WHY IT MATTERS: Digital Transformation
214.8K views | +0 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Tools'. Clear
Scooped by Farid Mheir
Scoop.it!

Here’s a Long List of Data Broker Sites and How to Opt-Out of Them via @VICE

Here’s a Long List of Data Broker Sites and How to Opt-Out of Them via @VICE | WHY IT MATTERS: Digital Transformation | Scoop.it

How to get off of people search sites like Pipl, Spokeo, and WhitePages.

Farid Mheir's insight:

WHY IT MATTERS: protecting privacy is a difficult task, sometimes an impossible one. Case in point this long list of sites you have to go through to opt-out or delete your data. We need a better solution...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available | WHY IT MATTERS: Digital Transformation | Scoop.it

Market Guide for Security Threat Intelligence Products and Services. Key Findings:
- The term “threat intelligence” covers a diverse set of capabilities.
Client interest in industry-led government and commercial TI has increased significantly during the past two years. There are still large numbers of providers in this market, with startups also entering.
- The number and diversity of TI services, as well as expertise, have created an environment in which purchasers often struggle to compare services, and there’s still no single provider to address all of them. Many vendors can provide access to information; fewer provide truly anticipatory content or curation based on customized intelligence.
- The value of these services is sometimes constrained by the customer’s ability to afford, absorb, contextualize and, especially, use the information provided by the services.

Farid Mheir's insight:

WHY IT MATTERS: threat intelligence is a new field introduced by digital transformation. As more data is created and more processes are transferred to digital, the potential threats of fraud and other security breaches increases and requires new resources, new processes and new tools. This Gartner report provides a reference document to understand the field and help select partners.

Hamza Yousaf's comment, April 5, 2019 10:17 AM
Best ever Apple accessories
https://bit.ly/2FNzXqJ
Scooped by Farid Mheir
Scoop.it!

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We’re rolling out two new features, Password Checkup and Cross Account Protection, to keep your information safe beyond Google’s sites and apps.

Farid Mheir's insight:

WHY IT MATTERS: this simple extension will inform you when your user-password has been stolen - prompting you to change your password or take action. Must have for everyone.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma...

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma... | WHY IT MATTERS: Digital Transformation | Scoop.it

Phishing attacks are increasingly using impersonation to bypass traditional defense mechanisms. Weak sender identification will continue to present opportunities for creative attacks. Security and risk management leaders should use this research to adjust their strategy and business processes.
Key Challenges
Phishing attacks are still increasing as a targeting method of attackers. Phishing attacks targeting credentials will continue to escalate as applications and data migrate to better-protected cloud providers.
Email is not designed to truly authenticate sender identity. Efforts like DMARC to authenticate domains are not granular enough to authenticate users and do not address all attack types.
Most implemented secure email gateways (SEGs) are not designed with post-delivery detection and remediation techniques, costing incident responder and email admin time and reducing the feedback loop from end users.
User phishing education is a good start toward people-centric security, but current email security does not provide users with any indicators of the trust they can put in emails or the proper workflow for dealing with suspect emails.
Recommendations
Security and risk management leaders responsible for endpoint and mobile security should:
Upgrade secure email gateway solutions to cloud versions that include phishing protection, particularly for impostor or business email compromise (BEC) protection.
Integrate employees into the solution and build capabilities to detect and respond to suspect attacks.
Work with business managers to develop standard operating procedures for handling sensitive data and financial transactions.
Strategic Planning Assumptions
By 2023, sender identity verification will be a common critical component on secure email gateways and other anti-phishing solutions.
By 2023, anti-phishing education will be a critical part of the feedback loop between end users and email security solutions.
Through 2023, business compromise attacks will be persistent and evasive, leading to large financial fraud losses for enterprises and data breaches for healthcare and government organizations.

Farid Mheir's insight:

WHY IT MATTERS: we often forget that it is the simple things that make us vulnerable. Security remains a key challenge with any digital transformation and this report can help identify solutions.

Don Sadiri Daquitan Quia-eo's curator insight, February 20, 2019 8:09 PM
Phishing is a crime (cybercrime) where the criminals poses as someone. They would somehow create a poser account or they would create a fake website where the victims would log in and then their account would immediately appear to the criminals. Financial loss and stealing of other important documents or things are often the outcome of phishing crime. So, in order to avoid these incidents we need to check everything twice or thrice. For example, check the url of the website if it is legitimate like there would be "www" and "https", it means that the site you are using is SECURED.
Honnie Faith Balingway II's curator insight, February 20, 2019 10:03 PM
(My knowledge about computer networking basics)

From my knowledge, Computer networking is part of my knowledge as an i.c.t student and i konw that computer networking is as a group of two or more computer systems or other devices that are linked together to exchange data.

There are many types of computer networks. Common types of networks include the following:

The Local Area Network, Wide-area network, Metropolitan-area network,Home-area network, Virtual private network and Storage area network.
Networks share common devices and functions, such as servers, transmission media (the cabling used to connect the network) clients, shared data (e.g. files and email), network cards, printers and other peripheral devices.
And  an important relationship on networks is that of the server and the client. 
Edward Dimaden's curator insight, February 21, 2019 2:16 AM
their are many things in this world that they going to attacks some person for block mail and this issue is gonna be stop 
we us young people start to defense this issue, we united as one so stop cyber-attacks.
Scooped by Farid Mheir
Scoop.it!

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution | WHY IT MATTERS: Digital Transformation | Scoop.it

Passwords are awful. The software security industry expects us to remember 100+ passwords, that are complex (variations of upper & lowercase, numbers and special characters), that are supposed to be changed every 3 months, with each one being unique. Obviously this is impossible for most people, and for those whom it is possible, why would they want to waste all of that brain power on something that is, essentially, meaningless?

*** This article is for beginners in security or other IT folk, not experts.

Farid Mheir's insight:

WHY IT MATTERS: I wrote about it so much in the past but have not recently. I find new year resolution to be the best time to start good new habits. Here this article provides reasons why you should start using password manager tools, and provides a list to help you get started. Now, GO!

theclickfit's comment, January 6, 2019 12:22 PM
https://www.theclickfit.com/pro-testosterone/
speedtrafikk's comment, January 7, 2019 5:03 AM
interest
Scooped by Farid Mheir
Scoop.it!

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password | WHY IT MATTERS: Digital Transformation | Scoop.it

Have your accounts been leaked or stolen in a data breach? Find out at Firefox Monitor. Search our database and sign up for alerts.

Farid Mheir's insight:

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Vezta & Co.'s curator insight, September 29, 2018 11:27 AM

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Scooped by Farid Mheir
Scoop.it!

Edward Snowden created an app that turns smartphones into security systems aimed at thwarting spies

Edward Snowden created an app that turns smartphones into security systems aimed at thwarting spies | WHY IT MATTERS: Digital Transformation | Scoop.it
Edward Snowden, the former National Security Agency contractor and notorious whistleblower, just launched a new app, Haven.
Farid Mheir's insight:

WHY IT MATTERS: a new twist on security cameras mean there may be a life for all those old phones lying around. If you are a programmer you can also look at the source code to find out how they do what they do...

Scooped by Farid Mheir
Scoop.it!

The Periodic Table of Cybersecurity Startups @CBinsights

The Periodic Table of Cybersecurity Startups @CBinsights | WHY IT MATTERS: Digital Transformation | Scoop.it

A periodic table of cybersecurity to navigate the key players in the space, including startups, industry categories, investors, and exits.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation often comes increased level of digital threats. Good to keep in mind that there are tools to help reduce the risk of attacks or their impact when they happen.

Ocean´s five's curator insight, October 31, 2017 6:44 AM
Las 140 startup de la tabla periódica. Así son las empresas que definen la industria de seguridad cibernética. Entre las categorías se encuentran:

-Seguridad mĂłvil: Zimperium y Appthority.

-Cyber Insurance: RedSeal Networks y Cyence.

-AdministraciĂłn de identidad y acceso: OneLogin.

-Seguridad de red y punto final: Tanium, Cloudflare , Illumio y Zscaler .

-Seguridad contra el fraude:ThreatMetrix.
Scooped by Farid Mheir
Scoop.it!

How to remain completely #anonymous and hidden #online

How to remain completely #anonymous and hidden #online | WHY IT MATTERS: Digital Transformation | Scoop.it
These are the steps you can take and the tools you'll need to remain anonymous and hidden online. Tor, VPN, burner emails, encryption, bitcoin, etc.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Discusses different solutions to remain anonymous online, from TOR to bitcoins.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | WHY IT MATTERS: Digital Transformation | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

argonapproach's comment, May 8, 2017 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

The Complete Guide to Ransomware Protection

The Complete Guide to Ransomware Protection | WHY IT MATTERS: Digital Transformation | Scoop.it
Worried about new ransomware attacks infecting your systems? Learn how ransomware works + get tips to block ransomware and deal with ransomware recovery.
Farid Mheir's insight:

Amazing reference concerning ransomware: what they are, trends, recommendations, etc. Very well done, very useful.

culturesoinker's comment, January 27, 2017 2:33 AM
nice
Scooped by Farid Mheir
Scoop.it!

Floodwatch browser extension #crowdsource #ads you see to build massive DB of what advertizers know about you2

Floodwatch browser extension #crowdsource #ads you see to build massive DB of what advertizers know about you2 | WHY IT MATTERS: Digital Transformation | Scoop.it

Floodwatch is a Chrome extension that tracks the ads you see as you browse the internet. It offers tools to help you understand both the volume and the types of ads you’re being served during the course of normal browsing, with the goal of increasing awareness of how advertisers track your browsing behavior, build their version of your online identity, and target their ads to you as an individual. We want to assemble the largest amount of advertising data we can— and then not give it to the advertisers.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Knowing what information is captured about you, stored and the digital profiles that is created behind the scenes as you browse the web is a first step in regaining control over our digital twin so we can have better digital lives.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking

Why #AdBlockers May be as Bad as the #Ads they are blocking: they need to make $$ using ads+tracking | WHY IT MATTERS: Digital Transformation | Scoop.it
For publishers and advertisers, Internet ad blockers are a scourge. But the blockers also have to pay the bills.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Surveillance is part of the web browsing experience mostly due to ads and social beacons. Trying to block them off not only degrades the user experience but may not provide the expected benefits as it may provide a different type of surveillance. Ad blocking does not appear to be the solution after all. So what can provide more privacy when surfing the web? The question remains open.

Jean-Marie Grange's comment, December 20, 2016 1:12 PM
Maybe one solution would be for content publishers to offer the choice of paying a fair amount for ad-free content... http://sco.lt/7CrAVl
Scooped by Farid Mheir
Scoop.it!

Forrester Wave: Digital Risk Monitoring 

Forrester Wave: Digital Risk Monitoring  | WHY IT MATTERS: Digital Transformation | Scoop.it

When it comes to the myriad risks companies face across digital channels — social, mobile, and web — security and risk (S&R) pros track a much smaller portion of their environment than they realize. Without comprehensively and persistently monitoring risk in digital channels, companies remain susceptible to a wide variety of brand, cyber, and physical risk events. Despite the high stakes, many organizations struggle to improve digital risk visibility and mitigate related risks.

Farid Mheir's insight:

Use this link to access the Forrester report for free on solutions to help protect your organization from the digital threats your corporation faces on its brand, cyber presence or physical locations.

 

WHY THIS IS IMPORTANT

First, the paper describes the various risks you may face in a digital world. If you don'T know the difference between OSINT, TECHINT, SIGINT, HUMINT, CHINT then you must read it.

Good to know.

Second, it lists the various ways in which you can protect yourself.

Interesting.

Finally, it lists tools you can use to secure your company.

Useful.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Have I been pwned? Check if your email has been compromised in a data breach

Have I been pwned? Check if your email has been compromised in a data breach | WHY IT MATTERS: Digital Transformation | Scoop.it
Have I been pwned? allows you to search across multiple data breaches to see if your email addresses has been compromised.
Farid Mheir's insight:

Brilliant idea: a website that gathers all the stolen emails and private information, then warns you if your email shows up on one of these lists. Essential tool. Use it now.

clapnotice's comment, September 26, 2016 5:10 AM
Its tremendous :)
Scooped by Farid Mheir
Scoop.it!

