Tags » Business Risk

24 Oct 2016 (AFR) - Connected gadgets blamed as internet recovers from attack

(24 October 2016, AFR, p10, by Nate Lanxon, Jeremy Kahn and Joshua Brustein)

‘Vulnerable internet-connected devices such as cameras and digital video recorders may be to blame for the attack that took down some of the world’s most popular websites on Friday. 68 more words

1.Market Observations

Can you afford to ignore cyber security

A quick scan of the Information Commissioner’s Office (ICO) website shows that since the beginning of August to 13 October, 17 enforcement notices have been made.  678 more words

84% businesses experienced some kind of disruption


Only one in six businesses had disruption free run in the past 18 months. This is what Business Strategy Consulting from Belgrade found from the survey run among business leaders, managers, professionals and entrepreneurs from Europe, Africa, Asia and North America. 621 more words


Let's reduce the use of the 'C' Word

Prior to acquiring a new asset like the lovely digger in the picture above, a business would assess:

How to Estimate and Prioritize Risk

Estimating and prioritizing risks is a time-consuming process. Furthermore, the results of risk estimation and prioritization don’t often inspire a great deal of confidence in the process. 802 more words

Continual Improvement

Weekend Reading: March 26 - 27, 2016

Alizila: reflections on Alibaba’s “e-commerce media ecosystem.”

AP (via The Seattle Times): Hong Kong losing luster as business hub?

Brunswick Group: overview of 13th Five-Year Plan and outcomes of Two Meetings political event, with assessment of achievements of 12th Five-Year Plan (targets, outcomes). 64 more words


Risk Compass: The Forensics of Insider Trading (Part 2)

We want to continue our discussion of insider trading risk by noting that the topic is one of increasing concern to those responsible for the governance of financial institutions and markets in Asia: 752 more words