Digital Transformation of Businesses
88.3K views | +62 today
Follow
Digital Transformation of Businesses
A selection of documents, articles, papers, videos and other content for those interested in the transformation that is required when going 100% digital in an organization. I also try to highlight the impacts, both positives and negatives of that transformation. Like it? Please click "Recommend"
Curated by Farid Mheir
Your new post is loading...
Scooped by Farid Mheir
Scoop.it!

Equifax Breach Response Turns Dumpster Fire & stock crash — via @briankrebs

Equifax Breach Response Turns Dumpster Fire & stock crash — via @briankrebs | Digital Transformation of Businesses | Scoop.it

As noted in yesterday’s breaking story on this breach, the Web site that Equifax advertised as the place where concerned Americans could go to find out whether they were impacted by this breach — equifaxsecurity2017.com — is completely broken at best, and little more than a stalling tactic or sham at worst.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Equifax monopoly should end because there are so many ways to do the same work they do in more transparent and rapid fashion. Anyone that has had to request an equifax score or report can testify how long and tedious the process is. The way they have handled the breach is absolutely unprofessional and hopefully a sign that their time has come - as evidenced by this report from Krebs and the fact their stock is being crushed.

http://www.businessinsider.com/equifax-stock-price-options-traders-on-further-decline-after-security-breach-2017-9 

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Never Post or Trash Your Airline Boarding Pass via @krebs

Never Post or Trash Your Airline Boarding Pass via @krebs | Digital Transformation of Businesses | Scoop.it

In What’s In a Boarding Pass Barcode? A Lot, KrebsOnSecurity told the story of a reader whose friend posted a picture of a boarding pass on Facebook. The reader was able to use the airline’s Web site combined with data printed on the boarding pass to discover additional information about his friend. That data included details of future travel, the ability to alter or cancel upcoming flights, and a key component need to access the traveler’s frequent flyer account. 

More recently, security researcher Michal Špaček gave a talk at a conference in the Czech Republic in which he explained how a few details gleaned from a picture of a friend’s boarding pass posted online give him the ability to view passport information on his friend via the airline’s Web site, and to change the password for another friend’s United Airlines frequent flyer account.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This article provides detailed examples and further reading links that shows why it is never a good idea to post pictures of barcodes on social networks. They can be read and the information they contain extracted - potentially revealing personal information.

You have been warned.

more...
prgnewshawaii's curator insight, August 26, 12:03 AM

Thanks to reporter Farid Mheir for this security alert. Be careful what you do with your airline boarding pass--it could compromise your identity.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

If you’ve used Bitcoin to buy anonymously, the transaction may not have been private at all says #Princeton #MIT

If you’ve used Bitcoin to buy anonymously, the transaction may not have been private at all says #Princeton #MIT | Digital Transformation of Businesses | Scoop.it

Web merchants routinely leak data about purchases. And that can make it straightforward to link individuals with their Bitcoin purchases, say cybersecurity researchers. You can preserve your privacy as long as the pseudonym is not linked to you. But as soon as somebody makes the link to one of your anonymous books, the ruse is revealed. Your entire writing history under your pseudonym becomes public. Similarly, as soon as your personal details are linked to your Bitcoin address, your purchase history is revealed too.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

I wrote about the lack of privacy due to ad trackers and beacons many times in the past. Here is another application that shows how they can be used to identity your bitcoin transactions. The article explains why this is so and how privacy can be kept on the blockchain.

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

How a digital footprint is used to track you online and how to erase it

How a digital footprint is used to track you online and how to erase it | Digital Transformation of Businesses | Scoop.it
Anonymity, like security, has many layers. Observers have developed methods of piercing anonymity which involve differing levels of technology.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

A relatively technical explanation of the methods used to track people on the web.

more...
prgnewshawaii's curator insight, July 17, 11:49 AM

Thanks to reporter Farid Mheir for this look at how tracking technology follows you everywhere online. Nothing is private anymore.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

How to remain completely #anonymous and hidden #online

How to remain completely #anonymous and hidden #online | Digital Transformation of Businesses | Scoop.it
These are the steps you can take and the tools you'll need to remain anonymous and hidden online. Tor, VPN, burner emails, encryption, bitcoin, etc.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Discusses different solutions to remain anonymous online, from TOR to bitcoins.

more...
prgnewshawaii's curator insight, July 14, 5:35 PM

Thanks to reporter Farid Mheir for this fascinating post on how to remain anonymous online and largely invisible to most people. You'll need the Tor browser, a VPN, bitcoin, disposable e-mails, and a thorough knowledge of encryption.  If you're serious about leaving hackers and snooping government agencies behind, pay careful attention to the suggestions in this article.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Lumen Privacy Monitor, a mobile app that shows which apps violate your #privacy

Lumen Privacy Monitor, a mobile app that shows which apps violate your #privacy | Digital Transformation of Businesses | Scoop.it

Your mobile phone hosts a rich array of information about you and your behavior. This includes a wide range of unique identifiers and sensitive personal information that enables online tracking, often times for delivering targeted advertisement. It is, however, striking how little insight and control we, as mobile users have into the operation and performance of our devices, into how (or whether) they protect information we entrust to them, and who they share it with. Further, it is not just regular users that are in the dark; much of the operation of mobile devices remains mysterious even to experts.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is a research project that exposes the privacy vulnerabilities of our mobile phones and the apps we install on them...

more...
prgnewshawaii's curator insight, July 1, 12:46 AM

Thanks to reporter Farid Mheir for this sobering report on just how vulnerable our mobile apps are.  A handy tool that will both amaze and scare you.  Nothing is private anymore.

Russell Roberts

Hawaii Intelligence Digest

Technical bulls's comment, July 1, 2:53 AM
http://www.technicalbulls.com/how-to-fix-hulu-streaming-errors-in-a-quick-and-easy-way/
Scooped by Farid Mheir
Scoop.it!

2min video on how to pick the best #password

2min video on how to pick the best #password | Digital Transformation of Businesses | Scoop.it
Using password managers like LastPass and 1Password are essential to your online security — cyber security expert Kevin Mitnick explains why.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Only thing protecting you and your privacy is your password - and 2 factor authentication.  Do it!

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

How to Browse the Web and Leave No Trace

How to Browse the Web and Leave No Trace | Digital Transformation of Businesses | Scoop.it
On today’s web it’s hard to set a (digital) foot online without it attracting dozens of trackers and log entries, as companies look to learn everything about you and sell that data on to advertisers. To hide you’ve got a few tools at your disposal, many of which we’ve talked about in the past, and all of which add up to a largely anonymous browsing experience. What we can’t do is promise 100 percent that you won’t be tracked—we’re not privy to the inner workings of the FBI or your employer’s IT system—but this is as much as you can do.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is the basics you need to know: incognito mode, VPNs and TOR network. If you don't read this.

more...
prgnewshawaii's curator insight, June 24, 11:28 AM

Thanks to reporter Farid Mheir for showing us how to surf the internet without leaving too many traces behind.  Remember, VPN, Tor, and incognito mode.

Russell Roberts

Hawaii Intelligence Digest

tavaresandro's comment, June 24, 2:37 PM
https://www.amazon.com/gp/aw/d/B00BDVBGQC/ref=mp_s_a_1_1?ie=UTF8&qid=1498329408&sr=8-1&pi=AC_SX236_SY340_QL65&keywords=how+to+be+anonymous+online&dpPl=1&dpID=514ii89nXOL&ref=plSrch
Scooped by Farid Mheir
Scoop.it!

Amazing to see how so many people #trust companies & manufacturers with #security #privacy

Amazing to see how so many people #trust companies & manufacturers with #security #privacy | Digital Transformation of Businesses | Scoop.it

With the Supreme Court slated to rule next term on whether cellphone location data requires a search warrant, a new poll shows that a majority of U.S. adults support law enforcement accessing certain personal data for someone under investigation, but only if it's authorized by a warrant. Polling was conducted June 8 through June 12 among 2,200 U.S. adults. Morning Consult is the official polling partner of POLITICO, Vox, Fortune, and Bloomberg News.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

You have to trust companies and manufacturers with your private data to interact with them or use their products. What are people who distrust those companies doing? Not buying on Amazon? Not buying a smartphone? I guess not.

more...
prgnewshawaii's curator insight, June 22, 7:58 PM

Thanks to reporter Farid Mheir for this look at companies that most of us trust with our private data.  Considering how many data breaches amazon, facebook, and twitter have experienced, it's a bit surprising that we still trust these people with our personal data.  I suppose the trade off is worth it to many of us.

