WHY IT MATTERS: Digital Transformation
215.1K views | +26 today
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'Security'. Clear
Scooped by Farid Mheir
Scoop.it!

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm?

Passwords remain the weak link in #cybersecurity as *gasp* 123456 and variations remain the most used: why do we still use them and why are password generators not the norm? | WHY IT MATTERS: Digital Transformation | Scoop.it

Most cyber attacks and data breaches remain the result of weak passwords. So, why are we still using them?

Farid Mheir's insight:

WHY IT MATTERS: I've been writing about this since the beginning of this blog and 7 years later I feel the need to remind everyone to use a password generator at home and at work. This is even more important as remote work means we will connect remotely to many more systems in the future.

gladysiak.krzysztof@gmail.com's curator insight, May 29, 2020 1:07 PM
Ważne, by tworzyć odpowiednio skomplikowane znakowo hasła celem zwiększenia bezpieczeństwa w sieci 
Scooped by Farid Mheir
Scoop.it!

State of #Cybersecurity 2020 shows that it is mostly a human resources problem - which is not going to be resolved soon and may bee exacerbated with enhanced remote work via @ISACA @CybersecurityHub

State of #Cybersecurity 2020 shows that it is mostly a human resources problem - which is not going to be resolved soon and may bee exacerbated with enhanced remote work via @ISACA @CybersecurityHub | WHY IT MATTERS: Digital Transformation | Scoop.it

The cybersecurity skills gap has been plaguing enterprises for years—but despite garnering much discussion and media coverage, little progress is being made.

State of Cybersecurity 2020 looks at questions such as:

  • How long does it take to fill a cybersecurity role with a qualified candidate?
  • What percentage of cybersecurity candidates are qualified for the role?
  • Is retention improving or worsening?
  • Which cybersecurity skills are in the highest demand?
  • Are HR teams informed partners in the search for qualified cybersecurity candidates?
  • Are cybersecurity teams becoming more gender-balanced, and are diversity programs doing enough to help?
  • What can companies do to staff up more quickly and find better-qualified candidates?
Farid Mheir's insight:

WHY IT MATTERS: this in depth study shows that cybersecurity issues in organizations stem from lack of skilled resources. With covid and remote work on the rise, the importance of cybersecurity is higher than it has ever been.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

16 Steps to Securing Your Data (and Life) via @a16z

16 Steps to Securing Your Data (and Life) via @a16z | WHY IT MATTERS: Digital Transformation | Scoop.it

Attackers look for the path of least resistance. Recently, that path has shifted from enterprise networks to you and your devices for two reasons. First, as we have built more secure software and systems, it has made it harder to …

Farid Mheir's insight:

WHY IT MATTERS: those 16 recommendations are straightforward (patch your shit), easy to understand (do not reuse passwords) but in some case they can have major impact on your experience (turning off javascript in browser). Nonetheless, good to know what you need to do - and maybe realize what you are not doing...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint | WHY IT MATTERS: Digital Transformation | Scoop.it

Protecting People cybersecurity threat report explores who’s being targeted, how they’re being attacked, and what you can do about it.

Farid Mheir's insight:

WHY IT MATTERS: this report provides data on cybersecurity attacks and the resources most at risk in organizations.

Matt Hulsey's comment, September 19, 2022 7:10 PM
Surprised to see Facilities so high up the list
Scooped by Farid Mheir
Scoop.it!

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud | WHY IT MATTERS: Digital Transformation | Scoop.it

Every year, millions of fraudulent web domains are registered by threat actors looking to impersonate trusted brands. Using these domains, they launch phishing attacks or other scams.

What are the latest trends around fraudulent domains, and how can you protect your organization?

