Send a Message
to lucianacosta

Comments

3

Joined

Feb 25, 2014

lucianacosta Profile

Recent Posts

Science / Technology

Dyman Associates Management U.S., UK advise avoiding Inte...

U.S., UK advise avoiding Internet Explorer until bug fixed (Reuters) - The U.S. and UK governments on Monday advised computer users to consider using alternatives to Microsoft Corp's Internet Explorer browser until the company fixes a security flaw that hackers used to launch attacks. The Internet Explorer bug, disclosed over the weekend, is the first high-profile computer threat to emerge since Microsoft stopped providing security updates for Windows XP earlier this month. That means PCs running the 13-year-old operating system will remain unprotected, even after Microsoft releases updates to defend against it. The Department of Homeland Security's U.S. Computer Emergency Readiness Team said in an advisory released on Monday that the vulnerability in versions 6 to 11 of Internet Explorer could lead to "the complete compromise" of an affected system. Read full article at http://www.reuters .com/article/2014/ 04/28/us-cybersecu rity-microsoft-bro wser-idUSBREA3Q0PB 20140428 See more: http://dymanassoci atesprojects.com/ https://www.facebo ok.com/dyamanassoc iatesproject  (Apr 29, 2014 | post #1)

Singapore

Hughes: Digital spying casts chill on global trade

BEHANCE - Revelations about U.S. digital eavesdropping have fanned concerns about Internet privacy and may complicate U.S. attempts to write rules enshrining the free flow of data into trade pacts with European and Pacific trading partners. As more and more consumers and businesses shop and sign up for services online, the IT industry is working to fend off rising digital protectionism it sees as threatening an e-commerce marketplace estimated at up to $8 trillion US a year. “Restrictions on information flows are trade barriers,” Google’s executive chairperson Eric Schmidt said at a Cato Institute event last month, warning that the worst possible outcome would be for the Internet to turn into “Splinter net.” The unease of U.S. technology companies has mounted in lockstep with rising worries overseas about data privacy. German Chancellor Angela Merkel — a target of U.S. spying — has called for a European Internet protected from Washington’s snooping. Brazil and the European Union plan to lay their own undersea communications cable to reduce reliance on the United States. And other countries are showing a preference for storing data on local servers rather than in the United States.U.S. President Barack Obama acknowledged this week that it would take time to win back the trust of even friendly governments. Source: https://www.behanc e.net/gallery/Hugh es-Digital-spying- casts-chill-on-glo bal-trade/15722929 Read more: http://dymanassoci atesprojects.com/ Join us here: http://www.buzznet .com/groups/dymana ssociatesprojects/ Watch here: http://www.youtube .com/watch?v=_NkFg Du_9g4  (Mar 31, 2014 | post #1)

Top Stories

Dyman & Associates Projects: Risk Management

This site Dyman & Associates Projects [ http://dymanassoci atesprojects.com/a bout.html ] provides guidance and tools to help businesses understand what they need to do to assess and control risks in the workplace and comply with health and safety law. Although written with small businesses in mind, the site is relevant to all businesses. Five steps to risk assessment This is not the only way to do a risk assessment, there are other methods that work well, particularly for more complex risks and circumstances. However, we believe this method is the most straightforward for most organizations. How to assess the risks in your workplace? Follow the five steps in our leaflet: Step 1: Identify the hazards Step 2: Decide who might be harmed and how Step 3: Evaluate the risks and decide on precautions Step 4: Record your findings and implement them Step 5: Review your risk assessment and update if necessary If you already have a health and safety policy, you may choose to simply complete the risk assessment part of the template. We also have a number of example risk assessments to show you what a risk assessment might look like. Choose the example closest to your own business and use it as a guide for completing the template, adapting it to meet the needs of your own business. [See this Cyber Security... http://dymanassoci atesprojects.com/c yber.html ] For more Info Dyman & Associates Risk Management Projects... http://dymanassoci atesprojects.com/ Click for full info in Risk Management: http://www.hse.gov .uk/risk/  (Feb 25, 2014 | post #1)