All Posts (6457)

Sort by

At LogicManager, we are firm believers that embracing risk management can result in two boons: ease of mind and success. On a related note, we recently came across an article by Carl Richards in The New York Times titled “For True Freedom, Learn to Deal with Uncertainty.

“Right now, I’m working really hard on both having goals and accepting the reality of uncertainty,” Richards says. “In fact, I embrace the uncertainty and say to myself, ‘given that goal, and given the uncertainty, what’s to be

Read more…

How to unsend or cancel an E-mail

If the person you are sending an e-mail to pretty much instantaneously receives it, how on earth can you unsend or cancel it? Well, you have several options.

Criptext

  • This is a browser plug-in that works for Chrome and Safari.
  • Your message including attachments will be encrypted.
  • You will know when it’s been opened.
  • You can recall messages and assign them expiration times. The recall, of course, comes after the recipient has possibly opened the message, but if they’re, for instance, away from their c
Read more…

Stop being a blabber on Social Media

Are you a cyber-blabber? Even a post about your daily afternoon foray to the sub sandwich shop could get you in trouble: A burglar reading this knows when to rob your house. But it doesn’t end there. STOP THE MADNESS!

The Giants: Facebook and Twitter

  • Be careful what you post on Facebook and tweet about. It can be used against you in court, even something as innocuous as: “I’m training for my very first 10K.” Not good if you’re suing someone who hit your car for back pain and suffering.
  • Lawyers will
Read more…

8028245881?profile=original

The Runaway Derivatives Time Bomb: A 1,200 Trillion Dollar Derivative Market, Big Banks Manipulate Interest Rates, Currency Markets, Commodity Markets…

 

Source:

Washington's Blog

This short, incisive article was originally published on Washington’s Blog in 2014. It deals with the “criminality” and “blatant manipulation” of Wall Street and gives us a better idea as to why the global economy is in such a catastrophic state.

Runaway derivatives – especially credit default swaps (CDS) – were one of them

Read more…

15 Ways to protect your Identity

There are tried and true ways to protect yourself from identity theft—ways that you may not have even considered. Check them out (no specific order):

  1. Evaluate your passwords. Does every online account have a different password or are you using the same one for multiple accounts? Fix this problem immediately.
  2. However, make the new passwords at least eight characters ideally, and include symbols, not just letters and numbers. Avoid using actual words or names, or keyboard sequences. Password-crackin
Read more…

8028240098?profile=original

Who Owns the Federal Reserve Bank—and Why is It Shrouded in Myths and Mysteries?

Source:

Read more…

Last blog I wrote about working with our tendency for impulsiveness. Which can lead to one hell of a fun ride and other times can lead to regret.

Counter this with the fear of making the wrong decision. Sometimes we are so uncertain as to the right decision we are frozen and unable to decide. We fear regret. The regret of pain and suffering or the regret that we missed out on a fantastic opportunity.

Creating angst over a decision is fine IF there is a hard deadline to make the decision. Eventuall

Read more…
Views: 51
Comments: 0

Cybersecurity a “Must” for Credit Unions

Credit union online news agency CUInsight.com recently published an article declaring cybersecurity a “must” for credit unions. In support of its position, author Stuart Levine cites more than 400 incidents – recorded by the Identity Theft Resource center in 2015 – putting at least 80 million records at risk and tallying costs in excess of $100 million for the targeted organization.

What’s the best way for credit unions to tackle cybersecurity risk management? The author suggests credit unions st

Read more…

The season of giving is now upon us — but don’t forget, it’s also the season of stealing — and no, I don’t mean your wallet or the gift package at your doorstep, but your Social Security number, credit card information, medical records and any other highly confidential information that you have stored on your computers.

Thieves want your data — the information stored in your smartphone, laptop and other devices. People are especially vulnerable to this crime when they travel. Don’t let the hustle

Read more…

Should Stalking or Spying Apps be banned?

The words “spying” and “stalking” have negative connotations, but there’s a flipside to the coin: parents monitoring their kids’ online activities and physical locations. And how about middle-aged adults keeping track of the whereabouts of their aged parents with dementia?