Download the report now to learn: 

  • How threat actors create fraudulent domains
  • What characterizes fraudulent and legitimate domains
  • Which keywords and top-level domains (TLD) are trending
  • How fraudulent domains use email to launch attacks
Farid Mheir's insight:

WHY IT MATTERS: there are 350 million top level domain names - TLDNs - from google.com to fmcs.digital. This report provides a set of data about TLDNs and how they are used for fraud. A bit geeky but very interesting read.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Triangulation fraud: what is it, why is it bad, and what to do about it - confessions from Nina Kollars at #defCon is a great explanation of the fraud that plagues eCommerce retailers HT @nianasavage

In 2018 I somewhat innocently bought very expensive coffee (Nespresso capsules) online from Ebay. What followed was a series of unexpected additional packages from the manufacturer Nespresso and a lurking suspicion that something had gone terribly--if not criminally--wrong as a result of my purchase. This talk chronicles the obnoxious amounts of obsessive research and tracking that became my new hobby--stalking Nespresso fraudsters and my decidedly non-technical attempts at developing a generic search profile and reporting the fraudsters to anyone who would listen, to include : the persons whose identities had been stolen, Nespresso, Ebay, and the FBI. Ultimately I just ended up with a LOT of coffee; a lingering sense that I had committed several crimes; and no faith left in humanity.

Farid Mheir's insight:

WHY IT MATTERS: a short and entertaining video on triangulation fraud in eCommerce websites. If you buy online listen to this. If you sell online, this is the kind of crap you have to deal with.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

In the #cyberSecurity space in 2020, #malware is OUT, #phishing is IN and HUMANS are the weak link

In the #cyberSecurity space in 2020, #malware is OUT, #phishing is IN and HUMANS are the weak link | WHY IT MATTERS: Digital Transformation | Scoop.it

In 2019, we saw phishing attacks reach new levels of creativity and sophistication.

Farid Mheir's insight:

WHY IT MATTERS : the chart says it all: to protect your systems you must ensure your employees are properly trained on phishing schemes. Software solutions can help but HUMANS are the weak link in cybersecurity.

Scooped by Farid Mheir
Scoop.it!

Protection from email #phishing often warrants solutions that are not #technology based but rather focus on the weak link in the equation: #humans - this report provides some data and possible acti...

Protection from email #phishing often warrants solutions that are not #technology based but rather focus on the weak link in the equation: #humans - this report provides some data and possible acti... | WHY IT MATTERS: Digital Transformation | Scoop.it

Based on an analysis of more than 5 billion daily emails, 200 million social media accounts, and 250,000 daily malware samples, we found that a small subset of individuals with high levels of access or privilege continue to receive the majority of targeted attacks.

Highlights include: 

  • Among the most targeted malware and credential phishing attacks, nearly 30% targeted generic email aliases
  • Individual contributors and lower level management accounted for 72% of highly targeted malware and phishing attacks
  • Web-based attacks that use social engineering grew 150% vs. the previous quarter
Farid Mheir's insight:

WHY IT MATTERS: Protection from email phishing often warrants solutions that are not technology based but rather focus on the weak link in the equation: humans - this report provides some data and possible actions that should be taken.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Web security resources from @mozilla are #mustRead #essentials

Web security resources from @mozilla are #mustRead #essentials | WHY IT MATTERS: Digital Transformation | Scoop.it

Ensuring that your website or open web application is secure is critical. Even simple bugs in your code can result in private information being leaked, and bad people are out there trying to find ways to steal data. The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.

Farid Mheir's insight:

WHY IT MATTERS: every developer - web or not - should apply those principles. Otherwise how else is the web ever going to be safe?

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How facial recognition works is a short video by @Vox which explains so well the issues and potential of facial recognition #AI #facialRecognition

How facial recognition works is a short video by @Vox which explains so well the issues and potential of facial recognition #AI #facialRecognition | WHY IT MATTERS: Digital Transformation | Scoop.it

A video explainer on the technology that’s changing the meaning of the human face.

Farid Mheir's insight:

WHY IT MATTERS: cameras are everywhere - phones, streets, home, office - and AI enables new capabilities that can present massive surveillance possibilities as well as personal protection and real-time data. This very well done video - as is the case with most VOX videos - should give you a good rundown of the plus and minuses...

Marcin Golczak 's curator insight, December 19, 2019 4:11 AM
Ziwiające jak zwykłą aplikacja ułatwia nam korzystanie z telefonu lecz czy to na pewno bezpieczne 
Scooped by Farid Mheir
Scoop.it!

How Much Does Your Data Cost on the Dark Web?

How Much Does Your Data Cost on the Dark Web? | WHY IT MATTERS: Digital Transformation | Scoop.it

The Dark Web is real, and your information might be for sale there. Here’s what your data is worth. The simple answer is this: about $45. This is how much, on average, a full set of information for a credit card is selling for, including a name, SSN, birth date, and CVV.

Farid Mheir's insight:

WHY IIT MATTERS: a reminder that the value of data is not going down.

Scooped by Farid Mheir
Scoop.it!

Here’s a Long List of Data Broker Sites and How to Opt-Out of Them via @VICE

Here’s a Long List of Data Broker Sites and How to Opt-Out of Them via @VICE | WHY IT MATTERS: Digital Transformation | Scoop.it

How to get off of people search sites like Pipl, Spokeo, and WhitePages.

Farid Mheir's insight:

WHY IT MATTERS: protecting privacy is a difficult task, sometimes an impossible one. Case in point this long list of sites you have to go through to opt-out or delete your data. We need a better solution...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

"privacy not included": will your #xmas gifts be creepy or protect your #privacy? Here is a list of the best/worst by @Mozilla 

"privacy not included": will your #xmas gifts be creepy or protect your #privacy? Here is a list of the best/worst by @Mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

How creepy is that smart speaker, that fitness tracker, those wireless headphones? We created this guide to help you shop for safe, secure connected products. Smart home gadgets, fitness trackers, toys and more, rated for their privacy & security.

Farid Mheir's insight:

WHY IT MATTERS: digital transformation affects our privacy in many ways. With xmas gifting around the corner, you may find this list useful ... or creepy! ;-)

Mateusz Drygalski's curator insight, December 6, 2019 12:49 PM
Miarka przerażających prezentów pod względem prywatnoścci użytkownika
Scooped by Farid Mheir
Scoop.it!

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others...

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others... | WHY IT MATTERS: Digital Transformation | Scoop.it

you’ll learn about some of the expert roles that are often the hardest to find or are only required in specific situations. This paper details these roles, their responsibilities and the cross-functional processes that are required to successfully hunt for, respond to and prevent threats as part of a world-class security organization.

Farid Mheir's insight:

WHY IT MATTERS: cybersecurity is a relatively new field of expertise and requires specialists. This paper presents some of them and it is interesting to ask whether you need those skills in your organization and if you do, where you can find them...

Scooped by Farid Mheir
Scoop.it!

Amazon Ring camera doorbell bragged about tracking Kids on Halloween and provides camera feeds to police departments with event detection that is quite large - raises both good and bad feelings abo...

Amazon Ring camera doorbell bragged about tracking Kids on Halloween and provides camera feeds to police departments with event detection that is quite large - raises both good and bad feelings abo... | WHY IT MATTERS: Digital Transformation | Scoop.it

The home surveillance company owned by Amazon bragged on Instagram about taping millions of kids going door to door.

Farid Mheir's insight:

WHY IT MATTERS: every device being connected to the internet brings with it the possibility of remote monitoring. Here, doorbells equipped with cameras can detect who's at the door and determine who is trick or tricking at Halloween. But it can also detect burglaries, car crashes and other common neighbourhood events. Should we be concerned or feel more secured?

In the context of businesses, this can be extended to employee surveillance and possibly spying. Fun times ahead as the number of connected IOT devices is set to explode x10 in coming years.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Financial cybercrime and fraud via @McKinsey provides an overview of the #cybersecurity threats that financial institutions face today - and one can easily extrapolate to other industries such as r...

Financial cybercrime and fraud via @McKinsey provides an overview of the #cybersecurity threats that financial institutions face today - and one can easily extrapolate to other industries such as r... | WHY IT MATTERS: Digital Transformation | Scoop.it

Institutions are crossing functional boundaries to enable collaborative resistance against financial cybercrime and fraud.

Farid Mheir's insight:

WHY IT MATTERS: an excellent article that explains the different cybercrime use cases and attacks that banks are faced with, along with estimates of costs. Next article I'm looking for is one on the solutions banks can put forward to handle those crimes: blockchain? biometric authentication? ...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner

Gartner Report on #Security Organization Dynamics shows how complex it has become to make companies secure - which begs the question "who's RESPONSIBLE when a security breach occurs?" @Gartner | WHY IT MATTERS: Digital Transformation | Scoop.it

The growing cyber skills shortage drives security organizations to look for ways to mitigate the pain and danger that short-staffed security teams can experience. In its report, Security Organization Dynamics, Gartner outlines this ongoing challenge and notes how, “Persistent security skills shortages have forced security leaders to explore new ways of obtaining and managing security capabilities.”

Gartner points out that hiring may not be the only option for filling the gap, cautioning that, “Few, if any, enterprises can afford to perform all security functions in-house. Consider selective outsourcing of functions, especially those that are operationalized or ad hoc.”

Farid Mheir's insight:

WHY IT MATTERS: security, especially digital security and privacy, have become a central theme of digital transformation plans. Here Gartner surveys 300+ organizations to show different organizational structures for large, medium and small businesses.

My conclusion: there are too many people in charge of security, the governance is too complex and it is not clear who is RESPONSIBLE when a breach occurs...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc...

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc... | WHY IT MATTERS: Digital Transformation | Scoop.it

Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.

Farid Mheir's insight:

WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...

2019 report: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-media-under-assault-report-2019.pdf

 

Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations.
The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Why don't we see mobile phone sensors leveraged more often for worker safety and security in business environments? Google’s Personal Safety app detects car accidents and automatically calls 911

Why don't we see mobile phone sensors leveraged more often for worker safety and security in business environments? Google’s Personal Safety app detects car accidents and automatically calls 911 | WHY IT MATTERS: Digital Transformation | Scoop.it

Google is working on a new app for its Pixel smartphones that will use hardware sensors to detect an auto accident and automatically call emergency services if a person fails to respond.

Farid Mheir's insight:

WHY IT MATTERS: mobile phones are very personal devices that you carry with you all the time. I expect that solutions like this one, always listening in the background and reacting when a specific event occurs, will become the norm in the future. Already Alexa-siri-google are listening constantly, now solutions that merge the other sensors of the device - accelerometer, etc. - are natural extensions. They can be used for good as here - or for bad as with eavesdropping solutions that Edward Snowden made popular. I am surprised that few business applications have leveraged this already, for worker security in dangerous environment (fall detection, broken glass detection, earthquake detection, etc.) can all be included into business apps where the issues of privacy can be weighed against worker security and safety, especially for workers on the road or working in areas where they are alone (woods, etc.)

Casey Reeves's curator insight, October 18, 2019 11:35 PM
Driving safety is the focus of my personal research stemming from my job with the Postal Service. While I research accident theory and causation and ways to prevent, we do explore the possibilities of technology in case of a vehicle accident. We have technology in place in the scanners that mail carriers take with them to detect emergency situations. I personally worked with a supervisor that saved an employee's life due to his skilled use of that technology. This article provides information on another tool that can be beneficial to the safety of drivers in any company. 
Scooped by Farid Mheir
Scoop.it!

New research from @Google shows how effective is basic account hygiene at preventing hijacking with lots of useful data and links to protect your security and privacy

New research from @Google shows how effective is basic account hygiene at preventing hijacking with lots of useful data and links to protect your security and privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We teamed up with researchers from New York University and the University of California, San Diego to find out just how effective basic account hygiene is at preventing hijacking. The year-long study, on wide-scale attacks and targeted attacks, was presented on Wednesday at a gathering of experts, policy makers, and users called The Web Conference.
Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation.

Farid Mheir's insight:

WHY IT MATTERS: an article full of eye opening data on hacking and security (like only 750$ to hack someone's password) and links to protect your Google accounts (like adding recovery phone number).

