In today’s fast paced world, organizations have to rely more and more heavily on technology to remain competitive. Customers have come to expect organizations to have an online presence with professional looking websites, be able to respond
As a project manager or team member, you manage risk on a daily basis; it’s one of the most important things you do. If you learn how to apply a systematic risk management process, and put into action the core
Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization’s capital and earnings. Enterprise risk management expands the process to include
It is a Monday morning. The alarm goes off. You raise your head and reach over to your phone. Time check, its 5:00am. You are still sleepy. You decide to put on the light but continue lying on the bed,
This type of fraud occurs when an ATM is compromised by a skimming device, a card reader which can be disguised to look like a part of the machine. The card reader saves the users’ card number and pin code,
Small businesses with less than 100 employees experience a median loss of $154,000 due to fraud, according to the Association of Certified Fraud Examiners (ACFE). This number is higher for small businesses than most large companies.
Employees and customers are just
Cyber-bullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and twitter to harass, threaten or intimidate someone.
Cyber-bullying is often done by young people, who have increasingly early access to these technologies. The
Conducting an internal investigation can be a difficult task. An investigation into employee wrongdoing can be costly, disruptive and time-consuming, and can also lead to a variety of legal problems and other unexpected complications if it is not conducted with
The key deterrent of fraud and corruption is awareness and prevention. Some of the processes which are deemed most effective involve denial of opportunity, effective leadership and oversight, auditing and pre-employee screening. Denial of opportunity may be translated in the form
In the shadowy world of security threats and bad actors, cyber extortion is a growing trend. Cyber criminals are taking advantage of the vulnerability of intellectual property, threatening to release potentially embarrassing information publicly and encrypting data to render it