Companies guarantee our phones are secure? Really?
By Terry Cutler Just how fast is technology moving? At lightening speed say security specialists, and when it comes to online security it’s moving too fast. We cannot keep up. The example is our...
View ArticleWhy the Cloud Will Change Our Lives
We are on the cusp of yet another internet based revolution. This time, it’s the cloud – that term we see used so often to denote the ability to process and store data over the internet. There are...
View ArticleWhen the complacent CEO gets hacked
By Terry Cutler When that home phone rings at a time of morning when sleep has moved into deep R.E.M., and the text messages start appearing it could only mean one thing to a CEO; there is a problem...
View ArticleWhen Internet security takes a back seat
By Terry Cutler. Why is it that those in charge of protecting the company’s security network, that database of sensitive customer data – bank cards, credit cards, bank accounts and personal information...
View ArticleThe Importance of Structured Data
The annual conference of XBRL US is winding up today in Austin, Texas. Many of the attendees at this conference are representatives of the public companies who must report their financial statements in...
View ArticleTANSTAAFL –“free” email accounts – oh really??
Going back in time for this one – due to recent article in Vancouver Sun and other places about a pending class-action suit (at least the plaintiff is asking for CA status) regarding the “mining” of...
View ArticleSecurity not included ?? real lessons you should know about before you hire...
By Terry Cutler A recent vulnerability audit and stimulated hacking scenario on a website belonging to a small non-profit uncovered 25 possible vulnerabilities, and according to the director and his...
View ArticleAnywhere use of the company Smartphone is great for hackers, not so great for...
By Terry Cutler Where technology goes so do hackers. Where hackers turn up, usually means bottom line problems for companies, and these unscrupulous hackers are already snaking and slithering...
View ArticleIdentity theft, email and phone fraud – some tips – Part 1 of 2
Identity theft, email and phone fraud – some of the “tricks” Written by Ian R. Whiting, CD, CFP, CLU, CH.F.C., FLMI(FS), ACS, AIAA, AALU, LSSWB, Contributing Editor Website: www.ianrwhiting.com Blog:...
View ArticleIdentity theft, email and phone fraud – some tips – Part 2 of 2
Identity theft, email and phone fraud – some of the “tricks” Written by Ian R. Whiting, CD, CFP, CLU, CH.F.C., FLMI(FS), ACS, AIAA, AALU, LSSWB, Contributing Editor Website: www.ianrwhiting.com Blog:...
View Articlethe Unconventional Conventional Part xxix
Last week I stated that it was unbelievable that no matter what logic was presented, as far as financial issues are concerned, my words seem to fall on deaf ears and most people continue to do the same...
View ArticleThe Advantages and Disadvantages of Online Legal Document Preparation Companies
by Bert Griffin As a financial planner, I regularly advise my clients on a range of financial planning subject matters, from retirement planning to investment planning to tax and estate planning. In...
View ArticleWhy the Cloud Will Change Our Lives
We are on the cusp of yet another internet based revolution. This time, it’s the cloud – that term we see used so often to denote the ability to process and store data over the internet. There are...
View ArticleProtect yourself from Identity Thieves!
Andrea told her husband Jack that she had noticed a young person going through their condo paper-recycling bins. At first, she thought they were just looking for recyclables which could be turned into...
View ArticleFraud and Identity theft – a common glossary
Unfortunately, identity theft and fraud are among the fastest growing crimes in the world. In 2012, more than 120,000 calls were received and more than 40,000 e-mail messages each month were reported...
View ArticleInternet and E-mail Safety (and security)
In this blog, let’s look more closely at internet and e-mail scams and security. Internet Knowledge is power – and never truer than when surfing the net. The most common risks are viruses, key-stroke...
View ArticleHow can I recognise a SCAM?
A very good question and here are some tips including information from the Canadian Anti-Fraud Centre. www.antifraudcentre.ca 1. If it sounds too good to be true – guess what?! You’ve won a big prize...
View ArticleHow can small business deal with today’s currency fluctuations?
Mal Spooner is a veteran fund manager and currently teaches at the Humber College School of Business. Right now it’s no secret that selling merchandise to Americans is pretty lucrative. We also know...
View ArticleHow to Find the Best Online CFD Brokers
The last decade has seen unmatched growth in the online trading industry. Even the most experienced traders were shocked to see how many novice and beginner traders have joined their ranks over the...
View ArticleISO standards and our place in the global development community
If there’s one thing I’m particularly proud of in looking at the success of Mizrahi Developments, it is the high standards with which we hold all aspects of our operation. We are a private development...
View Article
More Pages to Explore .....