Providing Unparalleled Technology Intelligence
ISSUE 22 // www.intelligentcio.com
Intelligent
Education Partner
Intelligent
Supporting Partner
Intelligent
Cabling Partner
Intelligent
ERP Partner
Intelligent
Data Centre Partner
Intelligent
Security Partner
Intelligent
Energy Partner
liftING the lid:
card fraud gangs
Assessing the changing
habits and tactics of
credit card fraud gangs
EBOOK SHARES
NETWORK KNOWLEDGE
Gigamon eBook shares
how to gain persuasive
network visibility
Designing the right
ME user experience
Providing a better
experience to attract and
retain loyal customers
CURRICULUM
IN THE CLOUD
Intelligent CIO talks to Ashith Piriyattiath, Group
Head of IT, at Al Masah Capital Management, about
incorporating technology in the school sector
COUNTRY FOCUS | INDUSTRY WATCH | LATEST INTELLIGENCE
EDITOR’S NOTE
A
few weeks ago I was relaxing,
browsing Facebook and taking
a little time out from the hustle
and bustle of modern life.
I heard the usual ping of its messenger
app. I looked at the message which
was sent from an acquaintance; not
someone I would count as a close friend
but a person I am certainly familiar with
through a mutual love of photography.
When I glanced at the message I
noticed he had sent me a video, which
instantly alerted me as this represented
unprecedented behaviour.
I then read the message and there
was also something about the way it
was worded that raised my suspicions.
I couldn’t put my finger on it but
something just didn’t seem right.
Because I was having a break I had let
down my guard and very nearly clicked
on the link to the video.
Luckily, I didn’t let courtesy get the better
of me and I stopped myself from doing
so. I’ve no idea if anything malicious was
going on but I certainly wasn’t going to
risk finding out. But the incident made
me realise that sometimes we are at
our most vulnerable when we are most
relaxed or distracted.
www.intelligentcio.com
For instance, how many of us can truly
say we have proper security procedures
in place when it comes to email. The
humble email is something we are
familiar with mainly because they have
been part of our daily life for well over
a decade.
It’s fair to say we take them for granted
but we certainly need to be on our guard
when we are opening them, especially
when we are busy at work and may not
have the time to think whether that
unsolicited email we’re about to open
is really safe or not. Hence this edition’s
Editor’s Question. We asked three
experts for their insights into building an
effective email security strategy.
We discover that up to 90% of all
malware infections in one way or
other start with e-mail. Phishing
emails that look legitimate are not
uncommon. Indeed, one of our experts
tells us he finds it puzzling that many
organisations allow unsolicited emails
with attachments to reach employees
potentially putting them in harm’s way.
Fortunately, there is plenty you can do
to protect your organisation and we
have plenty of advice on offer should
this not be your field of expertise.
Elsewhere we have an in-depth look at
network monitoring and Arun Shanker
puts the upcoming Gitex Technology
Week under the spotlight.
We also look at the dangers posed
by credit card fraud and look at how
enterprises should tackle privileged
password management. We find out
that attacks can come from all angles
with some programs even succeeding in
cracking complex passwords. Once again
though there is an upside as we discover
how privileged credentials can be
centrally secured, controlled and stored.
As always, we look forward to hearing
from our readers so please feel free to
email me at [email protected].
Enjoy the read and don’t forget to check
out www.intelligentcio.com/me/ for the
latest technology updates.
Mark Bowen
Editor
INTELLIGENTCIO
27