Russell Roberts

Hawaii Intelligence Digest

Rescooped by Farid Mheir from Location Is Everywhere
Scoop.it!

Thieves use GPS apps to track and steal bikes in Wellington

Thieves use GPS apps to track and steal bikes in Wellington | Digital Transformation of Businesses | Scoop.it
Police warn capital cyclists of "opportunistic" thieves, who may be using publicly available data to find unguarded bikes.

Via Luigi Cappel
Farid Mheir's insight:

WHY THIS IS IMPORTANT

This is similar to the old pleaserobme.com website that roamed facebook statuses to identify people that may be out of their homes (http://mashable.com/2010/02/17/pleaserobme/). OF course this is also possible with apps that track your position on your phone. Be aware!

more...
Luigi Cappel's curator insight, June 20, 3:16 PM
An unexpected downside of sharing data from apps like Strava or Map My Ride. I've used these apps for walking but I don't think anyone would want to steal my shoes.
Many of my friends who ride bikes like to share rides with each other, boast about their times and today from a commuter perspective, it isn't a bad idea to share routes from the perspective of how to get to work more quickly. 
The problem is that thieves are getting smarter as well and where people are sharing their routes publicly as opposed to just with friends, it appears that they are advising bike thieves where to find their bikes at the destination of their commute.
A couple of thoughts for those of you who are cycling:
1. Don't share your location or ride data with people you don't know and trust.
2. Watch out for a new solution at Kickstarter called Magpie http://kck.st/2rVQXpN and if you invest in the next 8 days you can get 3 tracking devices for $145 to be delivered early in the new year, that are small, self contained and include a year's tracking. Stash one of those babies on your back and if it does get stolen, you get your bike back and a crook get's caught. It's waterproof and has a SIM card built in so doesn't require that you have people with a Bluetooth app installed and nearby. I've got 3 on order and I don't even own a bike!
Scooped by Farid Mheir
Scoop.it!

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web

Is the dawn of a #privacy #secure web near? Blockstack Unveils A Browser For The Decentralized Web | Digital Transformation of Businesses | Scoop.it

Instead of Google, Facebook, Twitter or LinkedIn owning your data, imagine a world in which you control the data about yourself and reveal only what is minimally necessary when required. It would be the web equivalent of proving to a bouncer only that you're older than 21, instead of also handing over your birthdate, address and whether you've elected to be an organ donor.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

To be in full control of our private information may be the holly grail of the Internet today. This new technology appears to solve the problem and provide a solution for all of us. For the moment in trial for developers, I can't wait to try it out....

more...
prgnewshawaii's curator insight, June 1, 12:50 AM

Thanks to reporter Farid Mheir for this enlightening report on development of a browser that secures your privacy.  I'm looking forward to this new technology.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Google tracks #creditCard transactions + mobile locations + loyalty to measure impact of #ads on store sales

Google tracks #creditCard transactions + mobile locations + loyalty to measure impact of #ads on store sales | Digital Transformation of Businesses | Scoop.it
If you collect email information at the point of sale for your loyalty program, you can import store transactions directly into AdWords yourself or through a third-party data partner. And even if your business doesn’t have a large loyalty program, you can still measure store sales by taking advantage of Google’s third-party partnerships, which capture approximately 70% of credit and debit card transactions in the United States. There is no time-consuming setup or costly integrations required on your end. You also don’t need to share any customer information. After you opt in, we can automatically report on your store sales in AdWords.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

So many people tell me that they are not on Facebook because they want to keep their privacy. This is another proof that privacy does not exist anymore and that there is no line between online and real-world. Please all be aware and try to put into practice the tips I share during my talks on me.com and the management of your digital twin. for more, read these:

more...
No comment yet.
Scooped by Farid Mheir
Scoop.it!

Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs on Security

Website Flaw Let True Health Diagnostics Users View All Medical Records — Krebs on Security | Digital Transformation of Businesses | Scoop.it

To demonstrate the flaw, Mursch logged into his account at True Health and right clicked on the PDF file for his latest health report. He showed how the site would readily cough up someone else’s detailed health records and blood tests if he modified a single digit in the link attached to that PDF record and then refreshed the page.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

We delegate our privacy to the companies we interact with every day: Google for emails and photos, banks for cash, credit cards for transaction data, governments for our taxes and medical clinics and labs for our health data. Well this story shows that health clinics should take care to secure and protect our health data more securely. By the way, the breach exposed here is very basic to prevent and should never occur in today's world of technology. Depressing...

more...
prgnewshawaii's curator insight, May 12, 2:01 AM

Thanks to reporter Farid Mheir for this sobering looks at the security vulnerabilities of your health records. There is no excuse for this lapse of security.

Russell Roberts

Hawaii Intellilgence Digest

Scooped by Farid Mheir
Scoop.it!

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned

More reasons to enable #2FA 2 factor authentication, never reuse #password & register to @HaveIbeenPwned | Digital Transformation of Businesses | Scoop.it
The short version: I'm loading over 1 billion breached accounts into HIBP. These are from 2 different "combo lists", collections of email addresses and passwords from all sorts of different locations. I've verified their accuracy (including my own record in one of them) and many hundreds of millions of the
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Pretty much your whole life is online and digitize today. Your only protection from crooks is strong passwords that you never reuse. This article provides in depth discussion on the millions of passwords that are being sold for few dollars on the dark web. It should help you understand why this is important and what to do to be more secure.

more...
GLOBALHACKERS.RU's curator insight, May 7, 8:34 AM


UNBELIEVABLE,THIS IS SO TRUE...!!!,HOW I MADE $500,000.00 DOLLARS JUST IN 2 DAYS..VISIT >>WWW.WUBUGZ.NET

HACKED PAYPAL transfer,hacked WESTERN UNION transfer, BANK TRANSFER, MONEYGRAM TRANSFER/LOGINS, CCTOP UP visit www.wubugz.net

GET 100% LEGIT HACKED PAYPAL ACCOUNTS/transfers,WESTERN UNION transfers,BANK TRANSFER,MONEYGRAM TRANSFER/LOGINS,CCTOP UP,

>> WWW.WUBUGZ.NET

**** WE PROVIDE LIVE SCREEN SHARE OR VIDEO PROOF OF ACCOUNTS OR TRANSFERS BEFORE PAYMENT IS MADE!.

****WE DO NOT SELL ANY FAKE WU BUG SOFTWARE, NO DUMB PAYPAL MONEY ADDERS, NO PAID TO CLICK, FOREX,HYIP...

****WE DEAL STRICTLY ON TRANSFERS AND LOGINS.

ALL transfers are legit and backed by secure dedicated offshore servers..

****no charge back or trace backs.

we have moneyback and Rienburstment policy with 24/7 support.

official website---visit http://www.wubugz.net

contact email _____ wubugs58@gmail.com
contact skype ______ wu hackerz
contact website_____ www.wubugz.net
contact icq ______ 701247445
contact phone ______ +1(251-589-7809
contact fb ______ wubugz

OR
blogs---http://wubugz.blogspot.com/

https://turbopurchase.wordpress.com/

>>>>>>> *** www.wubugz.net*** <<<<<<<>>>>>>>>> Visit *** www.wubugz.net *** for real screenshot proof of accounts and transfers.

prgnewshawaii's curator insight, May 7, 11:47 AM

Thanks to reporter Farid Mheir for this article, which reinforces the idea of using non-repeatable and strong passwords, as well as two-factor authentication online.

Russell Roberts

Hawaii Intelligence Digest

argonapproach's comment, May 8, 6:09 AM
good
Scooped by Farid Mheir
Scoop.it!

