talk to his direct reports and explain my research and what it implied for Intel. Excited, I flew to Silicon Valley and showed up at the appointed time, only to have Grove say, “Look, stuff has happened. We have only 10 minut

Read more…

It’s hard to believe that, according to a recent poll from the Pew Research Center, most Americans aren’t too upset that the government can track their e-mails and phone calls. There’s too much of a blasé attitude, it seems, with people thinking, “I don’t care if I’m monitored; I have nothing to hide.”

This blows it for those of us who actually DO mind that the government is snooping around in our communications, even if we’re as innocent as a butterfly.

Privacy experts believe that governmental m

Read more…

Vaccines and National Security

8028229498?profile=originalEnrique Suarez Presenting:

Ulson Gunnar
Global Research, May 05, 2015

One can easily see in the emerging information and cyber war that a nation having its own IT infrastructure, its own hardware, and its own versions of social media platforms is quickly becoming a matter of national security. Without control over these assets, a nation must depend on foreign suppliers for their computers, peripheries and software. Already, this dependence has opened nations up to now evident threats including malw

Read more…

Beware every time the Phone rings

Don’t assume you’ll never be targeted by phone scammers just because you don’t have a cell phone; they continue to feast on landline users, especially those over 50.

“This is the IRS…”

  • Drill this into your head: The IRS never calls to collect back taxes. NEVER.
  • A common ploy is to threaten that the listener will go to prison if they don’t pay up immediately.
  • If you really do owe taxes, the IRS will contact you alright—but via snail mail, not a phone call, text or e-mail.
  • Scam calls may also sound pro
Read more…

8028231501?profile=originalEnrique Suarez Introducing:

Washington's Blog
Global Research, May 04, 2015

We Can’t Rein In the Banks If We Can’t Pull Our Money Out of Them

Martin Armstrong summarizes the headway being made to ban cash,  and argues that the goal of those pushing a cashless society is to prevent bank runs … and increase their control. What do you think?

The central banks are … planning drastic restrictions on cash itself. They see moving to electronic money will first eliminate the underground economy, but secondly

Read more…

Enterprise Risk Management (ERM) Software, unfortunately, is a poorly defined (and often poorly executed) concept, but by structuring your vendor selection around the core concepts of Enterprise Risk Management, Risk Managers can mitigate the inherent risks that accompany a software implementation.

Common Pitfalls of ERM Programs

The common maturity process of an ERM programs looks something like this: define our purpose with an ERM charter, define our process, and then seek automation to support

Read more…

So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker.

recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions.

One of the things that make it easy to trick employees into giving up critical information is the information employees share on social media about their company.

People just fre

Read more…

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.

So how devastating would it be if someone got a hold of your social media accounts?

They could really wreak some havoc, like sending dirty links to all of your followers on Twitter. Or worse, take personal

Read more…

8028234853?profile=original

Enrique Suarez Introducing to:

Matthias Chang

The original article appeared on Global Research on July 08, 2013

Excess Reserves at the Federal Reserve. One of The Biggest Financial Scams In History: A Whopping US$1.794 Trillion

Banks’ excess reserves at FED is one of the biggest scam by the FED and there is a conspiracy of silence as to its actual implications. Economists and financial analysts spewing nonsense to mislead and divert attention to non-issues so that the public is kept in the dark.

The

Read more…

What is Spam?

Everyone’s heard of spam as it pertains to emails. Spam isn’t necessarily a malicious message designed to trick you into revealing your credit card number or PayPal login information.

But spam is an unsolicited message, sometimes referred to as junk mail. Spam can be very annoying and relentless in nature, often attempting to convince you to buy something. Sometimes these messages are untruthful, such as those advertising human growth hormone pills (when they actually contain nothing of the sort)

Read more…

Burglars don’t usually depend upon the light of the moon to break into homes; they depend on the daylight—because that’s when they know most homes are empty! The kids are in school, the adults are at jobs or shopping…duhhh, even a halfwit burglar knows this is an opportune time!

Therefore, you should get a home security system that’s designed to repel robbers in both the dead of day, not just night. This includes while you’re home. And when you are home, a burglary turns into a “home Invasion” wh

Read more…

8028231254?profile=original

Presented

By:

Enrique Suarez

 

Why Public Banks Outperform Private Banks: Unfair Competition or a Better Mousetrap?

Public banks in North Dakota, Germany and Switzerland have been shown to outperform their private counterparts. International private competitors have responded by pushing for regulations limiting the advantages of the public banking model, but public banking advocates are pushing back.

In November 2014, the Wall Street Journal reported that the Bank of North Dakota (BND), the nation’s o

Read more…

8028230883?profile=originalPresented by:

Enrique Suarez

http://www.wix.com/suarezenrique/delta

School children in Nepal’s Matatirtha village practice an earthquake drill in the event of a natural disaster. A 7.8-magnitude earthquake in Nepal on Apr. 25, 2015, has endangered the lives of close to a million children. Credit: Department of Foreign Affairs and Trade/CC-BY-2.0

8028231065?profile=original

UNITED NATIONS – The death toll has now passed 3,300, and there is no telling how much farther it will climb. Search and rescue operations in Nepal entered

Read more…
Views: 101
Comments: 0

Protect Yourself from Online Fraud

Yes, it’s possible: preventing fraudsters from getting you via online trickery and other stealthy actions. Yes, it’s possible to be thinking one step ahead of cyber criminals. Let’s begin with e-mails—the conduit through which so many cyber crimes like ID theft occur.

  • Imagine snail-mailing vital information like your SSN, bank account number, a duplicate of your driver’s license and your credit card number. At some point in the delivery process, someone opens the letter and see the contents. Elec
Read more…

Trolls get Dose of Reality

Well, you know that old saying: The viciousness of an online bully’s attack is inversely proportional to the size of his (you fill in the blank), I was thinking ego.

Many online bullies are female, but in the case of former Red Sox pitcher Curt Schilling’s daughter, the trolls are collectively male.

Recently Schilling tweeted how proud he was that his daughter, Gabby, will be playing softball as a pitcher for Salve Regina University. Schilling got a lot of responses. And some were disgusting, incl

Read more…

Risk Leadership: What is the purpose of a policy or a framework?

 

I have seen many, many corporate policies and frameworks in my time.  The one great tendency of the authors of policies and frameworks is to put way too much information into them.

The other day I decided to sit down and sort out the difference between a policy, a framework and “the rest” of the information that one needs to provide so that the intent of the policy can be fulfilled.  I hope this helps clear it up in your head if you

Read more…
Views: 84
Comments: 0

Who Really Controls the World?

8028231692?profile=original

Enrique Suarez Introducing:

Prof. Dr. MUJAHID KAMRAN is Vice Chancellor, University of the Punjab, Lahore, Pakistan

Since I entered politics, I have chiefly had men’s views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they better not speak above their breath when they speak in co

Read more…

5 Online Security Tips You need to know

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.

Passwords

  • Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each account. But people—including those who’ve been around for a long time—continue using the same password and ridiculously weak passwords, like password1 and princess.
  • A v
Read more…

6 Ways to halt Online Tracking

“On the Internet, you can be ANYBODY!”

Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.

  • Don’t feel you must use your full, real name when filling out forms or whatever, just because it’s asked or even a “required field.” Of course, you’ll want to use your real name when registering online with a bank, for instance, or making a purchase
Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead