WHY IT MATTERS: Digital Transformation
215.0K views | +20 today
Follow
WHY IT MATTERS: Digital Transformation
Get weekly or monthly digest of all posts in your inbox: https://fmcs.digital/wim-subscribe
Curated by Farid Mheir
Your new post is loading...

Popular Tags for this blog

Current selected tag: 'moi.com'. Clear
Scooped by Farid Mheir
Scoop.it!

7 things to do to improve your account #security

7 things to do to improve your account #security | WHY IT MATTERS: Digital Transformation | Scoop.it

How to protect your account security
1.    Stop using one word passwords
2.    Make long and strong passwords
3.    Use unique passwords for every account
4.    Don’t casually share your passwords
5.    Use a password manager to create, remember and enter your passwords
6.    Lock your mobile with a PIN or password.
7.    Enable Two-Factor Authentication

Farid Mheir's insight:

Simple, easy things to do to be more secure. Do it. Today.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering

A #hacker event demonstrates how easy it is to obtain sensitive information using #socialEngineering | WHY IT MATTERS: Digital Transformation | Scoop.it

The Social Engineering Capture the Flag (SECTF) is an annual event held within the SocialEngineer Village at the DEF CON Hacking Conference in Las Vegas. The competition was formed to demonstrate how serious social engineering threats are to companies and how even novice individuals could use these skills to obtain important information. The contest is divided into two parts, the information-gathering phase that takes place prior to DEF CON, followed by the live call phase that occurs at the DEF CON conference.

Farid Mheir's insight:

This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.

http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf 

 

WHY THIS IS IMPORTANT

Often we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.

Xixi QU's curator insight, November 27, 2016 4:06 AM
This year's DEFCON24 report is full of information about social engineering, the event and methods to protect your organization. This is IMHO a must read for every executive to see how easy it is to breach security of their organization which can potentially result in theft, both physical and digital.http://www.social-engineer.org/wp-content/uploads/2016/11/Social-Engineer-Capture-The-Flag-DEFCON24-SECTF-2016.pdf WHY THIS IS IMPORTANTOften we think that our digital lives or digital transformations must be protected with strong passwords, encryption and other digital security methods. However, time and again the "social engineers" have demonstrated that the weakest link in the chain often are the individuals, employees and partners that voluntarily divulge sensitive information. And this, no technology can prevent and companies must invest in training their employees to detect the social engineering methods and respond with appropriate actions when such techniques are being tested on them.
Scooped by Farid Mheir
Scoop.it!

Google warns journalists and professors: Your account is under attack

Google warns journalists and professors: Your account is under attack | WHY IT MATTERS: Digital Transformation | Scoop.it
A flurry of social media reports suggests a major hacking campaign has been uncovered.
Farid Mheir's insight:

Google is warning individuals that their Google accounts are being hacked - even if they turned on 2-factor authentication.

 

WHY THIS IS IMPORTANT

This news stories highlights some very important security and privacy elements:

1- Google is actively protecting security and privacy of high profile individuals which is reassuring because only they have the size and scope to fight state-funded hacking

2- I always believed 2-factor authentication was a good way to protect your digital self: looks like I was wrong. More on this later...

3- Google has been doing this since 2012, so the whole thing is not new but recent DDoS attacks using Internet of Things devices (cameras, etc.) demonstrates that hackers now have new, very effective hacking tools and they are using it.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai

Akamai on the Record KrebsOnSecurity #DDoS Attack via @BrianKrebs @Akamai | WHY IT MATTERS: Digital Transformation | Scoop.it

Internet infrastructure giant Akamai last week released a special State of the Internet report. Normally, the quarterly accounting of noteworthy changes in distributed denial-of-service (DDoS) attacks doesn’t delve into attacks on specific customers. But this latest Akamai report makes an exception in describing in great detail the record-sized attack against KrebsOnSecurity.com in September, the largest such assault it has ever mitigated.

Farid Mheir's insight:

Describes recent DDoS attacks and provides links to Akamai State of the Internet report, a very useful reference.

 

WHY THIS IS IMPORTANT

Going digital often means relying on the Internet for critical business operations. This article is a stark reminder of the need to put security on the top of priority list.

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Security and efficiency in a world beyond passwords

Security and efficiency in a world beyond passwords | WHY IT MATTERS: Digital Transformation | Scoop.it
A world beyond passwords is possible--technology is on the verge of rendering passwords obsolete, bolstering security as well as making users and customers happier.
Farid Mheir's insight:

A very good review of the limitations of passwords and the multiple new methods we will have to enhance our digital security.

 

WHY THIS IS IMPORTANT

To go digital, being secure is very high on the list of priorities. Maslow had put security as the second layer in the pyramid of needs - and I believe this is also true in the new pyramid of digital needs!

No comment yet.
Scooped by Farid Mheir
Scoop.it!

Users #Computer #Skills is Worse Than You Think: only 33% of population has high or medium via @shufflepath

Users #Computer #Skills is Worse Than You Think: only 33% of population has high or medium via @shufflepath | WHY IT MATTERS: Digital Transformation | Scoop.it
Across 33 rich countries, only 5% of the population has high computer-related abilities, and only a third of people can complete medium-complexity tasks.
Farid Mheir's insight:

A study of 250K people over 2011-2015 timeframe across 33 countries in OECD shows that most users can barely operate their computer of mobile phone.

 

WHY THIS IS IMPORTANT

Digital transformation strategies and roadmap often fail to allocate sufficient effort/budget/time/resources to accompany employees and users with the proper change management. This study shows why: most people don't know how to perform simple computer tasks. Put them in front of a new software or technology and they will fail, or even worse, they will discredit the solution so as not to show their inability. Accompany them and recognize that they need help and they will succeed in their transition. And you will succeed in your digital transformation.

gatherhazards's comment, November 16, 2016 9:41 PM
good
Scooped by Farid Mheir
Scoop.it!

Facebook DID influence the #Elections via @Mike_K_Spencer

Facebook DID influence the #Elections via @Mike_K_Spencer | WHY IT MATTERS: Digital Transformation | Scoop.it

It's hard to imagine, just twelve years ago, that the media would have been reduced to Facebook, degenerated into what we have today.

Farid Mheir's insight:

An interesting overview of the impact that social media, Facebook in particular may have had in the elections. Not sure if that is the case but for sure the world of media has evolved tremendously.

SofiJukeMari's curator insight, November 13, 2016 1:52 PM
Share your insight
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Kill the Password: A String of Characters Won't Protect You

Kill the Password: A String of Characters Won't Protect You | WHY IT MATTERS: Digital Transformation | Scoop.it
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered. When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:
You have a secret that can ruin your life. It’s not a well-kept secret, either. Just a simple string of characters that can reveal everything about you.

 

DON’T

  • Reuse passwords. If you do, a hacker who gets just one of your accounts will own them all.
  • Use a dictionary word as your password. If you must, then string several together into a pass phrase.
  • Use standard number substitutions. Think “P455w0rd” is a good password? N0p3! Cracking tools now have those built in.
  • Use a short password—no matter how weird. Today’s processing speeds mean that even passwords like “h6!r$q” are quickly crackable. Your best defense is the longest possible password.

DO

  • Enable two-factor authentication when offered.When you log in from a strange location, a system like this will send you a text message with a code to confirm. Yes, that can be cracked, but it’s better than nothing.
  • Give bogus answers to security questions. Think of them as a secondary password. Just keep your answers memorable. My first car? Why, it was a “Camper Van Beethoven Freaking Rules.”
  • Scrub your online presence. One of the easiest ways to hack into an account is through your email and billing address information. Sites like Spokeo and WhitePages.com offer opt-out mechanisms to get your information removed from their databases.
  • Use a unique, secure email address for password recoveries. If a hacker knows where your password reset goes, that’s a line of attack. So create a special account you never use for communications. And make sure to choose a username that isn’t tied to your name—like m****n@wired.com—so it can’t be easily guessed.
Farid Mheir's insight:

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

Farid Mheir's curator insight, March 15, 2016 8:33 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, March 21, 2016 11:44 AM

An old Wired magazine article from 2012 that is still as current today as it was then. Unfortunately.

 

If you don't read the whole thing, just skip to the DOs and DONTs.

