WHY IT MATTERS: Digital Transformation
215.4K views | +8 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Privacy', 'moi.com'. Clear
Scooped by Farid Mheir
Scoop.it!

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai | WHY IT MATTERS: Digital Transformation | Scoop.it

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.

Farid Mheir's insight:

Describes recent DDoS attacks and provides links to Akamai State of the Internet report, a very useful reference.

 

WHY THIS IS IMPORTANT

Going digital often means relying on the Internet for critical business operations. This article is a stark reminder of the need to put security on the top of priority list.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security and efficiency in a world beyond passwords

Security and efficiency in a world beyond passwords | WHY IT MATTERS: Digital Transformation | Scoop.it
A world beyond passwords is possible--technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.
Farid Mheir's insight:

A very good review of the limitations of passwords and the multiple new methods we will have to enhance our digital security.

 

WHY THIS IS IMPORTANT

To go digital, being secure is very high on the list of priorities. Maslow had put security as the second layer in the pyramid of needs - and I believe this is also true in the new pyramid of digital needs!

No comment yet.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Kill the Password: A String of Characters Won't Protect You

Kill the Password: A String of Characters Won't Protect You | WHY IT MATTERS: Digital Transformation | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered.When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

Farid Mheir's curator insight, March 15, 2016 8:33 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, March 21, 2016 11:44 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, April 6, 2016 7:40 PM
DON’T •Reuse passwords. . •Use a dictionary word as your password. •Use standard number substitutions. •Use a short password DO •Enable two-factor authentication when offered. •Give bogus answers to security questions. •Scrub your online presence. •Use a unique, secure email address for password recoveries
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

The Future Of Retail Might Get Under Your Skin: get #RFID implants

The Future Of Retail Might Get Under Your Skin: get #RFID implants | WHY IT MATTERS: Digital Transformation | Scoop.it

Early this year the staff at Epicenter, a Stockholm based high-tech company, were given a choice; they could either be issued a standard employee ID card for access to the building and office equipment, or they could be injected with a tiny radio frequency identification device, placed just under the skin of their hand – otherwise known as a subcutaneous implant. Surprisingly, a number chose the chip, on the promise that with a wave of their hand they would be able to access the building, open doors, operate photocopiers and even pay for lunch in the company cafeteria. No ID cards to forget at home or passwords to remember.

In fact, the Epicenter case is hardly the first experiment of its kind. Going back as far as 2004, Barcelona nightclub owner Conrad Chase offered RFID chipping to his VIP clients enabling access to special lounges and payment capability.


Via André Bélanger, Farid Mheir
Farid Mheir's insight:

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.

 

Farid Mheir's curator insight, November 11, 2015 7:50 PM

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.


Great insight from André!

Luigi Cappel's comment, November 21, 2015 2:25 PM
For me it would depend on what part of the world I live in. In New Zealand I would have no problem wearing a chip that I could use for ID for building access, customs, instead of passwords or finger scanners. Being a law abiding citizen in a relatively corruption free country, I'd be more than happy, providing as per the law, I knew how any information about me was being used and could revoke access where it was abused. If I was living in other countries, which may remain nameless, I would steer well clear, because being innocent and law abiding doesn't mean that you are safe.
Farid Mheir's comment, November 21, 2015 5:33 PM
@Russell R. Roberts, Jr. @Luigi Cappel both of you thank you for insightful comments and reshare... as always!
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Behavioral #tracking explained in 9min #video by @gary_kovacs via @TED #mustsee #PrivacyAware @dataPrivacyDay  

As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business.
Farid Mheir's insight:

If you don't know what behavioral tracking is about, this may be an "awakening" video: be prepared.

 

 

WHY THIS IS IMPORTANT

I've been following the Firefox "collusion" add-on since its inception (it is now called "lightbeam" and you can find it here: https://www.mozilla.org/en-US/lightbeam/). I use it on a regular basis to remember the digital breadcrumbs I leave behind as I roam around on the Internet. Unfortunately, the lightbeam software add-on can only help by blocking the digital ads that track us and cannot minimize the behavioral tracking itself.

 

On this Data Privacy Day 2017, we must use this opportunity to raise our knowledge of the digital tracking that occurs in both the virtual world and the physical world. It is now a reality that we are being tracked as much in the physical world because we carry in our pockets smartphones that track our every moves - literally. Be aware, and be careful.

Farid Mheir's curator insight, September 14, 2013 12:02 PM

I've been following collusion addon since its inception and I use it on a regular basis to remember all the digital breadcrums I leave behind as I roam around on the Internet.


This is an awakening video but unfortunately the collusion software fail to offer us paths to minimize what behavioural tracking - aside from blocking all ads.

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/