All Posts (6122)

Sort by

What is a Rootkit?

A rootkit is a kind of software that conceals malware from standard detection methods. A good analogy for a rootkit would be a burglar breaking into your house. The burglar is dressed all in black, so that his form blends into the darkness. He tiptoes around to hide his sounds so he’s more likely to go undetected as he steals your belongings. But unlike the burglar, who usually takes your stuff and leaves, an efficient rootkit can stick around for years doing its work, robbing your computer or m

Read more…

12 Home Security Mistakes We Make

Smart criminals love dumb homeowners, but even a dumb burglar can score big when the homeowner makes just a little slip in security measures.

3B.jpg

  1. Don’t nickel-and-dime your door locks; get high quality locks. A cheap lock is cheap.
  2. Don’t hide keys. Anyone knows to check under the flower pot or on top of the ledge above the door frame. Consider a keyless lock.
  3. Make sure valuables aren’t visible through windows—including those of your car.
  4. Flatten boxes that valuables came in like flat screen TVs so that
Read more…

Having the Privacy Talk with your Kids

Years ago, having “the talk” with your kids meant telling them where babies come from. Nowadays, “the talk” has a whole new meaning. Your kids may be able to explain in detail how a baby is created, but may be clueless (because so many adults are) about something called “data permanence.”

2P.jpg Don’t beat around the bush. Tell your kid outright, “If you post any racy images of yourself online—it will be there for the next million years for anyone to see. And it can be used against you.” Give this same

Read more…

Everyone’s talking about future workplace. We all know where it’s heading – people-power, social networking, crowdsourcing, limitless connectivity and a workforce that is contingent (self-employed in some form) and virtualized (anytime, anywhere). But what about the HR team - its leadership? In a people-power world, what does it look like?

HR won’t exist in its current guise for very long 
Look at HR. Still knee-deep in paper. Still knee-deep in ops. The promised digitization of the back office is

Read more…

Fixing a Credit Report after being hacked

First off, how NOT to fix a hacked credit report: signing on with a service that promises to correct the problem in a jiffy—a “sounds too good to be true” advertisement. A company that claims they will 100% fix your bad credit by removing negative information from your credit report is a bit scammy. In fact, whatever a credit repair company CAN legally do, you yourself can do.

3D.jpg

Tips to Know Ahead of Time

  • If a company takes action against you, you’re entitled to a free credit report if you request i
Read more…

Data Breach Aftermath

Haste certainly doesn’t make waste if you’ve suffered from an entity getting hacked resulting in a data breach. Don’t waste a single minute delaying notifying affected accounts! In the case of a credit card company, they will investigate; you won’t have to pay the fraudulent charges. The breached card will be closed, and you’ll get a new one. And there is more.

11D.jpg

All sounds simple enough, but the experience can be a major hassle. Below is what you should do upon learning your card has been breached

Read more…

Spy on your Kids yes or no

It’s one thing to bust into your kid’s diary and read it, but if your kids want the privilege of engaging in the cyber world, they need to understand that parents are justified in “spying” on them. Or are they? Depends on whom you ask and how far they go at “spying” on their kids.

2015-01-29-2W-thumb.jpg

Frankly It’s not spying at all and both kids and parents should get over it. It’s called parenting. My kids are still young, but as they get older there will be hardly a thing they do online that I won’t be aware of. Th

Read more…

Twenty-seven Inspiring Quotes about Life and the Current World’s Condition and Comments by Enrique Suarez

http://www.wix.com/suarezenrique/delta

suarezenrique@yahoo.com

 

1. "And those who were seen dancing were thought to be insane by those who could not hear the music." - Friedrich Nietzsche

Comment: very powerful message that applies 100% in my life when I am connected with my inner being and when I say that peace supersedes prosperity and not the other way around. When human beings know themselve

Read more…

Interview with William Meehan, Executive Director, Capital Markets Trading Compliance at CIBC

The Volcker rule was published in December 2013 by US regulators and requires banks with over $10B trading assets and liabilities to prove that they are not participating in proprietary trading through the reporting requirements. It is a new regulation which has limited guidance from the regulators, causing confusion among banks. At the current time, the main focus for banks is to better understand the V

Read more…

Survival is about being Persistent

“Survivor.” What comes to mind when you see or hear this word? A victim of a disease or of a perverted crime? A TV show? We’re all survivors in that every day, we do something to stay alive—life-saving things we don’t even think about as life-saving, such as eating healthy and exercising. People die every day from killing themselves with food.

tumblr_inline_niw24gMjMV1qa344h.jpg

Survival also may conjure up true spectacular stories of survival, like the man who cut off his arm to free himself from a boulder because he was starving

Read more…

Researcher says HTTPS can track You

Perhaps you’ve read that “HTTPS” at the start of a website address means that the site is secure, encrypted. However, a feature of the HTTPS can track you, says an article at theregister.co.uk.

tumblr_inline_niu7qg4Vtm1qa344h.jpg

HTTP is not secure. Carnegie Mellon University in a Register article states “HSTS”, which is “Strict Transport Security”  redirects users to HTTPS. The HSTS authors decided that this redirection every single time was a bit much, so they came up with a feature that browsers could remember regarding the HSTS

Read more…

ScreenHunter_200-Jan.-26-15.59.jpg?width=300Last week, Insurance News Net’s Trish Ennis examined the relationship between occupational  health, safety risk management and reputational risk.

Texas City refinery. Upper Big Branch mine. Deepwater Horizon. Tazreen Fashions factory. Rana Plaza. Each of these tragedies was caused by a chain of events that included safety and health system deficiencies. They have something else in common, too: They all caused significant damage to the reputations of the organizations involved.”

Ennis highlights an

Read more…

What is ATM Skimming?

Ever hear of a crime called skimming? It may not be as dramatic a crime as assault or Ponzi schemes, but it can cause significant problems to you as your  savings account can be wiped out in a flash.

tumblr_inline_niqy05Zi1S1qa344h.jpg

Picture a scrawny nerd tampering with an automated teller machine (ATM)—the machine you use with your debit card to get cash. The thief places a device over the slot through which you slide your debit card. You have no idea it’s there. You swipe your card, and the device “skims” or reads your card’s

Read more…

Smartphones are picking up popularity. You can now access email, social media, and other things from a device that fits in your pocket (most of the time). And, although we hear about breaches and security flaws in the news, it seems like a lot of us don’t think it applies to our mobile device. Here are some of the most common mobile security myths.

tumblr_inline_niomokY2oh1qa344h.jpg

  1. “Antivirus protection isn’t worth it for a smartphone.” Just because this device fits in the palm of your hand doesn’t mean it’s not worthy of as much
Read more…

8028230091?profile=original

When we talk about probability and risk as they relate to healthcare they are two terms that often get confused and misused. In November 2014 I attended a National Press Club luncheon featuring Anthony Fauci, M.D., director of the National Institute of Allergy and Infectious Diseases (NIAID).[1] I attended Dr. Fauci’s lecture focused on the Ebola outbreak. As a Laboratorian and Health Educator there were many questions that I wanted to pose and gain knowledge on how the world was responding to t

Read more…

Feds warn of more Online Predators

What goes on in the home life of a 14-year-old girl such that she feels there’s nothing better to do than send nude photos of herself to a man whom she’s been corresponding with online? Though this goes well-beyond the parents not bothering to find out what their kids do online, another huge issue is the proliferation of online predators.

tumblr_inline_nij30dCpJX1qa344h.jpg

And for parents who DO care enough to monitor their kids’ cyber activities, here’s some unsettling news: A 2013 survey called  Digital Deception: Exploring the

Read more…

Fingerprint hacked by a Photo

You can’t change your fingerprint like you can change your password. But why would you want to change your fingerprint? The thought might cross your mind if your fingerprint gets stolen.

tumblr_inline_nih8te3A9n1qa344h.jpg

How the heck can this happen? Ask Starbug. He’s a hacker who demonstrated just how this could happen at an annual meeting of hackers called the Chaos Communication Congress, says an article at thegardian.com. His “victim” was defense minister Ursula von der Leyen.

Starbug (real name Jan Krissler) used VeriFinger,

Read more…

iStock_000028942762Small-500x366.jpg?width=300One of the most frequently cited differences between Software-as-a-Service (SaaS) and On-Premise installations is the degree of flexibility between each type of solution. With SaaS solutions on the rise for GRC and Risk Management Software, more and more organizations are realizing that everything they thought they understood about the differences between SaaS and On-Premise is wrong. So what can we learn from their mistakes?

A Conflict of Interest

On-Premise vendors make about 50% of their revenu

Read more…

1. Death is something inevitable. When a man has done what he considers to be his duty to his people and his country, he can rest in peace. I think I have made that effort and that, therefore, I will sleep for eternity.

Lessons: Understand that being alive is an opportunity to celebrate the divine within us and therefore the divine in others. The main duty of a human being is to recognize that for dignity and prosperity to be realized, peace should be felt first for it is within us in every breat

Read more…

8028230091?profile=originalMost people think of Risk Management in terms of finance, insurance and business. In healthcare, Risk Management seeks out errors with the potential to cause human harm. Risk Management consists of identifying, evaluating, and controlling the risk of these potential errors through a variety of quality control measures that become your medical practices’ Quality Control Plan. Risk Management is defined in ISO 14971 as the “systematic application of management policies, procedures, and practices t

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead