WHY IT MATTERS: Digital Transformation
215.0K views | +2 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'Technology'. Clear
Scooped by Farid Mheir
Scoop.it!

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint

If your job is in Marketing, PR, Facilities support, R&D, engineering, Legal or Sales then you are more at risk of cyberattacks - Cybersecurity Threat Report from @Proofpoint | WHY IT MATTERS: Digital Transformation | Scoop.it

Protecting People cybersecurity threat report explores who’s being targeted, how they’re being attacked, and what you can do about it.

Farid Mheir's insight:

WHY IT MATTERS: this report provides data on cybersecurity attacks and the resources most at risk in organizations.

Matt Hulsey's comment, September 19, 2022 7:10 PM
Surprised to see Facilities so high up the list
Scooped by Farid Mheir
Scoop.it!

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud

Internet Domain fraud report from @Proofpoint provides useful data on the more than 350M top level domain names out there and how they can be used for fraud | WHY IT MATTERS: Digital Transformation | Scoop.it

Every year, millions of fraudulent web domains are registered by threat actors looking to impersonate trusted brands. Using these domains, they launch phishing attacks or other scams.

What are the latest trends around fraudulent domains, and how can you protect your organization?

Download the report now to learn: 

  • How threat actors create fraudulent domains
  • What characterizes fraudulent and legitimate domains
  • Which keywords and top-level domains (TLD) are trending
  • How fraudulent domains use email to launch attacks
Farid Mheir's insight:

WHY IT MATTERS: there are 350 million top level domain names - TLDNs - from google.com to fmcs.digital. This report provides a set of data about TLDNs and how they are used for fraud. A bit geeky but very interesting read.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

In the #cyberSecurity space in 2020, #malware is OUT, #phishing is IN and HUMANS are the weak link

In the #cyberSecurity space in 2020, #malware is OUT, #phishing is IN and HUMANS are the weak link | WHY IT MATTERS: Digital Transformation | Scoop.it

In 2019, we saw phishing attacks reach new levels of creativity and sophistication.

Farid Mheir's insight:

WHY IT MATTERS : the chart says it all: to protect your systems you must ensure your employees are properly trained on phishing schemes. Software solutions can help but HUMANS are the weak link in cybersecurity.

Scooped by Farid Mheir
Scoop.it!

Protection from email #phishing often warrants solutions that are not #technology based but rather focus on the weak link in the equation: #humans - this report provides some data and possible acti...

Protection from email #phishing often warrants solutions that are not #technology based but rather focus on the weak link in the equation: #humans - this report provides some data and possible acti... | WHY IT MATTERS: Digital Transformation | Scoop.it

Based on an analysis of more than 5 billion daily emails, 200 million social media accounts, and 250,000 daily malware samples, we found that a small subset of individuals with high levels of access or privilege continue to receive the majority of targeted attacks.

Highlights include: 

  • Among the most targeted malware and credential phishing attacks, nearly 30% targeted generic email aliases
  • Individual contributors and lower level management accounted for 72% of highly targeted malware and phishing attacks
  • Web-based attacks that use social engineering grew 150% vs. the previous quarter
Farid Mheir's insight:

WHY IT MATTERS: Protection from email phishing often warrants solutions that are not technology based but rather focus on the weak link in the equation: humans - this report provides some data and possible actions that should be taken.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Web security resources from @mozilla are #mustRead #essentials

Web security resources from @mozilla are #mustRead #essentials | WHY IT MATTERS: Digital Transformation | Scoop.it

Ensuring that your website or open web application is secure is critical. Even simple bugs in your code can result in private information being leaked, and bad people are out there trying to find ways to steal data. The web security oriented articles listed here provide information that may help you secure your site and its code from attacks and data theft.

Farid Mheir's insight:

WHY IT MATTERS: every developer - web or not - should apply those principles. Otherwise how else is the web ever going to be safe?

No comment yet.
Scooped by Farid Mheir
Scoop.it!

How facial recognition works is a short video by @Vox which explains so well the issues and potential of facial recognition #AI #facialRecognition

How facial recognition works is a short video by @Vox which explains so well the issues and potential of facial recognition #AI #facialRecognition | WHY IT MATTERS: Digital Transformation | Scoop.it

A video explainer on the technology that’s changing the meaning of the human face.

Farid Mheir's insight:

WHY IT MATTERS: cameras are everywhere - phones, streets, home, office - and AI enables new capabilities that can present massive surveillance possibilities as well as personal protection and real-time data. This very well done video - as is the case with most VOX videos - should give you a good rundown of the plus and minuses...

Marcin Golczak 's curator insight, December 19, 2019 4:11 AM
Ziwiające jak zwykłą aplikacja ułatwia nam korzystanie z telefonu lecz czy to na pewno bezpieczne 
Scooped by Farid Mheir
Scoop.it!

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others...

How to Enhance Your Security Team #eBook suggests new roles for the #cyberSecurity age we live in: Threat Hunting Analyst, Malware Reverse Engineer, Attack Simulation Specialist and others... | WHY IT MATTERS: Digital Transformation | Scoop.it

you’ll learn about some of the expert roles that are often the hardest to find or are only required in specific situations. This paper details these roles, their responsibilities and the cross-functional processes that are required to successfully hunt for, respond to and prevent threats as part of a world-class security organization.

Farid Mheir's insight:

WHY IT MATTERS: cybersecurity is a relatively new field of expertise and requires specialists. This paper presents some of them and it is interesting to ask whether you need those skills in your organization and if you do, where you can find them...

Scooped by Farid Mheir
Scoop.it!

Financial cybercrime and fraud via @McKinsey provides an overview of the #cybersecurity threats that financial institutions face today - and one can easily extrapolate to other industries such as r...

Financial cybercrime and fraud via @McKinsey provides an overview of the #cybersecurity threats that financial institutions face today - and one can easily extrapolate to other industries such as r... | WHY IT MATTERS: Digital Transformation | Scoop.it

Institutions are crossing functional boundaries to enable collaborative resistance against financial cybercrime and fraud.

Farid Mheir's insight:

WHY IT MATTERS: an excellent article that explains the different cybercrime use cases and attacks that banks are faced with, along with estimates of costs. Next article I'm looking for is one on the solutions banks can put forward to handle those crimes: blockchain? biometric authentication? ...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc...

Akamai state of internet reports that #retailers are most at risk of #credentialAbuse with 10B of the 28B attempts over 8 months in 2018 - and situation same in 2019 via Akamai Security Intelligenc... | WHY IT MATTERS: Digital Transformation | Scoop.it

Credential abuse and botnets abusing retailer inventories is a rising problem that needs attention. On average, organizations report experiencing 12.7 credential stuffing attempts each month, with each attempt targeting 1,252 accounts. We detected nearly 28 billion credential stuffing attempts between May and December 2018. Within the retail industry, the apparel vertical, experienced 3.7 billion attempts on its own, making it the largest targeted industry during the same timeframe. So why is retail, as well as apparel, such at hot target? Short answer? Money.

Farid Mheir's insight:

WHY IT MATTERS: I find the number just huge and thus a cause for concern in the design of my systems, strategies and recommendations to my clients. I also include the definition of credential stuffing because 1) I did not know and 2) it shines a light into the power of having a global CDN network to perform those analyses...

2019 report: https://www.akamai.com/us/en/multimedia/documents/state-of-the-internet/soti-security-media-under-assault-report-2019.pdf

 

Credential abuse attempts were identified as unsuccessful login attempts for accounts using an email address as a username. In order to identify abuse attempts, as opposed to real users who can’t type, two different algorithms are used. The first is a simple volumetric rule that counts the number of login errors to a specific address. This differs from what a single organization might be able to detect because Akamai is correlating data across hundreds of organizations.
The second algorithm uses data from our bot detection services to identify credential abuse from known botnets and tools. A well-configured botnet can avoid volumetric detection by spreading its traffic amongst many targets, by using a large number of systems in its scan, or spreading the traffic out over time, just to mention a few countermeasures.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

New research from @Google shows how effective is basic account hygiene at preventing hijacking with lots of useful data and links to protect your security and privacy

New research from @Google shows how effective is basic account hygiene at preventing hijacking with lots of useful data and links to protect your security and privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We teamed up with researchers from New York University and the University of California, San Diego to find out just how effective basic account hygiene is at preventing hijacking. The year-long study, on wide-scale attacks and targeted attacks, was presented on Wednesday at a gathering of experts, policy makers, and users called The Web Conference.
Our research shows that simply adding a recovery phone number to your Google Account can block up to 100% of automated bots, 99% of bulk phishing attacks, and 66% of targeted attacks that occurred during our investigation.

Farid Mheir's insight:

WHY IT MATTERS: an article full of eye opening data on hacking and security (like only 750$ to hack someone's password) and links to protect your Google accounts (like adding recovery phone number).

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Hey, Alexa: Stop recording me - a great review of the possible privacy intrusions we face and that should also be a concern when those devices find their way in #doctor #lawyer offices via @WP #Was...

Hey, Alexa: Stop recording me - a great review of the possible privacy intrusions we face and that should also be a concern when those devices find their way in #doctor #lawyer offices via @WP #Was... | WHY IT MATTERS: Digital Transformation | Scoop.it

Our tech columnist listened to four years of his Alexa archive, and discovered Amazon tracks us in more ways than we might want.

Farid Mheir's insight:

WHY IT MATTERS: with voice enable devices making their way into the professional settings like doctors offices or lawyers office, the impact of devices that record everything that is being said in very private settings should concern us all.

Juan Pulido's curator insight, June 11, 2019 12:08 PM

From the beginning I knew that G is Big Brother.

Scooped by Farid Mheir
Scoop.it!

How to limit iPhone app tracking - 5 settings that you can change to return a bit of privacy into your digital lives, but be prepared to spend quite a bit of time to do so via @WP #WashingtonPost

How to limit iPhone app tracking - 5 settings that you can change to return a bit of privacy into your digital lives, but be prepared to spend quite a bit of time to do so via @WP #WashingtonPost | WHY IT MATTERS: Digital Transformation | Scoop.it

Our tech columnist offers some practical advice for fighting back against iOS apps hungry for your personal data.

Farid Mheir's insight:

WHY IT MATTERS: with digital transformation comes new tools and techniques that we need to learn to keep our privacy. These are 5 of them.

Scooped by Farid Mheir
Scoop.it!

The very long list of all the 100 trackers that find their way into our phones and websites via @disconnectme on @gitHub #privacy

The very long list of all the 100 trackers that find their way into our phones and websites via @disconnectme on @gitHub #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

The open source list of trackers that powers our browser extensions, Firefox’s private browsing mode, and other popular privacy tools can be found here along with a change log and notes.

Farid Mheir's insight:

WHY IT MATTERS: for geeks that want to understand which trackers exists and how they appear on mobile apps and websites. Can also be used to add them to your apps of sites, unfortunately...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Apple promises privacy, but 5400 iPhone apps share your data with #trackers, ad companies and research firms #nowhere2hide via @WP #WashingtonPost #privacy #adBlockers

Apple promises privacy, but 5400 iPhone apps share your data with #trackers, ad companies and research firms #nowhere2hide via @WP #WashingtonPost #privacy #adBlockers | WHY IT MATTERS: Digital Transformation | Scoop.it

We ran a privacy experiment to see how many hidden trackers are running from the apps on our iPhone. The tally is astounding. Apple says, “What happens on your iPhone stays on your iPhone.” Our privacy experiment showed 5,400 hidden app trackers guzzled our data — in a single week.

Farid Mheir's insight:

WHY IT MATTERS: I wrote about this many years back and it is worth an update given this very interesting article from WP. The growth of mobile tracking, yes even on iPhone, should be cause for concern. They also link to a solution, disconnect.me which I also covered in the past when it was launched as the collusion chrome plugin (in 2013!!!!). Moreover the very good github list of trackers is quite mindblowing. Yes it has been 6 years and the state of privacy has worsened in serious ways. Follow the links in the article for details but here are the 2 I consider most useful:

https://disconnect.me/

https://github.com/disconnectme/disconnect-tracking-protection

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available

Threat Intelligence is a new field of expertise with its set of resources, processes and tools - this report from via @Gartner provides insights into the field and solutions available | WHY IT MATTERS: Digital Transformation | Scoop.it

Market Guide for Security Threat Intelligence Products and Services. Key Findings:
- The term “threat intelligence” covers a diverse set of capabilities.
Client interest in industry-led government and commercial TI has increased significantly during the past two years. There are still large numbers of providers in this market, with startups also entering.
- The number and diversity of TI services, as well as expertise, have created an environment in which purchasers often struggle to compare services, and there’s still no single provider to address all of them. Many vendors can provide access to information; fewer provide truly anticipatory content or curation based on customized intelligence.
- The value of these services is sometimes constrained by the customer’s ability to afford, absorb, contextualize and, especially, use the information provided by the services.

Farid Mheir's insight:

WHY IT MATTERS: threat intelligence is a new field introduced by digital transformation. As more data is created and more processes are transferred to digital, the potential threats of fraud and other security breaches increases and requires new resources, new processes and new tools. This Gartner report provides a reference document to understand the field and help select partners.

Hamza Yousaf's comment, April 5, 2019 10:17 AM
Best ever Apple accessories
https://bit.ly/2FNzXqJ
Scooped by Farid Mheir
Scoop.it!

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy

Google rolls out Password Checkup and Cross Account Protection as a chrome extension that everyone should install and use via @google #security #privacy | WHY IT MATTERS: Digital Transformation | Scoop.it

We’re rolling out two new features, Password Checkup and Cross Account Protection, to keep your information safe beyond Google’s sites and apps.

Farid Mheir's insight:

WHY IT MATTERS: this simple extension will inform you when your user-password has been stolen - prompting you to change your password or take action. Must have for everyone.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

What Is The Magicverse (And Why)? explains how #AR will add layers of information that will persist over time to create a truly parallel universe. #wow #longPlay #mustRead via @MagicLeap

What Is The Magicverse (And Why)? explains how #AR will add layers of information that will persist over time to create a truly parallel universe. #wow #longPlay #mustRead via @MagicLeap | WHY IT MATTERS: Digital Transformation | Scoop.it

The Magicverse is an Emergent System of Systems bridging the physical with the digital, in a large scale, persistent manner within a community of people.

Farid Mheir's insight:

WHY IT MATTERS: want to know what augmented reality will look like in 10 or 20 years. Read this. But don't expect it to come together in the short-term, this is a *long* play

No comment yet.
Scooped by Farid Mheir
Scoop.it!

When surveillance meets incompetence- how an unsecured database of camera feeds and facial recognition data has exposed millions of private data in China may be a sign of things to come in the futu...

When surveillance meets incompetence- how an unsecured database of camera feeds and facial recognition data has exposed millions of private data in China may be a sign of things to come in the futu... | WHY IT MATTERS: Digital Transformation | Scoop.it

Last week brought an extraordinary demonstration of the dangers of operating a surveillance state — especially a shabby one, as China’s apparently is. An unsecured database exposed millions of records of Chinese Muslims being tracked via facial recognition — an ugly trifecta of prejudice, bureaucracy and incompetence.

Farid Mheir's insight:

WHY IT MATTERS: China is using facial recognition to monitor its citizens, this is a well documented fact. Unfortunately, not all the steps required to protect this very private information are being taken, as evidenced by this article. This raises again the importance of security to be built into our every activities, especially those that involve government or security activities.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security

Don’t Toss That Bulb, It Knows Your Password: explains how connected devices such as lightbulbs know much about you even after the end of their useful life #IOT #privacy #security | WHY IT MATTERS: Digital Transformation | Scoop.it

Whether it was here on Hackaday or elsewhere on the Internet, you’ve surely heard more than a few cautionary tales about the “Internet of Things” by now. As it turns out, giving every gadget you own access to your personal information and Internet connection can lead to unintended consequences. Who knew, right? But if you need yet another example of why trusting your home appliances with your secrets is potentially a bad idea, [Limited Results] is here to make sure you spend the next few hours doubting your recent tech purchases.

Farid Mheir's insight:

WHY IT MATTERS: the article explains how this team has successfully retrieved private information from discarded connected devices. It raises concerns about the disposal of connected products which, has everyone knows, will soon included pretty much everything in our homes and offices, from lightbulbs to refrigerators.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma...

90% of cyber-attacks start with email: email security solutions to improve - @Gartner differentiates the 3 forms of phishing attacks and describes solutions that include #technology as well as huma... | WHY IT MATTERS: Digital Transformation | Scoop.it

Phishing attacks are increasingly using impersonation to bypass traditional defense mechanisms. Weak sender identification will continue to present opportunities for creative attacks. Security and risk management leaders should use this research to adjust their strategy and business processes.
Key Challenges
Phishing attacks are still increasing as a targeting method of attackers. Phishing attacks targeting credentials will continue to escalate as applications and data migrate to better-protected cloud providers.
Email is not designed to truly authenticate sender identity. Efforts like DMARC to authenticate domains are not granular enough to authenticate users and do not address all attack types.
Most implemented secure email gateways (SEGs) are not designed with post-delivery detection and remediation techniques, costing incident responder and email admin time and reducing the feedback loop from end users.
User phishing education is a good start toward people-centric security, but current email security does not provide users with any indicators of the trust they can put in emails or the proper workflow for dealing with suspect emails.
Recommendations
Security and risk management leaders responsible for endpoint and mobile security should:
Upgrade secure email gateway solutions to cloud versions that include phishing protection, particularly for impostor or business email compromise (BEC) protection.
Integrate employees into the solution and build capabilities to detect and respond to suspect attacks.
Work with business managers to develop standard operating procedures for handling sensitive data and financial transactions.
Strategic Planning Assumptions
By 2023, sender identity verification will be a common critical component on secure email gateways and other anti-phishing solutions.
By 2023, anti-phishing education will be a critical part of the feedback loop between end users and email security solutions.
Through 2023, business compromise attacks will be persistent and evasive, leading to large financial fraud losses for enterprises and data breaches for healthcare and government organizations.

Farid Mheir's insight:

WHY IT MATTERS: we often forget that it is the simple things that make us vulnerable. Security remains a key challenge with any digital transformation and this report can help identify solutions.

Don Sadiri Daquitan Quia-eo's curator insight, February 20, 2019 8:09 PM
Phishing is a crime (cybercrime) where the criminals poses as someone. They would somehow create a poser account or they would create a fake website where the victims would log in and then their account would immediately appear to the criminals. Financial loss and stealing of other important documents or things are often the outcome of phishing crime. So, in order to avoid these incidents we need to check everything twice or thrice. For example, check the url of the website if it is legitimate like there would be "www" and "https", it means that the site you are using is SECURED.
Honnie Faith Balingway II's curator insight, February 20, 2019 10:03 PM
(My knowledge about computer networking basics)

From my knowledge, Computer networking is part of my knowledge as an i.c.t student and i konw that computer networking is as a group of two or more computer systems or other devices that are linked together to exchange data.

There are many types of computer networks. Common types of networks include the following:

The Local Area Network, Wide-area network, Metropolitan-area network,Home-area network, Virtual private network and Storage area network.
Networks share common devices and functions, such as servers, transmission media (the cabling used to connect the network) clients, shared data (e.g. files and email), network cards, printers and other peripheral devices.
And  an important relationship on networks is that of the server and the client. 
Edward Dimaden's curator insight, February 21, 2019 2:16 AM
their are many things in this world that they going to attacks some person for block mail and this issue is gonna be stop 
we us young people start to defense this issue, we united as one so stop cyber-attacks.
Scooped by Farid Mheir
Scoop.it!

Threat Intelligence Framework and Handbook by @RecordedFuture provides amazing framework to structure your security data gathering, processing and response #CIO #cybersecurity

Threat Intelligence Framework and Handbook by @RecordedFuture provides amazing framework to structure your security data gathering, processing and response #CIO #cybersecurity | WHY IT MATTERS: Digital Transformation | Scoop.it

This infographic breaks down the chapters of our new handbook by security roles to show how each role can identify risks faster and more accurately.

Farid Mheir's insight:

WHY IT MATTERS: this book provides a wealth of insights to help your IT team craft a proper threat intelligence strategy and organization.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution

New year resolution: change your passwords - or better yet, start using a Password Manager via @SheHacksPurple #security #passwords #newYearResolution | WHY IT MATTERS: Digital Transformation | Scoop.it

Passwords are awful. The software security industry expects us to remember 100+ passwords, that are complex (variations of upper & lowercase, numbers and special characters), that are supposed to be changed every 3 months, with each one being unique. Obviously this is impossible for most people, and for those whom it is possible, why would they want to waste all of that brain power on something that is, essentially, meaningless?

*** This article is for beginners in security or other IT folk, not experts.

Farid Mheir's insight:

WHY IT MATTERS: I wrote about it so much in the past but have not recently. I find new year resolution to be the best time to start good new habits. Here this article provides reasons why you should start using password manager tools, and provides a list to help you get started. Now, GO!

theclickfit's comment, January 6, 2019 12:22 PM
https://www.theclickfit.com/pro-testosterone/
speedtrafikk's comment, January 7, 2019 5:03 AM
interest
Scooped by Farid Mheir
Scoop.it!

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum

This Tech Would Have Spotted the Secret Chinese Chip in Seconds via @IEEE_Spectrum | WHY IT MATTERS: Digital Transformation | Scoop.it

So why isn’t this system in widespread use? After all, much of it has been available since 2014. (Tehranipoor even described some in his 2017 article for IEEE Spectrum about the dangers of cloned chips.) “Sometimes a technology is ready, but it’s not used by companies because an attack hasn’t been seen to be real,” Tehranipoor says. This attack might be enough to change that perception, he says.  

Farid Mheir's insight:

WHY IT MATTERS: as the article states, technology sometimes exists but most don'T feel this is an important issue - until it is too late or catastrophic event occurs. We can extrapolate this concern to pretty much everything regarding cybersecurity these days...

No comment yet.
Scooped by Farid Mheir
Scoop.it!

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password

New service from Firefox called Monitor helps you find out if your account has been hacked #security #hacking #password | WHY IT MATTERS: Digital Transformation | Scoop.it

Have your accounts been leaked or stolen in a data breach? Find out at Firefox Monitor. Search our database and sign up for alerts.

Farid Mheir's insight:

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Vezta & Co.'s curator insight, September 29, 2018 11:27 AM

WHY IT MATTERS: this new service will help you determine if your account has been hacked and watch for it. This is a new twist on a service I discussed before http://fmcs.digital/?s=pwned but that remains more valuable than ever today.

Scooped by Farid Mheir
Scoop.it!

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat

Email Threat Report explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates #phishing #email #threat | WHY IT MATTERS: Digital Transformation | Scoop.it

As the point of entry for 91% of cyber attacks, email is every organization’s biggest vulnerability. From malware to malware-less attacks including impersonation attacks like CEO fraud, a single malicious email can cause significant brand damage and financial losses. Understanding these ever evolving attacks and identifying the tactics used, is key to staying one step ahead of cyber criminals.

Farid Mheir's insight:

WHY IT MATTERS: this very good paper explains in simple terms how hackers impersonate friends and colleagues in emails with tremendous success rates. Be aware!

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/