WHY IT MATTERS: Digital Transformation
214.9K views | +6 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tags: 'Security', 'moi.com'. Clear
Scooped by Farid Mheir
Scoop.it!

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web | WHY IT MATTERS: Digital Transformation | Scoop.it

Instead of Google, Facebook, Twitter or LinkedIn owning your data, imagine a world in which you control the data about yourself and reveal only what is minimally necessary when required. It would be the web equivalent of proving to a bouncer only that you're older than 21, instead of also handing over your birthdate, address and whether you've elected to be an organ donor.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

To be in full control of our private information may be the holly grail of the Internet today. This new technology appears to solve the problem and provide a solution for all of us. For the moment in trial for developers, I can't wait to try it out....

No comment yet.
Scooped by Farid Mheir
Scoop.it!

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing 

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing  | WHY IT MATTERS: Digital Transformation | Scoop.it

The US Department of Homeland Security used software to scan social media accounts of people visiting America, but it didn't work properly.

Under President Obama, the government considered asking people to voluntarily submit social media profiles, but since the election of President Trump the scheme may become mandatory and more invasive.

The new boss of the US Department of Homeland Security, John Kelly, has said that such checks should be mandatory and travelers should also be forced to provide passwords and banking records. This may take weeks or months, he said, but people will just have to wait before visiting this shining city on the hill.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Besides the obvious invasion fo privacy, this may actually hint at what the future may look like with the miniaturization of cell phones, the presence of heads-up displays and augmented reality. When meeting someone, or simply crossing someone on the street, face recognition and other tools may search the web to provide insights about people we cross and stand in line at the checkout counter. 

The impact of such constant surveillance may increase an already high fear of others or increase the impact of wrongful information about ourselves that may reside online.

Even more reasons to protect your digital twin and ensure your digital footprint is minimal.

Follow these links for more.

- know your digital twin: fmcs.digital/blog/digital-twin

- 10 actions to take to protect your digital twin: fmcs.digital/blog/digital-moi-get-started-10-actions 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

8 tips to encrypt your entire life in less than an hour

8 tips to encrypt your entire life in less than an hour | WHY IT MATTERS: Digital Transformation | Scoop.it

Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson's disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Start by reading this article then read my top 10 things to do along the same lines: fmcs.digital/blog/digital-moi-get-started-10-actions 

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1 | WHY IT MATTERS: Digital Transformation | Scoop.it

This survey finds that a majority of Americans have directly experienced some form of data theft or fraud, that a sizeable share of the public thinks that their personal data have become less secure in recent years, and that many lack confidence in various institutions to keep their personal data safe from misuse. In addition, many Americans are failing to follow digital security best practices in their own personal lives, and a substantial majority expects that major cyberattacks will be a fact of life in the future.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

As I wrote recently in the "Pyramid of Digital Needs" (fmcs.digital/blog/pyramid-of-digital-needs/), security is one of the most basic needs. When we don't feel secure and private then it is difficult to enjoy the benefits of social networks and all the other tools that digital now provides. It is essential that corporations address security and privacy in a meaningful way in order for their clients, employees and partners to use their new digital tools and embrace the digital transformation that most enterprises have recently embarked on.

 

Also worth reading from Pew Research:

araedora's comment, February 22, 2017 9:56 PM
good
Scooped by Farid Mheir
Scoop.it!

Public Perceptions of Privacy and Security in the Post-Snowden Era is Low says Report from @pewresearch 

Public Perceptions of  Privacy and Security in the Post-Snowden Era is Low says Report from @pewresearch  | WHY IT MATTERS: Digital Transformation | Scoop.it

The majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.

When Americans are asked what comes to mind when they hear the word “privacy,” there are patterns to their answers. When responses are grouped into themes, the largest block of answers ties to concepts of security, safety, and protection. For many others, notions of secrecy and keeping things “hidden” are top of mind when thinking about privacy.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

As I wrote recently in the "Pyramid of Digital Needs" (fmcs.digital/blog/pyramid-of-digital-needs/), security is one of the most basic needs. When we don't feel secure and private then it is difficult to enjoy the benefits of social networks and all the other tools that digital now provides. It is essential that corporations address security and privacy in a meaningful way in order for their clients, employees and partners to use their new digital tools and embrace the digital transformation that most enterprises have recently embarked on.

 

Also worth reading from Pew Research:

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Mitigating the Risks of Social Login via @hbr

Mitigating the Risks of Social Login via @hbr | WHY IT MATTERS: Digital Transformation | Scoop.it

These third party login tools promise more traffic, more subscribers, more members, more customers and more sales — and those promises have come true: as some have noted, up to 80% of web users choose Facebook Connect or another social authentication option when it’s available (as opposed to signing up for a site with their email address), and Facebook itself has claimed that social authentication increases registration by 30-200%. (...) But is that promise worth the price of losing direct access to your customers’ contact information and profiling information — or for that matter, direct access to customers themselves?

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Social logins are very useful but they carry security and privacy concerns that every company must examine as they move to digitalize everything. In "Kill the password" (fmcs.digital/blog/kill-the-password-a-string-of-characters-wont-protect-you/), the author shows the impact of having multiple websites and applications connected with one another. This is a security concern that must be addressed, mitigated or at the very least highlighted so that everyone involved is aware of the risks and the benefits.

Other articles:

axiomzaftig's comment, February 6, 2017 10:05 PM
Good
heartbeatdisc's comment, February 6, 2017 10:23 PM
Breathtaking...!!
Wo's curator insight, February 10, 2017 7:18 AM
Let the word spread :)
Scooped by Farid Mheir
Scoop.it!

Identity theft in top10 of American #fears via @qz

Identity theft in top10 of American #fears via @qz | WHY IT MATTERS: Digital Transformation | Scoop.it

Chapman University has conducted a Survey of American Fears for more than three years. It asks 1,500 adults what they fear most. It organizes the fears into categories that include personal fears, conspiracy theories, terrorism, natural disasters, paranormal fears, and more recently, fear of Muslims.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Expect to hear more about security threats and fears in the coming years. In the digital world, I suggest that there is a "hierarchy of digital needs" (see the pyramid of digital needs fmcs.digital/blog/pyramid-of-digital-needs/) and that if we do not feel secure in the digital world, we will not be able to leverage the different tools and solutions available to us. In fact, the research shows that our fears are exacerbated when we are not in control, which is the case for most people as they do not fully understand digital technologies (layer 1 in the pyramid) and do not feel secure (layer 2).

 

"...many things affect how we perceive risk:

  • do you trust the person you are dealing with
  • control vs. lack of control (lack of control inflates risk perceptions)
  • is it catastrophic or chronic (catastrophic inflates risk perceptions)
  • does it incite dread or anger (dread inflates risk perceptions)
  • uncertainty (lack of knowledge about something inflates risk perceptions)

“Most people do not distinguish well between a one-in-a-thousand risk and a one-in-a-million risk,” said Mark Egan, an associate advisor at the Behavioral Insights Group in London.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

The Internet Health Report: @mozilla 

The Internet Health Report: @mozilla  | WHY IT MATTERS: Digital Transformation | Scoop.it

Mozilla’s new open source initiative to document and explain what’s happening to the health of the Internet. Combining research from multiple sources, we collect data on five key topics and offer a brief overview of each.

Farid Mheir's insight:

Mozilla has always been promoting Internet security and privacy and this new report paves the way for a very interesting ongoing look at key elements of the public Internet.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Meet your digital twin & the #digital #exhaust you leave behind via @fmheir #PrivacyAware 

Meet your digital twin & the #digital #exhaust you leave behind via @fmheir #PrivacyAware  | WHY IT MATTERS: Digital Transformation | Scoop.it

You have a twin – a “digital” twin. It does everything you do.

The same way you exercise your body to stay fit, or brush your teeth to prevent long-term decay and problems, your digital twin needs care so that it does not become a problem in the future. Get to know this twin and you can manage it, secure it and protect it. Here is how to do this.

 

Farid Mheir's insight:

Read this important post to understand just how many traces we leave behind as we lead our daily lives.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Are You Sure You Want to Know What Google/Apple/Facebook Knows About You? #privacyAware @dataPrivacyDay 

Are You Sure You Want to Know What Google/Apple/Facebook Knows About You? #privacyAware @dataPrivacyDay  | WHY IT MATTERS: Digital Transformation | Scoop.it

The Wall Street Journal did an interesting piece looking at Google, privacy and the extent of their knowledge (as well as other entities like Facebook). I suggest you read it for the details. The following image gives some insight into just how much Google has on one WSJ reporter.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

On this Data Privacy Day 2017, I thought I would review what Google, Apple, Facebook and others know about me. Unfortunately, it looks like this information is difficult to find and pretty much the only data we can find is from Google. So, let's assume Apple, Facebook, twitter, and others know as much if not more.

Google tools that will show you what they know about you:

Other articles about those tools:

Wo's curator insight, January 31, 2017 3:05 PM
Yut got to know this!
Scooped by Farid Mheir
Scoop.it!

Today is Data Privacy Day: what will you do to protect yourself better? #PrivacyAware @DataPrivacyDay 

Today is Data Privacy Day: what will you do to protect yourself better? #PrivacyAware @DataPrivacyDay  | WHY IT MATTERS: Digital Transformation | Scoop.it

Data Privacy Day Reminds Organizations That Protecting Customers’ Privacy is Critical to Their Business

Farid Mheir's insight:

If you only do one thing here is what you should be doing: 

http://fmcs.digital/blog/digital-moi-introduction/ 

No comment yet.
Rescooped by Farid Mheir from Tech Latest
Scoop.it!

INFOGRAPHIC: Here’s How Google Tracks You - and What You Can Do About It

INFOGRAPHIC: Here’s How Google Tracks You - and What You Can Do About It | WHY IT MATTERS: Digital Transformation | Scoop.it
Just about anyone who's online is in some way interacting with a Google product. Here's how Google tracks you -- and what you can do about it.

Via Peter Azzopardi
Farid Mheir's insight:

A good overview.

Patryk Kaźmierski's curator insight, January 25, 2017 5:37 AM

Infografika na temat google.

elearning at eCampus ULg's curator insight, January 25, 2017 9:35 AM
An excellent reminder
Marcin Golczak 's curator insight, December 21, 2019 11:53 AM
Prywatność i bezpieczeństwo danych (Yahoo!, Evernote, a Rosja, patrzymy na Ciebie) obejmuje się jako wielki temat na nadchodzący rok, więc myślimy
Scooped by Farid Mheir
Scoop.it!

7 things to do to improve your account #security

7 things to do to improve your account #security | WHY IT MATTERS: Digital Transformation | Scoop.it

How to protect your account security
1.    Stop using one word passwords
2.    Make long and strong passwords
3.    Use unique passwords for every account
4.    Don’t casually share your passwords
5.    Use a password manager to create, remember and enter your passwords
6.    Lock your mobile with a PIN or password.
7.    Enable Two-Factor Authentication

Farid Mheir's insight:

Simple, easy things to do to be more secure. Do it. Today.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering | WHY IT MATTERS: Digital Transformation | Scoop.it

The Social Engineering Capture the Flag (SECTF) is an annual event held within the SocialEngineer Village at the DEF CON Hacking Conference in Las Vegas. The competition was formed to demonstrate how serious social engineering threats are to companies and how even novice individuals could use these skills to obtain important information. The contest is divided into two parts, the information-gathering phase that takes place prior to DEF CON, followed by the live call phase that occurs at the DEF CON conference.

Farid Mheir's insight:

This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.

http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf 

 

WHY THIS IS IMPORTANT

Often we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.

Xixi QU's curator insight, November 27, 2016 4:06 AM
This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf WHY THIS IS IMPORTANTOften we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.
Scooped by Farid Mheir
Scoop.it!

Google warns journalists and professors: Your account is under attack

Google warns journalists and professors: Your account is under attack | WHY IT MATTERS: Digital Transformation | Scoop.it
A flurry of social media reports suggests a major hacking campaign has been uncovered.
Farid Mheir's insight:

Google is warning individuals that their Google accounts are being hacked - even if they turned on 2-factor authentication.

 

WHY THIS IS IMPORTANT

This news stories highlights some very important security and privacy elements:

1- Google is actively protecting security and privacy of high profile individuals which is reassuring because only they have the size and scope to fight state-funded hacking

2- I always believed 2-factor authentication was a good way to protect your digital self: looks like I was wrong. More on this later...

3- Google has been doing this since 2012, so the whole thing is not new but recent DDoS attacks using Internet of Things devices (cameras, etc.) demonstrates that hackers now have new, very effective hacking tools and they are using it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai | WHY IT MATTERS: Digital Transformation | Scoop.it

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.

Farid Mheir's insight:

Describes recent DDoS attacks and provides links to Akamai State of the Internet report, a very useful reference.

 

WHY THIS IS IMPORTANT

Going digital often means relying on the Internet for critical business operations. This article is a stark reminder of the need to put security on the top of priority list.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security and efficiency in a world beyond passwords

Security and efficiency in a world beyond passwords | WHY IT MATTERS: Digital Transformation | Scoop.it
A world beyond passwords is possible--technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.
Farid Mheir's insight:

A very good review of the limitations of passwords and the multiple new methods we will have to enhance our digital security.

 

WHY THIS IS IMPORTANT

To go digital, being secure is very high on the list of priorities. Maslow had put security as the second layer in the pyramid of needs - and I believe this is also true in the new pyramid of digital needs!

No comment yet.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Kill the Password: A String of Characters Won't Protect You

Kill the Password: A String of Characters Won't Protect You | WHY IT MATTERS: Digital Transformation | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered.When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

Farid Mheir's curator insight, March 15, 2016 8:33 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, March 21, 2016 11:44 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, April 6, 2016 7:40 PM
DON’T •Reuse passwords. . •Use a dictionary word as your password. •Use standard number substitutions. •Use a short password DO •Enable two-factor authentication when offered. •Give bogus answers to security questions. •Scrub your online presence. •Use a unique, secure email address for password recoveries
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Behavioral #tracking explained in 9min #video by @gary_kovacs via @TED #mustsee #PrivacyAware @dataPrivacyDay  

As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business.
Farid Mheir's insight:

If you don't know what behavioral tracking is about, this may be an "awakening" video: be prepared.

 

 

WHY THIS IS IMPORTANT

I've been following the Firefox "collusion" add-on since its inception (it is now called "lightbeam" and you can find it here: https://www.mozilla.org/en-US/lightbeam/). I use it on a regular basis to remember the digital breadcrumbs I leave behind as I roam around on the Internet. Unfortunately, the lightbeam software add-on can only help by blocking the digital ads that track us and cannot minimize the behavioral tracking itself.

 

On this Data Privacy Day 2017, we must use this opportunity to raise our knowledge of the digital tracking that occurs in both the virtual world and the physical world. It is now a reality that we are being tracked as much in the physical world because we carry in our pockets smartphones that track our every moves - literally. Be aware, and be careful.

Farid Mheir's curator insight, September 14, 2013 12:02 PM

I've been following collusion addon since its inception and I use it on a regular basis to remember all the digital breadcrums I leave behind as I roam around on the Internet.


This is an awakening video but unfortunately the collusion software fail to offer us paths to minimize what behavioural tracking - aside from blocking all ads.

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/