All Posts (5614)

Sort by

8028237300?profile=original    

Quantitative Easing Was a Bust; Let’s Try Higher Wages Instead

 

Source:

 Mike Whitney

CounterPunch

16 October 2015

Why is the economy still in the doldrums after 6 years of zero rates and three rounds of Quantitative Easing?

It’s because consumers aren’t consuming and there’s too much debt. You see, despite the Fed’s wacko theories about pumping liquidity into the financial system to make investors feel wealthier, people actually have to buy things to generate growth. And the truth is, consumers h

Read more…

8028236882?profile=original

Public Services Under Attack through TTIP and CETA Atlantic Trade Deals

 

Source:

 Corporate Europe Observatory and Europe Observatory

12 October 2015

EU trade deals with Canada and the US could endanger citizens’ rights to basic services like water and health, as negotiators are doing the work of some of the EU’s most powerful corporate lobby groups in pushing an aggressive market opening agenda in the public sector.

Access PDF of full report in English.

Read the executive summary in EnglishFrench,

Read more…

8028237663?profile=original

Google Degenerates into Ministry of Truth; All Knowledge Must Now Be Pre-approved by Search Algorithm

Gone are the days when you could search Google and pull up neutral, relevant content appropriate to your search query. The search engine giant is reportedly pioneering a new search algorithm that will tailor search results not based on popularity or accuracy, but rather on what Google itself deems to be truthful or untruthful.

The

Read more…

If you are like me, you have several online accounts, each with a user name and password. Though it is tempting to use one password for every account, this can be troublesome as it is a huge security risk. So, what is your only option? To use a password manager.

According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager:

  • 42% write them down
  • 23% reported always using the same password**
  • 25% reported using personal information
  • O
Read more…

Protect your Identity when saying "I Do"

Who has time to think about identity protection when planning a wedding? And why, for that matter? Well, there’s good reason: Marriage begets a change in identities. The months preceding the big day should be when the couple starts taking action to avoid identity theft.

  • If you’re using any website or smartphone application to organize your wedding, make sure it’s protected with a password—a long password that contains zero clues about your wedding, identity or anything else personal. An ideal pas
Read more…

Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only opens one door.

If you are like most people, this key scenario is almost identical to the way you treat your account passwords online. What happens when you want to use a key, but you don’t know which one goes w

Read more…

Nobody likes surprises in business. Using a risk-based approach to identify your organization’s likely vulnerabilities is highly recommended and vital to short-term and long-term success. Expanding regulations make compliance increasingly complex and expensive, and increases in deficient internal audit controls have heightened scrutiny of companies by the SEC, PCAOB, and investors.

Business surprises are preventable, but there are several common issues with risk identification that can be impossi

Read more…

Beware of these 10 Job Hunting Scams

Just because a job recruiter says he’s from (fill in blank—any huge corporation) doesn’t mean the job can’t be a scam. Anyone could say they’re from Microsoft or Google. Impersonating a representative from a big-name company is one way to fool gullible job seekers.

Another way is to advertise the scam jobs on radio because the scammer knows that listeners will think, “It has to be legit if it’s on the radio.” Scammers will post their job ads anywhere.

An article on consumer.ftc.gov lists the follo

Read more…

8028238276?profile=original

The 2015 Social Media Glossary: 207 Essential Definitions

Source:

Dara Fontein

Hootsuite

Dara is a Blog Writer at Hootsuite. She writes about social media, technology, and Hootsuite happenings.

A lot can change in a year, especially in the world of social media. It can be difficult to keep up with all of the terms and slang used with the introduction of new technologies and platforms, so we decided it was time to update our Social Media Glossary. Like previous editions of the glossary, this is a livi

Read more…

Weak Passwords Mean Data Breaches

Studies across the board indicate that weak usernames and passwords are one of the top causes of data breaches, and I find that information to be unfortunate, because it is preventable. According to a recently concluded survey conducted by uSamp and sponsored by Siber Systems, creators of the RoboForm Password Manager: 70% reported forgetting a password, or had a password become compromised, in their professional life in the US.

  • More organizations are enacting policies where employees can use the
Read more…

While data breaches have dominated the news cycle, The Wall Street Journal’s “Risk and Compliance Journal,” reports that fraud is actually much more common, even if it generates fewer headlines.

