All Posts (6368)

Sort by

Who Really Controls the World?

8028231692?profile=original

Enrique Suarez Introducing:

Prof. Dr. MUJAHID KAMRAN is Vice Chancellor, University of the Punjab, Lahore, Pakistan

Since I entered politics, I have chiefly had men’s views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they better not speak above their breath when they speak in co

Read more…

5 Online Security Tips You need to know

It’s up to the potential victim—the user—YOU—to make your computer or smartphone very difficult for Joe Hackster to infiltrate.

Passwords

  • Being that cyber crime has been a fixture of modern living for over a decade, you’d think that everyone and his brother would know to use strong, long passwords, and a different password for each account. But people—including those who’ve been around for a long time—continue using the same password and ridiculously weak passwords, like password1 and princess.
  • A v
Read more…

6 Ways to halt Online Tracking

“On the Internet, you can be ANYBODY!”

Not quite. Remaining anonymous in cyber space isn’t as easy as it used to be. Your browsing habits can be tracked, leading to your true identity. But there are things you can do to remain as anonymous as possible.

  • Don’t feel you must use your full, real name when filling out forms or whatever, just because it’s asked or even a “required field.” Of course, you’ll want to use your real name when registering online with a bank, for instance, or making a purchase
Read more…

Lost your Master Password, do This

You have a master password, from your password manager, for 28 accounts. Life has been so easy since!

But then you lose this master password. First off, you can’t fix this like you would if you forgot your password for PayPal or your credit card’s site. Plus, each password manager service has a different solution.

Yet how do you lose a master password in the first place? If it’s impossible to remember,then it may not be a good master password, regardless it should be written down somewhere in a se

Read more…

What is a Virus?

Have you ever had the chicken pox? This common childhood illness has another name—the varicella zoster virus. Like all viruses, varicella replicates itself, spreading though the body, and eventually appearing as itchy red blisters all over the body. But the virus doesn’t stop there; it can spread to other people through physical contact and through the air when an infected person coughs or sneezes. It’s not a very fun illness to have.

Viruses don’t just affect humans; there are viruses that can a

Read more…

8028233263?profile=originalPresented by:

Enrique Suarez

http://www.wix.com/suarezenrique/delta

Why Universal Poverty is the Only Sensible Choice for Humanity

 

Source: Kevin Karn, 2013

It's easy to show that the best course for the future of mankind is to reduce everyone in the world to poverty. To see this, examine the diagram below:

 

The diagram shows three possible income/wealth distribution scenarios for the world: the bottom scenario where everyone in the world is living in poverty; the middle scenario, where most of the wo

Read more…

8028232867?profile=originalGabor Mate

Presented by:

Enrique Suarez

An Interview on Health and Politics

Doctor Gabor Maté is the award-winning author of the books When the Body Says No, Hold On To Your Kids, and In the Realm of Hungry Ghosts. He was recently invited to speak at a conference of the Saskatoon Tribal Council, which includes seven Saskatchewan First Nations. Mr. Meili took the opportunity to interview Dr. Maté about his writing and the intersection between health and

Read more…

The Purpose of an Organization

8028231890?profile=originalHenry Ford

Edwards Deming described the purpose of an organization in New Economics, on page 51, as:

"The aim proposed here for any organization is for everybody to gain - stockholders, employees, suppliers, customers, community, the environment - over the long term."

Like so much of what Deming said that makes sense to me. It is my sense the "conventional wisdom" would state something more along the lines of the purpose of a company is to make money. I would not agree. Rewarding the owners is impo

Read more…

Keyloggers log wirelessly

Gee, it sounds like something out of one of those 1970s TV shows about government spies, but it’s reality: Plug this little thing into a wall socket and it records the keystrokes of a person nearby typing into a Microsoft wireless keyboard. The little gadget sends the information back to the gadget’s owner over the Internet.

The device looks like a USB wall charger, and this “KeySweeper” can be created with instructions from Samy Kamkar, a hardware hacker and security researcher who developed the

Read more…

Spring is in the air (if you’re in the northern hemisphere) and it’s traditionally a time to clean every nook and cranny and get rid of excess stuff in your house. But it’s also a good time to clean up your digital life. Just like your house, your digital life needs a good cleaning once in a while, but sometimes this can seem like a daunting task, so here’s some tips for you to get started.

First, begin by emptying your trash or recycle bin on your computer and clearing your browser cache of temp

Read more…


The RIMS Risk Maturity Model, co-developed by LogicManager CEO, Steven Minsky, and the RIMS Risk Management Society, has been adopted by yet another governance body in an attempt to formalize how organizations achieve risk management competency.

The NAIC specifically identifies the Risk Maturity Model (RMM) as an effective tool for evaluating the state of an organizations program, and indicates that Insurers should strive to meet a ‘Repeatable’ level of Enterprise Risk Management maturity in eac

Read more…

8028230496?profile=originalThe Baker/baker complex, as illustrated in Joshua Foer’s Moonwalking with Einstein, states that if you ask one person to remember a baker and another to remember a man named Baker; the person asked to remember the proper noun will struggle far more than the person asked to recall the bread maker.

Same word, two very different outcomes because one provides your memory with context, while the other floats independently, devoid of the connections and methodology that improve our recall.

At LogicManag

Read more…

It's a Security System and More

WARNING: Removing this video surveillance camera to kill evidence of your robbery will do you chickenfeed because the video of you is being stored in the cloud!

Today’s security systems are so much more evolved than they were 20 years ago, even 10 years ago.

We’ve all heard of the bright light that goes on over the garage when someone steps onto the driveway. That’s so old that some burglars aren’t miffed by this in the least. However…such a motion detection system can also trigger video surveilla

Read more…

Identity Theft Protection 101

What’s it called if, for example, someone runs up your credit card line without your permission? Identity theft. ID theft isn’t necessarily someone going around impersonating you. But it is considered someone taking over your accounts.

Account takeover is also someone hacking into your computer and getting the password for your PayPal account, then sucking it dry. ID theft is an extremely common occurrence. The damage incurred by ID theft runs along a continuum, from light to heavy. At its worst

Read more…

How to identify Tax Scams

The IRS isn’t your biggest enemy during tax season. It’s the criminals who pretend to be IRS reps and then con people out of their money. They contact potential victims chiefly through phone calls and text messages.

Typically, the message is threatening in tone and/or content, informing the target they’ll be arrested if they don’t immediately send the IRS owed money. The threat may also be deportation or a driver’s license suspension (that last one is really silly, but people actually do fall for

Read more…

Go Two-Factor or go Home

Logins that require only a password are not secure. What if someone gets your password? They can log in, and the site won’t know it’s not you.

Think nobody could guess your 15-character password of mumbo-jumbo? It’s still possible: A keylogger or visual hacker could obtain it while you’re sitting there sipping your 700-calorie latte as you use your laptop. Or, you can be tricked—via a phishing e-mail—into giving out your super strong password. The simple username/password combination is extremely

Read more…

Bank Account depleted, Company sues

Is it Bank of America’s fault that a hospital was hacked and lost over a million dollars? Chelan County Hospital No. 1 certainly thinks so, reports an article on krebsonsecurity.com. In 2013, the payroll accounts of the Washington hospital were broken into via cyberspace.

Bank of America got back about $400,000, but the hospital is reeling because the hospital says the bank had been alerted by someone with the Chelan County Treasurer’s staff of something fishy. The bank processed a transfer reque

Read more…

8 Reasons for an Employee Handbook

8 Reasons Your Business or Church Should Have an Employee Handbook

1) Introduces Employees to the Organization’s Culture, Mission, and Values
2) Communicates to Employees What is Expected of Them
3) Educates Employees About What They Can Expect From Management and Leadership
4) Helps Ensure Key Church Policies are Clearly and Consistently Communicated
5) Showcases the Benefits the Organization Offers
6) Ensures Compliance with Federal and State Laws
7) Helps Defend Against Employee Claims
8) Lets

Read more…

8028232080?profile=original

Edward Bernays

Enrique Suarez Presents:

Edward Bernays: The Father of Public Relations and Architect of the Consumer Mind

The Century of the Self

Edward Louis Bernays was an Austrian-American pioneer in the field of public relations and propaganda, referred to in his obituary as "the father of public relations". He combined the ideas of Gustave Le Bon and Wilfred Trotter on crowd psychology with the psychoanalytical ideas of his uncle, Sigmund Freud. He felt this manipulation was necessary in societ

Read more…

The Russians have come…again—in the form of hackers. Not long ago Russian cyber criminals busted into the U.S.’s State Department system and mangled it for months.

This time, they got into a computer system at the White House. Luckily, this system did not hold any classified information, but nevertheless, the hackers got ahold of President Obama’s private itinerary. So it just goes to show you just what hackers a world away can do.

This isn’t the first time that the White House has been hacked int

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead