First Business


Topic: Risk Management

The open source way of being

Open source software is now the shortest route to bringing innovation to market. When through word of mouth millions of developers discover and download exciting new code under an open source license and put it to task, you can almost feel the world’s technology baseline click up a notch. But does the profound effect of open source stop there

Read Full Article
Source: InfoWorld


Topic: Risk Management

How to Create a Super Strong Password

By now you should know that "123456" is not a smart password. If you’re still using a weak password like that gaping sieve -- and haven’t even changed all your online passwords since news of the wretched Heartbleed SSL vulnerability broke -- you’re hacker bait.

Read Full Article
Source: Entrepreneur


Topic: Risk Management

Which Windows operating system am I running?

Are you using Windows XP? Not sure? This link from Microsoft will auto-detect your operating system and let you know what you’re running.

Read Full Article
Source: Microsoft


Topic: Risk Management

Windows XP Isn't Safe to Use Anymore. Here's What to Do Next.

Despite Microsoft’s best efforts to convince everyone to upgrade to a newer version of Windows, Windows XP is still running on nearly 28% of all computers connected to the Internet. That’s a lot of computers and users. So what can those users do now?

Read Full Article
Source: Mashable


Topic: Risk Management

The Heartbleed Hit List: The Passwords You Need to Change Right Now

An encryption flaw called the Heartbleed bug is already being called one of the biggest security threats the Internet has ever seen. The bug has affected many popular websites and services ones you might use every day, like Gmail and Facebook and could have quietly exposed your sensitive account information (such as passwords and credit card numbers) over the past two years.

Read Full Article
Source: Mashable


Topic: Risk Management

FAQs on the "Heartbleed Bug"

Heartbleed is a flaw in the programming on secure websites that could put your personal information at risk, including passwords, credit card information and e-mails.

Read Full Article
Source: American Bankers Association


Topic: Risk Management

The Unintended Consequences When Workers Bring Their Devices to Work

HR can play a front-and-center role in managing the unintended consequences of tension and mistrust by working with IT to create policies that balance the corporation’s security needs with the employees confidentiality and privacy requirements.

Read Full Article
Source: TLNT


Topic: Risk Management

Getting Out of a Commercial Lease

As a tenant, there are many reasons why you might wish to terminate a commercial lease. What can you legally do to get out of your existing lease?

Read Full Article
Source: Entrepreneur


Topic: Risk Management

A New Twist in Account Takeover

A so-called "man-in-the-e-mail" scam that’s targeted at least three Seattle-area businesses reflects a growing trend in account takeover compromises. FBI warns of scam linked to E-mail compromises.

Read Full Article
Source: Bank Info Security


Topic: Risk Management

Fraud Advisory for Businesses: Corporate Account TakeOver

Cyber criminals are targeting the financial accounts of owners and employees of small and medium
sized businesses, resulting in significant business disruption and substantial monetary losses due to
fraudulent transfers from these accounts. Often these funds may not be recovered

Read Full Article
Source: iC3


Topic: Risk Management

The Small Business Guide to Corporate Account Takeover

Corporate account takeover is a type of fraud where thieves gain access to a business’ finances to make unauthorized transactions, including transferring funds from the company, creating and adding new fake employees to payroll, and stealing sensitive customer information that may not be recoverable.

Read Full Article
Source: American Bankers Association


Topic: Risk Management

A New Twist in Account Takeover - FBI Warns of Scam Linked to E-mail Compromises

Fraudsters intercepted legitimate e-mails between the businesses and their suppliers and then spoofed subsequent e-mails impersonating each company to the other, according to a Dec. 2 warning issued by the Federal Bureau of Investigation. Losses linked to the attacks have so far totaled approximately $1.65 million.

Read Full Article
Source: Bank Info Security


Topic: Risk Management

Excelling At Customer Service: Understanding What Makes Or Breaks A Brand During A Crisis

Providing an exceptional customer experience can make all the difference for a company, brand and its customers, even in a time of crisis. With that in mind, here are some strategies that could help turn a crisis into a positive situation:

Read Full Article
Source: Forbes


Topic: Risk Management

How to Prepare Your Office for Bad Weather

When the weather outside is frightful...your employees will cringe at the thought of coming in to work. Here are a few tips on bracing your staff for inclement weather.

Read Full Article
Source: Inc.


Topic: Risk Management

Study: Companies not as secure as they think

CompTIA says 80 percent of companies surveyed believe their security is satisfactory, but only 13 percent had made changes since embracing cloud and BYOD

Read Full Article
Source: InfoWorld


Topic: Risk Management

The Limitations of Certificates of Insurance

Many policyholders rely on certificates of insurance to prove that insurance coverage exists. But in reality, the certificate of insurance has limited functionality as evidence of insurance coverage. While it may alleviate the potential for additional audit premiums, it is misused and over-valued and can easily leave the recipient with a false sense of security.

Read Full Article
Source: Risk Management


Topic: Risk Management

4 Kinds of Fraud That Could Destroy Your Business

Let me share some true stories that highlight four common types of fraud for business owners and ways they can be avoided:

Read Full Article
Source: Entrepreneur


Topic: Risk Management

Protecting the Enterprise Against Unconventional Competitive Social Risks

As disruptive, non-traditional business competitors emerge, many of these organizations are adopting tactics that would typically be "off limits†to traditional corporations, including partnering with activist groups to attack and disrupt the market leader to damage the reputation and erode the financial state of the organization.

Read Full Article
Source: Risk Management


Topic: Risk Management

With Jobs Plentiful, B-Schools Expand Risk Management Offerings

A renewed appreciation for corporate risk in the wake of the global financial meltdown has ushered in a growing interest in risk management programs at business schools.

Read Full Article
Source: Businessweek


Topic: Risk Management

KPMG Survey: The Top Perceived Risks

Regulatory pressure is seen as the issue posing the greatest threat to respondents

Read Full Article
Source: KPMG


Topic: Risk Management

Why Would Hackers Target My Little Company?

If your business is relatively small, keeps a low profile, and isn’t involved in financial services or national defense, you might assume that data security isn’t a big issue for you. Why would someone in the presumably limited pool of hackers take the time to target your company? How would they even know about it?

Read Full Article
Source: Harvard Business Review


Topic: Risk Management

Personal liability in employment cases: Are executives in the legal crosshairs?

Two supervisors were held personally responsible to pay $450,000 each as part of a $12 million award to a fired employee. The jury found that the plaintiff had been discharged in violation of FMLA rights. In addition, the jury decided there had been an intentional violation by both supervisors who had made statements that they "intended to find grounds for dismissing the employee.†Schultz v. Health & Hospice Corp. (N.D. Ill., 2002).

Read Full Article
Source: InBusiness


Topic: Risk Management

One in five data breaches are the result of cyber espionage, Verizon says

Even though the majority of data breaches continue to be the result of financially motivated cyber criminal attacks, cyber espionage activities are also responsible for a significant number of data theft incidents, according to a report that will be released Tuesday by Verizon.

Read Full Article
Source: InfoWorld


Topic: Risk Management

Want to Build an App? Read This First

So you have a great idea, but lack the technical skills to build it? Here are the four big things you need to know before you begin building.

Read Full Article
Source: Inc.


Topic: Risk Management

How to Handle Cash Flow When Disaster Strikes

How do you handle cash flow when natural disasters or other forces beyond your control cause you to temporarily shut down your business?

Read Full Article
Source: Entrepreneur


Topic: Risk Management

How to Manage the Stress of Uncertainty

Launching a business is riddled with stressful uncertainties. You worry about feeding your family, paying your employees, or investing your own money without a guarantee of success. As an entrepreneur, learning to manage that stress will make you a happier -- and more successful -- business leader.

Read Full Article
Source: Entrepreneur


Topic: Risk Management

Are NCAA Tournament Bracket Pools Legal?

More than 50 million Americans are expected to fill out their NCAA Tournament brackets. Some will compete for fun. Others will join free contests. Meanwhile, still others will enter private pools that include both entry fees and cash prizes.

Read Full Article
Source: Forbes


Topic: Risk Management

Employee Fired For Tweeting Complaints About Discrimination

Two weeks ago, Adria Richards attended an industry conference at which she overheard inappropriate jokes from two attendees sitting behind her during a session. So, she complained on Twitter.

Read Full Article
Source: TLNT


Topic: Risk Management

Implement a Cybersecurity Plan

Most experts recommend that businesses start by having a strategic approach to cybersecurity. This strategic approach should include plans to secure existing systems and keep your business secure going forward.

Read Full Article
Source: StaySafeOnline


Topic: Risk Management

Ten Cybersecurity Tips for Small Businesses

Broadband and information technology are powerful tools for small businesses to reach new markets and increase sales and productivity. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers, and their data.

Read Full Article
Source: FCC


Topic: Risk Management

Just for You Small Business

If you run a small business, you may rely on technology to expand your reach and stay competitive, even if you don’t have a full-time IT staff. OnGuardOnline.gov wants you to have the information you need to protect your data, your networks, and your IT systems.

Read Full Article
Source: onguardonline.gov


Topic: Risk Management

Monitoring & Transmitting Financial Data — Do It Securely

The following guidelines will help you protect the computers you use to access your bank accounts and your online access credentials.

Read Full Article
Source: Better Business Bureau


Topic: Risk Management

If Customer Data is Stolen or Lost — What to Do Next

A small business must respond quickly if sensitive customer information is lost or stolen.

Read Full Article
Source: Better Business Bureau


Topic: Risk Management

Managing Risk in the Era of Behavior

We are increasingly connected and interdependent. We live and work continents apart but are still in each other’s backyards--that’s why high-risk mortgages in Arizona and Nevada can destabilize Iceland’s economy, for example. …

Read Full Article
Source: Businessweek


Topic: Risk Management

Most Companies Do Not Expect – And Remain Unprepared For – Lawsuits Against Their Directors

Seeing a chasm between risk perception and risk reality has ceased to surprise me. Virtually every survey, study and report I come across reveals that executives either (a.) don’t understand the risks they take or (b.) …

Read Full Article
Source: Risk Management Monitor


Topic: Risk Management

ACH fraud: Why criminals love this con

Fraud involving the Automated Clearing House (ACH--hence the term ACH fraud) Network, which is used by financial institutions to handle direct deposits, checks, bill payments and cash transfers between businesses and …

Read Full Article
Source: CSO


Topic: Risk Management

A Few Good Information Security Metrics

Information security metrics have a bad rep. Mention metrics to a CISO and immediately his thoughts may well turn to sigmas, standard deviations and, probably, probability. To many, metrics equals statistics. There’s no …

Read Full Article
Source: CSO