6-28-2012.png?width=300In the fiscal year ending March 31st, 2015, instances of retail fraud averaged a 94% increase from the prior year when calculated by average loss of revenues. Industry reaction to this news has been relatively predictable: as many companies have decided to devote a higher percentage of their budget to pre

Read more…

8028236455?profile=original

Sweden Aims To Become The World’s First Fossil Fuel-Free Nation

Source:

 Amanda Froelich

True Activist

11 October 2015

Powered by Sweden plans to become one of the first nations in the world to thrive on 100% renewable energy.

There are quite a few things to love about Sweden. Not only is the eco-conscious nation considering implementing a ‘meat tax’ to reduce its carbon footprint, the country has literally run out of trash to incinerate for energy and, therefore, must import garbage from its neighbor

Read more…

You need not be a celebrity or some big wig to suffer the devastating fallout of your online images (and videos) being stolen or used without your permission.

So how does someone steal your image or use it without your permission?

Hacking

  • Hacking is one way, especially if passwords are weak and the answers to security questions can easily be figured out (e.g., “Name of your first pet,” and on your Facebook page there’s a picture of you: “My very first dog, Snickers”).
  • Malware can be installed on you
Read more…

What are Consumer Reports?

You’ve heard the term “consumer report.” Many times, I’m sure. But do you really know what one is? If you’re nodding your head, would you be able to explain it to a Martian? If not, then you probably do not have a solid understanding of what one is.

But lenders, landlords, creditors, employers and insurers certainly know what a consumer report is, because every time they’re about to deal with a new client, they put themselves at risk.

  • Is he in good health?
  • Will she stop paying her mortgage?
  • Will he
Read more…

Objectives over three time horizons

Last Blog I wrote about how you need to understand your motivation to make sure you are answering the right question when you set your objectives. This Blog asks you to think about setting objectives over three time horizons.


My colleague Dr Andrew Pratley introduced me to the Three Horizons of Growth concept introduced by Mehrdad Baghai, Lar Bradshaw, Stephen Coley and David White in their 1999 paper in the Journal of Business Strategy. Their thesis was that in order to sustain growth you need t

Read more…
Views: 165
Comments: 0

Have a small business? Great. Have two-factor authentication for your accounts? If you’re not sure of the answer to that question, you could be in trouble. October is National Cyber Security Awareness Month, the perfect time to learn more about cyber security. As a small business owner, you certainly have thought about data breaches. They don’t just happen to giants like Target and Sony. The common thread in many data breaches is that the hackers got the password.

Once a hacker has a password, th

Read more…

Chapter 9-Project Integration of my recently published book Risk-management in the World of Threats and Opportunities: A Project Controls Perspective discusses the challenges that many Project Managers are facing. One item that throws many to fits is project integration. It is a project requirement with varying level of complexities. Some have successfully toe the line but many just fail.

Integration happens throughout the project lifecycle using continuous collaboration. It becomes a big challen

Read more…

8028236299?profile=original

Canada: The Trans-Pacific Agreement Will Sap Whatever Is Left of Our Sovereignty

Source:

 Nadia Alexan

The Canadian Charger

7 October 2015

If you really think we live in a free and independent society, think again. What sovereignty are we left with, when we have already forfeited our birthright to multinationals?

What freedom are we talking about when a private company can challenge our laws in court, according to the various so-called free-trade agreements, negotiated by our governments in secret: NA

Read more…

Retirees Prime Targets for Identity Theft

Is it easier for crooks to prey on senior citizens, or is it that most targets are the seniors?

Well, one thing’s for sure: A disproportionate percentage of identity theft complaints come from people 50-plus (though I’m sure some readers would hardly consider 50-somethings to be seniors—but you get the point).

Some scammers go after seniors because they know that many older people have a lot of money saved up. And it’s also no secret that many seniors aren’t as sharp as they used to be, and also a

Read more…

Why You Should Use a Password Manager

Most experts in cybersecurity suggest that computer users utilize a password manager, and I think they have a great point. These managers ensure that you can use a unique, strong password for all online account. On the flip side, there are naysayers that state a password manager isn’t as safe as you might think, as if the master password is discovered, it could give someone access to all of your information. So, who is right?

According to a recently concluded survey conducted by uSamp and sponsor

Read more…

    About Us

    The GlobalRisk Community is a thriving community of risk managers and associated service providers. Our purpose is to foster business, networking and educational explorations among members. Our goal is to be the worlds premier Risk forum and contribute to better understanding of the complex world of risk.

    Business Partners

    For companies wanting to create a greater visibility for their products and services among their prospects in the Risk market: Send your business partnership request by filling in the form here!

lead