Five Best Password Managers @lifehacker

Five Best Password Managers @lifehacker | WHY IT MATTERS: Digital Transformation | Scoop.it

A while ago, all it took to be a great password manager was to keep your passwords in an encrypted vault. Now the best password managers give you the option to sync or keep them local only, change web passwords with a click, log in to sites for you, and more. This week, we're looking at five of the best options.

Farid Mheir's insight:

Whichever you select, use a password manager. Do it now.

Scooped by Farid Mheir
Scoop.it!

OpenBR : Open Source Biometric Recognition paves the way for wide adoption

OpenBR : Open Source Biometric Recognition paves the way for wide adoption | WHY IT MATTERS: Digital Transformation | Scoop.it

Open Source Biometric Recognition

A communal biometrics framework supporting the development of open algorithms and reproducible evaluations.

Farid Mheir's insight:

Face recognition, gender detection, and age estimation are all now possible with this open source suite of software code. This should pave the way for wide adoption in all kind of applications, from retail store security cameras to hand held camera devices such as the narrative camera or others. I can think of so many use cases - both good and bad - where this technology can be deployed. Just a question of time...

 

http://getnarrative.com/

https://www.indiegogo.com/projects/parashoot-smart-wearable-video-mini-hd-camera 

http://www.getperfectmemory.com/ 

 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

A list of websites that support Two Factor Authentication #2FA via @HopefulJosh

A list of websites that support Two Factor Authentication #2FA via @HopefulJosh | WHY IT MATTERS: Digital Transformation | Scoop.it
List of sites with Two Factor Auth support which includes SMS, email, phone calls, hardware, and software.
Farid Mheir's insight:

2 factor authentication (2FA) is an essential tool to keep your personal information secure. 2FA sends an SMS when you login to a website from a new computer - or again every 30 days or so - to validate that you are indeed who you say you are - not some hacker in Russia.

 

This service provides a very complete list of websites that support multi-factor authentication - and highlights those that do not. Looking at the list, it is for example very surprising to see so few banks supporting 2FA but that LinkedIn protects your resume more diligently!

 

Moreover because it is open source, new sites are addedd consantly, so the list should remain fresh.

 

Great tool to use as a checklist to ensure you have turned on at least SMS verification in your key accounts.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Best #password managers for PCs, Macs, and mobile devices

Best #password managers for PCs, Macs, and mobile devices | WHY IT MATTERS: Digital Transformation | Scoop.it
10 local and cloud-based contenders make passwords stronger and online life easier for Windows, OS X, iOS, Android, BlackBerry, and Windows Phone users
Farid Mheir's insight:
Great review of essential tools in everyone's computer and mobile phone.WHY THIS IS IMPORTANTStrong password are our only protection for our digital lives and yet to many people still rely on simple and easy to guess ones. I wrote about this many times before http://www.scoop.it/t/digital-transformation-of-businesses?q=password, and this article provides links and ratings for different solutions on the market.And by the way, when possible, always turn on two-factor authentication : see http://sco.lt/6DAZgv
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Here's Everywhere You Should Enable Two-Factor Authentication Right Now

Here's Everywhere You Should Enable Two-Factor Authentication Right Now | WHY IT MATTERS: Digital Transformation | Scoop.it
Two-factor authentication is one of the best things you can do to make sure your accounts don't get hacked.

Sites that support 2 factor authentication: Google/Gmail, LastPass, Facebook, Dropbox, Microsoft (some), Yahoo Mail, Amazon Web Service, Wordpress, DreamHost

Farid Mheir's insight:

Based on the idea that security is improved if you are required to provide 2 pieces of information. In most cases, it means something you know (a password) and something you have (a cell phone). Takes a bit of effort to setup but essential for anybody or corporation that is seriously going digital.

No comment yet.
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/