2017 DBIR: Understand Your Cybersecurity Threats

2017 DBIR: Understand Your Cybersecurity Threats | Digital Transformation of Businesses | Scoop.it

The 2017 DBIR reveals what’s really happening in cyber security. This year’s report is based on analysis of over 40,000 incidents, including 1,935 confirmed data breaches. That means you get a detailed insight into the cyber security threats you face.

Read the report and discover:

  • The biggest cyber security threats in your sector and what you can do to mitigate them.
  • Who’s behind the attacks and how they’re getting in.
  • What motivates the cybercriminals.
  • How nine incident patterns can help you predict what the cybercriminals will do next.

 

Farid Mheir's insight:

WHY THIS IS IMPORTANT

This annual report on cybersecurity from Verizon is one of the best as it analyzes data from 2,000 breaches to draw a portrait of cybersecurity threats that is factual. Must read.

more...
prgnewshawaii's curator insight, May 4, 4:49 PM

Thanks to reporter Farid Mheir for this comprehensive report on cybersecurity threats.  Read and thoroughly understand what's reported in this document--your business may depend on it.


Russell Roberts


Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW

Two Factor Authentication Tutorials guides you to turn on #2FA on most popular websites #DO-IT #NOW | Digital Transformation of Businesses | Scoop.it
Many of the world’s largest online and mobile properties offer 2FA to help prevent fraudulent activity and protect your accounts. To see if the sites and apps you use offer 2FA, and to get detailed step-by-step instructions on how to Turn It On, start here.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Maybe the most important security measure you can take today, this 2FA website gives step-by-step guidance on how to enable it on most popular websites like Apple, Google, Facebook and others. 

For more on protection your digital self, read this blog post and do the other 9 actions in there: http://fmcs.digital/blog/digital-moi-get-started-10-actions/ 

more...
prgnewshawaii's curator insight, May 4, 2:32 AM

Thanks to reporter Farid Mheir for this well-timed advice on "hardening" the security of your web or blog site.  Two factor authentication is a must for adding an additional layer of security to your online presence.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist

Why everything is #hackable: Computer security is broken from top to bottom via @TheEconomist | Digital Transformation of Businesses | Scoop.it
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

The Economist has made its April 08 cover "why computers will never be safe" to clearly state that we should all come to terms with the fact that improving our digital security and privacy will come from policies, rules and regulations, as it is impossible to ensure computer systems are built to be safe and un-hackable. I tend to agree with the statement and the conclusion, although I remain confident that over time the computer industry will find a way to make its systems safe by design. But we will live with a legacy of un-secure systems for many decades, so we must learn to deal with it.

more...
argonapproach's comment, May 8, 6:10 AM
nice
Scooped by Farid Mheir
Scoop.it!

DeepMind is building a blockchain-style system to track healthcare records to bring back #privacy

DeepMind is building a blockchain-style system to track healthcare records to bring back #privacy | Digital Transformation of Businesses | Scoop.it

Alphabet’s artificial intelligence outfit, DeepMind, plans to build a blockchain-style system that will carefully track how every shred of patient data is used. The company, which is rapidly expanding its health-care initiatives, has announced that it will build a tool that it calls Verifiable Data Audit during the course of this year. The idea: allow hospitals, and potentially even patients, to see exactly who is using health-care records, and for what purpose. By logging how every piece of patient data is used, the company hopes to leave behind an indelible audit trail.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

For everyone concerned about privacy in the digital world, the mega digital record would provide visibility into what is currently a completely opaque process. But far more reaching is the possibility to extend this audit trail to all our personal data. 

more...
prgnewshawaii's curator insight, April 20, 12:36 AM

Thanks to reporter Farid Mheir for this look at how blockchain-style systems will change our health care system.  This is both a blessing and a curse.  Medical records are still vulnerable to hacking and cyber criminals...a double edged sword.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

How Was Your Credit Card Stolen? #mustRead explanation via @BrianKrebs 

How Was Your Credit Card Stolen? #mustRead explanation via @BrianKrebs  | Digital Transformation of Businesses | Scoop.it

This post provides a primer on the types of card fraud and the likelihood with each of the cardholder ever learning how their account was compromised.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

I always wondered how thieves steal my credit card number and this post is a very good explanation. It shows where I should be careful about my credit card use and, for business, where to look to improve security.

more...
prgnewshawaii's curator insight, March 28, 10:40 AM

Thanks to reporter Farid Mheir for this bit of wisdom. A good introduction to credit card fraud and how not to become a victim of this credit theft.