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Algorithms are trawling your phone while you sleep to build a detailed profile of your habits and needs - effectively creating your "digital twin" HT @competia

Algorithms are trawling your phone while you sleep to build a detailed profile of your habits and needs - effectively creating your "digital twin" HT @competia | WHY IT MATTERS: Digital Transformation | Scoop.it

Your web browsing history is the most lucrative piece of information that can be traded.

Farid Mheir's insight:

WHY IT MATTERS: the article is a great rundown of the many data and analytics companies and solutions that work to draw your digital self portrait.

You may want to read my "Meet your digital twin" article which dives more into this topic: http://fmcs.digital/blog/digital-twin/

No comment yet.
Scooped by Farid Mheir
Scoop.it!

80 IoT Statistics for 2019 and why the next big #security and #privacy threats will come from your devices, not the #Web #Infographic

80 IoT Statistics for 2019 and why the next big #security and #privacy threats will come from your devices, not the #Web #Infographic | WHY IT MATTERS: Digital Transformation | Scoop.it

IoT has been and will be the talk of the town for many years to come. Learn the latest internet of things statistics, forecasts and facts for 2019.

The IoT is defined by everyday objects, interconnected via the internet in order to send and receive data. The reason why we connect these objects is simple: for convenience. To help you understand this technology better in 2019, we’ve created the following list of Internet of Things statistics.

Being able to arm your security system remotely, or start your washer, turn your lights on or off, or adjust the thermostat while being nowhere near them is a convenience our grandparents fantasized about. Looks like we will probably never have to worry about leaving the stove on again.

Farid Mheir's insight:

WHY IT MATTERS: with everything connected to the Internet, possibilities are endless, for good and bad...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

You’re very easy to track down, even when your data has been anonymized - 3 records match 81% of the time, 15 records match 99.98% - get over the @Desjardins data breach, it may not be that bad aft...

You’re very easy to track down, even when your data has been anonymized - 3 records match 81% of the time, 15 records match 99.98% - get over the @Desjardins data breach, it may not be that bad aft... | WHY IT MATTERS: Digital Transformation | Scoop.it

On average, in the US, using those three records, you could be correctly located in an “anonymized” database 81% of the time. Given 15 demographic attributes of someone living in Massachusetts, there’s a 99.98% chance you could find that person in any anonymized database.

Farid Mheir's insight:

WHY IT MATTERS: most of the population of Quebec is freaking out about the breach of 3M personal records recently. It is bad and should not go unnoticed but this study by MIT should put the breach in perspective: basically you cannot expect anonymity in this digital world. C'est la vie...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Summertime is good time to cleanup your #password: 5 Steps to Improve Your Online Security Now via @LastPass

Summertime is good time to cleanup your #password: 5 Steps to Improve Your Online Security Now via @LastPass | WHY IT MATTERS: Digital Transformation | Scoop.it

Want to beef up your security online? Use these five cybersecurity practices to keep your data, banking, and personal information safe. Take control today!

Farid Mheir's insight:

WHY IT MATTERS: recent security breaches highlight the importance of good passwords. This checklist can help you stay up to date and simply the task...

Fabienne Fayad's curator insight, July 19, 2019 1:07 PM
C'est une bonne idée de le faire!
Scooped by Farid Mheir
Scoop.it!

Facial Recognition Is Already Here: These Are The 30+ US Companies Testing The Technology via @CBInsights

Facial Recognition Is Already Here: These Are The 30+ US Companies Testing The Technology via @CBInsights | WHY IT MATTERS: Digital Transformation | Scoop.it

US corporates are currently using facial recognition for everything from fast food orders to trying on makeup to issuing life insurance policies, and more.

Farid Mheir's insight:

WHY IT MATTER: facial recognition used to be a very difficult thing to do but AI and machine learning specifically has blown this out the water opening the way for a slew of real world useful applications. 

The Media Lab's curator insight, June 12, 2019 8:48 AM
A great concept!
ECMFAD's curator insight, June 13, 2019 1:24 PM
Share your insight
Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/