Intelligent CIO Middle East Issue 22 | Page 27

Providing Unparalleled Technology Intelligence ISSUE 22 // www.intelligentcio.com Intelligent Education Partner Intelligent Supporting Partner Intelligent Cabling Partner Intelligent ERP Partner Intelligent Data Centre Partner Intelligent Security Partner Intelligent Energy Partner liftING the lid: card fraud gangs Assessing the changing habits and tactics of credit card fraud gangs EBOOK SHARES NETWORK KNOWLEDGE Gigamon eBook shares how to gain persuasive network visibility Designing the right ME user experience Providing a better experience to attract and retain loyal customers CURRICULUM IN THE CLOUD Intelligent CIO talks to Ashith Piriyattiath, Group Head of IT, at Al Masah Capital Management, about incorporating technology in the school sector COUNTRY FOCUS | INDUSTRY WATCH | LATEST INTELLIGENCE EDITOR’S NOTE A few weeks ago I was relaxing, browsing Facebook and taking a little time out from the hustle and bustle of modern life. I heard the usual ping of its messenger app. I looked at the message which was sent from an acquaintance; not someone I would count as a close friend but a person I am certainly familiar with through a mutual love of photography. When I glanced at the message I noticed he had sent me a video, which instantly alerted me as this represented unprecedented behaviour. I then read the message and there was also something about the way it was worded that raised my suspicions. I couldn’t put my finger on it but something just didn’t seem right. Because I was having a break I had let down my guard and very nearly clicked on the link to the video. Luckily, I didn’t let courtesy get the better of me and I stopped myself from doing so. I’ve no idea if anything malicious was going on but I certainly wasn’t going to risk finding out. But the incident made me realise that sometimes we are at our most vulnerable when we are most relaxed or distracted. www.intelligentcio.com For instance, how many of us can truly say we have proper security procedures in place when it comes to email. The humble email is something we are familiar with mainly because they have been part of our daily life for well over a decade. It’s fair to say we take them for granted but we certainly need to be on our guard when we are opening them, especially when we are busy at work and may not have the time to think whether that unsolicited email we’re about to open is really safe or not. Hence this edition’s Editor’s Question. We asked three experts for their insights into building an effective email security strategy. We discover that up to 90% of all malware infections in one way or other start with e-mail. Phishing emails that look legitimate are not uncommon. Indeed, one of our experts tells us he finds it puzzling that many organisations allow unsolicited emails with attachments to reach employees potentially putting them in harm’s way. Fortunately, there is plenty you can do to protect your organisation and we have plenty of advice on offer should this not be your field of expertise. Elsewhere we have an in-depth look at network monitoring and Arun Shanker puts the upcoming Gitex Technology Week under the spotlight. We also look at the dangers posed by credit card fraud and look at how enterprises should tackle privileged password management. We find out that attacks can come from all angles with some programs even succeeding in cracking complex passwords. Once again though there is an upside as we discover how privileged credentials can be centrally secured, controlled and stored. As always, we look forward to hearing from our readers so please feel free to email me at [email protected]. Enjoy the read and don’t forget to check out www.intelligentcio.com/me/ for the latest technology updates. Mark Bowen Editor INTELLIGENTCIO 27