Russell Roberts


Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

Strava 170M rides&runs #Heatmap shows most popular #bike & #run trails of 2015 with #BigData #GPS #crowdsourcing

Strava 170M rides&runs #Heatmap shows most popular #bike & #run trails of 2015 with #BigData #GPS #crowdsourcing | Digital Transformation of Businesses | Scoop.it
100 million rides and runs, 220 billion data points visualizing the best roads and trails worldwide.
Farid Mheir's insight:

WHY THIS IS IMPORTANT

Big brother is watching and when it does you can gain tremendous insights into the behaviour of humans. I zoomed in on Montreal and the diagram is very clear about which run trails are most popular on the Mount Royal. On the dark side, of course, this means Strava performs some high level surveillance on us as we share our bike and run rides with their software.

more...
prgnewshawaii's curator insight, March 26, 7:03 PM

Thanks to reporter Farid Mheir for this report on Strava.  This platform is a mixed blessing, especially from the security and privacy point of view.  As Mr. Mheir suggests, "Big Brother is watching."


Russell Roberts


Hawaii Intelligence Digest

Eric Hunter's curator insight, March 27, 11:43 AM
Taking this beyond just being really cool, into value creating is the next challenge. Great #dataviz work!
 
Scooped by Farid Mheir
Scoop.it!

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing 

US Homeland Security is scanning visitors #socialMedia accounts for signs of wrongdoing  | Digital Transformation of Businesses | Scoop.it

The US Department of Homeland Security used software to scan social media accounts of people visiting America, but it didn't work properly.

Under President Obama, the government considered asking people to voluntarily submit social media profiles, but since the election of President Trump the scheme may become mandatory and more invasive.

The new boss of the US Department of Homeland Security, John Kelly, has said that such checks should be mandatory and travelers should also be forced to provide passwords and banking records. This may take weeks or months, he said, but people will just have to wait before visiting this shining city on the hill.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Besides the obvious invasion fo privacy, this may actually hint at what the future may look like with the miniaturization of cell phones, the presence of heads-up displays and augmented reality. When meeting someone, or simply crossing someone on the street, face recognition and other tools may search the web to provide insights about people we cross and stand in line at the checkout counter. 

The impact of such constant surveillance may increase an already high fear of others or increase the impact of wrongful information about ourselves that may reside online.

Even more reasons to protect your digital twin and ensure your digital footprint is minimal.

Follow these links for more.

- know your digital twin: fmcs.digital/blog/digital-twin

- 10 actions to take to protect your digital twin: fmcs.digital/blog/digital-moi-get-started-10-actions 

more...
prgnewshawaii's curator insight, March 20, 12:30 AM

Thanks to reporter Farid Mheir for this unsettling look at what our digital future holds for us. Shades of the Orwell classic, "1984". Welcome to a world we really didn't expect.  Reality stings at times. All the more reason to reduce your digital footprint.

Russell Roberts

Hawaii Intelligence Digest

Scooped by Farid Mheir
Scoop.it!

8 tips to encrypt your entire life in less than an hour

8 tips to encrypt your entire life in less than an hour | Digital Transformation of Businesses | Scoop.it

Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately led the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson's disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Start by reading this article then read my top 10 things to do along the same lines: fmcs.digital/blog/digital-moi-get-started-10-actions 

more...
prgnewshawaii's curator insight, March 11, 12:25 AM

Thanks to reporter Farid Mheir for this cautionary tale about protecting our lives from unwanted intrusions.  The advice is sound and prophetic.  Ignore this warning at your own risk.

Russell Roberts

Hawaii Intelligence Digest

https://hawaiiintelligencedigest.com

https://paper.li/f-1482109921

Scooped by Farid Mheir
Scoop.it!

Ransomware for Dummies: Anyone Can Do It via @BrianKrebs 

Ransomware for Dummies: Anyone Can Do It via @BrianKrebs  | Digital Transformation of Businesses | Scoop.it

Among today’s fastest-growing cybercrime epidemics is “ransomware,” malicious software that encrypts your computer files, photos, music and documents and then demands payment in Bitcoin to recover access to the files. A big reason for the steep increase in ransomware attacks in recent years comes from the proliferation of point-and-click tools sold in the cybercrime underground that make it stupid simple for anyone to begin extorting others for money.

Recently, I came across an extremely slick and professionally produced video advertisement promoting the features and usability of “Philadelphia,” a ransomware-as-a-service crimeware package that is sold for roughly $400 to would-be cybercriminals who dream of carving out their own ransomware empires.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

Some people wonder if ransomware is real or popular. Here is the answer.

more...
prgnewshawaii's curator insight, March 9, 6:32 PM

Thanks to reporter Farid Mheir for this fascinating and somewhat scary introduction to Ransomware as a business.  Ransomware developers are so sure of their product that they are offering a fairly cheap ransomware-as-a-service package to help aspiring "businessmen/businesswomen" get started in their own malware companies.  This would be a joke if it weren't so serious.  This direct marketing approach is so blatant that it makes you wonder what we can do to stop its proliferation.

Russell Roberts

Hawaii Intelligence Digest

https://hawaiiintelligencedigest.com

https://paper.li/f-1482109921

Scooped by Farid Mheir
Scoop.it!

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1

Only 12% of Americans Use a pwd mgmt software says @pewresearch report on Cybersecurity1 | Digital Transformation of Businesses | Scoop.it

This survey finds that a majority of Americans have directly experienced some form of data theft or fraud, that a sizeable share of the public thinks that their personal data have become less secure in recent years, and that many lack confidence in various institutions to keep their personal data safe from misuse. In addition, many Americans are failing to follow digital security best practices in their own personal lives, and a substantial majority expects that major cyberattacks will be a fact of life in the future.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

As I wrote recently in the "Pyramid of Digital Needs" (fmcs.digital/blog/pyramid-of-digital-needs/), security is one of the most basic needs. When we don't feel secure and private then it is difficult to enjoy the benefits of social networks and all the other tools that digital now provides. It is essential that corporations address security and privacy in a meaningful way in order for their clients, employees and partners to use their new digital tools and embrace the digital transformation that most enterprises have recently embarked on.

 

Also worth reading from Pew Research:

more...
araedora's comment, February 22, 9:56 PM
good
Scooped by Farid Mheir
Scoop.it!

Public Perceptions of Privacy and Security in the Post-Snowden Era is Low says Report from @pewresearch 

Public Perceptions of  Privacy and Security in the Post-Snowden Era is Low says Report from @pewresearch  | Digital Transformation of Businesses | Scoop.it

The majority of adults in a new survey by the Pew Research Center feel that their privacy is being challenged along such core dimensions as the security of their personal information and their ability to retain confidentiality.

When Americans are asked what comes to mind when they hear the word “privacy,” there are patterns to their answers. When responses are grouped into themes, the largest block of answers ties to concepts of security, safety, and protection. For many others, notions of secrecy and keeping things “hidden” are top of mind when thinking about privacy.

Farid Mheir's insight:

WHY THIS IS IMPORTANT

As I wrote recently in the "Pyramid of Digital Needs" (fmcs.digital/blog/pyramid-of-digital-needs/), security is one of the most basic needs. When we don't feel secure and private then it is difficult to enjoy the benefits of social networks and all the other tools that digital now provides. It is essential that corporations address security and privacy in a meaningful way in order for their clients, employees and partners to use their new digital tools and embrace the digital transformation that most enterprises have recently embarked on.

 

Also worth reading from Pew Research:

more...
No comment yet.
Curated by Farid Mheir
Digital transformation technology consultant and Enterprise Architect. Works with business executives in the fields of eCommerce, Cloud, Web2.0, enterprise2.0, sourcing2.0