If you fear that apps for “spying” might get banned, here’s bad news: U.S. Senator Al Franken is pushing for this.

However, Franken’s proposed law will actually permit these constructive uses. His plan is to require companies to

Read more…

Even though the highly publicized retail data breaches have involved off-line brick and mortar stores, this doesn’t mean that security is high with online shopping. Scammers and hackers are waiting for you in more ways than you know, such as:

  • Fake product reviews
  • Non-existent products
  • Delivered products that don’t match what was seen on the retail site
  • Shoppers being tricked into typing their credit card information into a purchase form on a phony shopping site
  • Malicious attachments and phishing emai
Read more…

Keep Accountant happy and Thieves out

Are you a shredder? I hope so. No identity thief on this planet is going to want to attempt to reconstruct cross-shredded documents.

So what, then, should you make a habit of shredding?

  • All financial documents and information, including financial information you’ve jotted on a Post-it note.
  • Credit card receipts unless you want to file these away for end-of-month calculations, but ultimately, you have your monthly statements so you will not have use for them anyways.
  • Old property tax statements (keep
Read more…

In light of recent events, the Environmental Protection Agency is using new monitoring techniques to evaluate the quality of companies’ classifications and reporting of hazardous materials. Ironically, as we all learned recently, even the EPA itself isn’t immune to catastrophic, if preventable, mistakes. New compliance regulations increase the importance of standardized risk identification, mitigation, and monitoring strategies.

Two takeaways from this new development:

  1. A variety of companies, part
Read more…

Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined.

If you try to make a purchase overseas, your credit card company might think it’s fraudulent, since it would appear anomalous, relative to your usual, U.S. purchases.

So before you leave for your trip:

  • Back up credit card data. It’s always important to have a backup of your card data, both online and in print
Read more…

How to stop Teenage Sexting

Sexting is the act of sending images of a sexual nature via cell phone, often naked pictures. Because texting technology is so readily available and easy to understand, parents should be quite leery of telling themselves, “Oh, MY kid would never do that!” Studies showy your kid already did it. 12-17 year olds sext. And studies show 50-75 year olds do it as much as 18-25 year olds. Picture that!

Sexting is not the same as when a teen shows a naked Polaroid photo to the crowd huddled in front of th

Read more…

iStock_000016259437Small-500x332.jpg?width=249Despite the growing necessity of robust risk management software for companies of all sizes, it’s easy to think of risk solutions as akin to insurance, like guardrails that prevent a vehicle from careening off a narrow mountain road; the thought of actually needing them in the event of a failure is too unsettling to dwell on.

That functionality is of course important, but what about day-to-day operations and costs? An efficient risk management process starts with identifying and assessing risks a

Read more…

Secure your home for the holidays

The holiday season is ramping up. And so are burglars. Even if you don’t get very festive, burglars may still target your home. Your dark, unlit home among all the dazzling festive homes will stick out like a sore thumb. Whether you have 10,000 decorative lights on or none, here’s what to do:

  • Keep all possible entrances (even the second-story window next to the big tree branches) locked at all times with high quality locks in excellent working condition.
  • Put reinforcements on your doors so that th
Read more…

Banking in Theory and Practice

8028243074?profile=original

Banking in Theory and Practice

Source:


Mejstřík Michal - Pečená Magda - Teplý Petr

Karolinum 2015

Published: March 2015

This new bilingual banking textbook awarded by Charles University as a best textbook within socio-economic field and humanities.

You can read the entire article in the following link:

https://www.linkedin.com/pulse/banking-theory-practice-michal-mejstrik?trk=hb_ntf_MEGAPHONE_ARTICLE_POST

Read more…

8028232695?profile=original

Reinventing Banking: From Russia to Iceland to Ecuador

 

Source:

Ellen Brown

EllenBrown.com 11 December 2015

Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items:


◾In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles.
◾In Iceland, the booms and busts culminating in th

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead