Tuesday, 27 December 2022
Monday, 26 December 2022
Saturday, 24 December 2022
Sunday, 11 December 2022
Business Continuity Management -Global Best Practice
Business Continuity Management - Global Best Practices
Author - Andrew Hile
Publisher
ROTHSTEIN ASSOCIATE INC., USA.
Foreword by :
Dr. Adil S. Mufti, Vice Chairman, ICIL-Pakistan:
I find this new 4th edition of Business Continuity Management: Global Best Practices to be the most comprehensive book available, covering almost all aspects of BCM. It will be applied by students, will guide business continuity management (BCM) practitioners, and will be read by corporate and political leaders and policy-makers worldwide.
Despite my exposure to global and national business, my first real understanding of BCM came when I first met Andrew Hiles and read course materials for a series of very popular training courses he conducted in Pakistan. A relative working for IBM told me about Andrew's high standing among BCM practitioners and that many of them in many parts of the world look up to Andrew as their guru.
During my own travel to different countries, I find that, invariably, whenever I talk about BCM, people within corporate sectors in general and in the BCM practicing community in particular have either heard of Andrew or have read his publications. In both English-speaking as well as non- English-speaking countries, Andrew Hiles' training courses and publications are, and will always remain, in great demand.
In the end, I would like to say that Andrew Hiles has made great contribution to the BCM profession and through this 4th edition of Business Continuity Management: Global Best Practices he has made the jobs of all BCM practitioners easier and has given to the students studying BCM at university level very comprehensive reading material. This book will help corporate and political leadership to understand the need to prepare against unexpected man-made or natural hazards.
Andrew Hiles 4th Edition of Business Continuity Management : Global Best Practices published by ROTHSTEIN ASSOCIATE INC., USA is available on Amazon
Thursday, 8 December 2022
Monday, 5 December 2022
Monday, 21 November 2022
Wednesday, 16 November 2022
Sunday, 23 October 2022
Tuesday, 23 August 2022
Monday, 18 July 2022
Monday, 9 May 2022
Sunday, 8 May 2022
Ai Technologies to make Deep Fake
Deep Fake – ai Technology
https://recfaces.com/articles/what-is-deepfake
Sent from my iPhone
Saturday, 26 March 2022
Friday, 25 March 2022
Wednesday, 16 March 2022
FW: ICIL-LexisNexis Emailage - Email Fraud Identification Solution
LexisNexis Emailage is proprietary / patented solution to differentiate between Fraudulent & Legitimate Email is ideally suited for Digital Banking / Ecommerce & Businesses using email for financial transaction. .
https://icilpk.blogspot.com/2022/03/icil-lexisnexis-emailage-patented.html
In Pakistan, as a local partner of LexisNexis, this Solution is being offered by ICIL -Pakistsn
Every country's Law Enforcing Agencies / Regulators have issued alert about Email Fraud / Email Scam . Pakistan's FBR . American's Federal Trade Commission and Interpol
Intentional deception for either personal gain or to damage another individual by means of email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game", or scam.
- Pakistan – FBR
https://www.fbr.gov.pk/beware-fradulant-emails/21095
Email phishing refers to the act of creating and sending fraudulent or spoofed emails with the goal of obtaining sensitive financial and personal information. Under such schemes, emails are designed to look exactly like the ones that are sent by legitimate companies. Sophisticated phishing attacks use the email addresses of people who are registered to use certain services. When those people receive emails that are supposed to be from those companies or institutions, they are more likely to trust them. Spoofed emails often contain links that lead to spoofed websites, where various methods are used to request and collect a person's financial and personal information. Forms are occasionally contained within the emails themselves too
- American Federal Trade Commission
https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/business
Scammer sets up an email address that looks like it's from your company.
- The scammer sends out messages using that email address. This practice is called spoofing, and the scammer is what we call a business email imposter.
- Then the scammer sends out messages using that email address. This practice is called spoofing, and the scammer is what we call a business email imposter.
- Scammers do this to get passwords and bank account numbers or to get someone to send them money. When this happens, your company has a lot to lose. Customers and partners might lose trust and take their business elsewhere — and your business could then lose money.
- Interpol
https://www.interpol.int/en/Crimes/Financial-crime/Business-Email-Compromise-Fraud
BeCareful - Don't let scammers trick you into making payments to their accounts
Criminals hack into email systems or use social engineering tactics to gain information about corporate payment systems, then deceive company employees into transferring money into their bank account.
