The Alliance Security Council ™

Unforeseen Threats
The Business Model of the Serial Hacker

Paul Michael Viollis, Sr., Ph.D., Chief Executive Officer
Risk Control Strategies, Inc.
***
Unequivocally, one of the most fecund business models known to the global community is the malicious interception of personal and business information for financial gain, personal defamation and or business interruption; otherwise known as hacking.  Yet, at its origin in the 1950's at MIT, hacking was anything but malicious and was nothing more than a harmless component of technical-based experiments.  However, today, it remains one of, if not the, fastest growing businesses in the world. For a criminal to create a business case to launch a career in hacking is the ... more


Unforeseen Threats
Who Is On Your Side?

Provided by Judith L. Pearson

ARIS Title

Who Is On Your ... more


Unforeseen Threats
A Primer on Assessing the Potential For Violence

Thomas Kazsa, Hillard Heintze

"Behavioral Threat Assessment: the Most Critical and the Least Understood"

When violence shatters the routine of a workplace, especially when it results in grievous injury or loss of life, it's both painful and instructive to look back at the early signs of trouble.

Almost without fail, you will find a circle of hidden insights. Discrete pieces of information held by colleagues, family and strangers alike are revealed that would have provided the single best opportunity to head off catastrophe had they been shared and analyzed in a timely manner.

This sensitive and highly nuanced information collection and analysis, however, is ... more


Unforeseen Threats
Inaugural Security Study Slides - Fall 2012

Biggest Concerns: Succession, Cyber, and Regulatory Issues; are SFOs the least prepared (or more realistic?); Cyber Security, a necessary growing focus; Families actively being targeted, attempts on the rise; use of security consultants double, still only 1 in ... more


Unforeseen Threats
Protecting High Net Worth Individuals And Families

Wealth attracts attention.  But rather than being obvious, intrusive and restricting, best practices in protection can actually enhance lifestyle, privacy and ... more


Unforeseen Threats
Household Staffing Security (Video)

Panel Discussion with Teresa Leigh - Teresa Leigh Household Management

Teresa Leigh provides stunning facts on the vulnerabilities families face with household staffing and how families can protect themselves when considering staffing ... more


Unforeseen Threats
The Domestic Staffing Cycle: From Hiring to Firing

When it comes to hiring staff, the pitfalls and obstacles are all too familiar: shortage of qualified candidates, increasing regulations, risks to privacy and security and exposure to litigation and liabilities. The 21st century brings with it an alarming reduction in work force and an equally diminished level of ... more


Unforeseen Threats
Social Media Glossary

Provided by HUB International

Blog: A website with regular entries of commentary, descriptions of events, or other material such as graphics and ... more


Unforeseen Threats
Personal Security and Cyber Security for High Net Worth Individuals

... more


Unforeseen Threats
Think Before You Post

“Anything you post online anyone can see family, friends… even not so
friendly people.” Are you and your children aware of the potential
risks of posting information online? The children of wealthy families
are especially at risk.

Think Before You ... more


Unforeseen Threats
Do security and privacy really matter on Facebook?

Is Facebook more concerning with global domination than your security? You be the ... more


Unforeseen Threats
The Temptation of Easy Money

Even good people can fall into the temptation of easy money. After working for two years as an office Executive Assistant for a Severna Park, Maryland couple; Patricia Staugler was offered the plum position as the couple’s Executive Personal Assistant to manage the day to day household operations and her employers’ daily schedules. … It is suspected that she stole over $2 million and additional charges are being ... more


Unforeseen Threats
Electronic Credit Card Theft – Special Report

Your credit card information is at risk, even if you don’t remove your credit card from your wallet or ... more


Unforeseen Threats
Philanthropy Security



Description: Philanthropy are voluntary actions for the common good.

Questions for You and Your Family: Do you know the privacy policies of the charities you participate in? Have you ever used muckety.com? A free site that attempts to list the names of wealthy and well-known people and often lists the charities they donate to and the boards they serve on? Have you asked each charity if they sell donor lists to other nonprofits? Do your charities have a Chief Privacy Officer?

Did You Know? “E-Philanthropy” is becoming popular, especially with the younger generations. ... more


Unforeseen Threats
Protect Your Children when using Social Media

The keys to protecting your children when they engage in social media are the same as in many areas of life: set clear house rules and discuss ... more


Unforeseen Threats
Social Media Safety Checklist

Information about you is probably already online. Be proactive to protect your reputation. Once something is on the Internet, it cannot be removed completely, but there are steps that you can take to minimize the damage caused by negative ... more


Unforeseen Threats
Privacy Matters: Social Media, Risk, and Reward

... more


About The Alliance Security Council



Sign up for weekly emails to be notified of new Alliance Security Council research, free articles, and upcoming events.

Email:
First Name:
Last Name:



Two Ways to Subscribe to the Alliance Security Council

For less than $99 per month, The Alliance Security Council is your guide in safeguarding the lives and livelihoods of ...  ... more