And read these other articles: http://www.scoop.it/t/digital-transformation-of-businesses/?tag=Security

jasmine moriah gabrielle hummel's curator insight, April 6, 2016 7:40 PM
DON’T •Reuse passwords. . •Use a dictionary word as your password. •Use standard number substitutions. •Use a short password DO •Enable two-factor authentication when offered. •Give bogus answers to security questions. •Scrub your online presence. •Use a unique, secure email address for password recoveries
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

The Future Of Retail Might Get Under Your Skin: get #RFID implants

The Future Of Retail Might Get Under Your Skin: get #RFID implants | WHY IT MATTERS: Digital Transformation | Scoop.it

Early this year the staff at Epicenter, a Stockholm based high-tech company, were given a choice; they could either be issued a standard employee ID card for access to the building and office equipment, or they could be injected with a tiny radio frequency identification device, placed just under the skin of their hand – otherwise known as a subcutaneous implant. Surprisingly, a number chose the chip, on the promise that with a wave of their hand they would be able to access the building, open doors, operate photocopiers and even pay for lunch in the company cafeteria. No ID cards to forget at home or passwords to remember.

In fact, the Epicenter case is hardly the first experiment of its kind. Going back as far as 2004, Barcelona nightclub owner Conrad Chase offered RFID chipping to his VIP clients enabling access to special lounges and payment capability.


Via André Bélanger, Farid Mheir
Farid Mheir's insight:

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.

 

Farid Mheir's curator insight, November 11, 2015 7:50 PM

I knew they did this for dogs but never thought they did it for humans. But come to think of it, makes perfect sense. Or it will become the biggest invasion of privacy ever.


Great insight from André!

Luigi Cappel's comment, November 21, 2015 2:25 PM
For me it would depend on what part of the world I live in. In New Zealand I would have no problem wearing a chip that I could use for ID for building access, customs, instead of passwords or finger scanners. Being a law abiding citizen in a relatively corruption free country, I'd be more than happy, providing as per the law, I knew how any information about me was being used and could revoke access where it was abused. If I was living in other countries, which may remain nameless, I would steer well clear, because being innocent and law abiding doesn't mean that you are safe.
Farid Mheir's comment, November 21, 2015 5:33 PM
@Russell R. Roberts, Jr. @Luigi Cappel both of you thank you for insightful comments and reshare... as always!
Scooped by Farid Mheir
Scoop.it!

Zen and the Art of Happiness Online- 5 ways to make your site happy

The time-worn narrative is that technology disconnects us from the here and now, fosters addictive behavior, and makes us kind of stupid. The real story, groun…
Farid Mheir's insight:

start at slide 42 to find out how to bring happiness to your web site.

No comment yet.
Rescooped by Farid Mheir from WHY IT MATTERS: Digital Transformation
Scoop.it!

Behavioral #tracking explained in 9min #video by @gary_kovacs via @TED #mustsee #PrivacyAware @dataPrivacyDay  

As you surf the Web, information is being collected about you. Web tracking is not 100% evil -- personal data can make your browsing more efficient; cookies can help your favorite websites stay in business.
Farid Mheir's insight:

If you don't know what behavioral tracking is about, this may be an "awakening" video: be prepared.

 

 

WHY THIS IS IMPORTANT

I've been following the Firefox "collusion" add-on since its inception (it is now called "lightbeam" and you can find it here: https://www.mozilla.org/en-US/lightbeam/). I use it on a regular basis to remember the digital breadcrumbs I leave behind as I roam around on the Internet. Unfortunately, the lightbeam software add-on can only help by blocking the digital ads that track us and cannot minimize the behavioral tracking itself.

 

On this Data Privacy Day 2017, we must use this opportunity to raise our knowledge of the digital tracking that occurs in both the virtual world and the physical world. It is now a reality that we are being tracked as much in the physical world because we carry in our pockets smartphones that track our every moves - literally. Be aware, and be careful.

Farid Mheir's curator insight, September 14, 2013 12:02 PM

I've been following collusion addon since its inception and I use it on a regular basis to remember all the digital breadcrums I leave behind as I roam around on the Internet.


This is an awakening video but unfortunately the collusion software fail to offer us paths to minimize what behavioural tracking - aside from blocking all ads.

Curated by Farid Mheir
Get every post weekly in your inbox by registering here: http://fmcs.digital/newsletter-signup/