Powered By Blogger

Sunday, 11 December 2022

Business Continuity Management -Global Best Practice

 

 Business Continuity Management - Global Best Practices

                           Author Andrew Hile

                                  Publisher

               ROTHSTEIN ASSOCIATE INC., USA.

    Foreword by :

       Dr. Adil S. Mufti, Vice Chairman, ICIL-Pakistan:

I find this new 4th edition of Business Continuity Management: Global Best Practices to be the most comprehensive book available, covering almost all aspects of BCM. It will be applied by students, will guide business continuity management (BCM) practitioners, and will be read by corporate and political leaders and policy-makers worldwide.

Despite my exposure to global and national business, my first real understanding of BCM came when I first met Andrew Hiles and read course materials for a series of very popular training courses he conducted in Pakistan. A relative working for IBM told me about Andrew's high standing among BCM practitioners and that many of them in many parts of the world look up to Andrew as their guru.

During my own travel to different countries, I find that, invariably, whenever I talk about BCM, people within corporate sectors in general and in the BCM practicing community in particular have either heard of Andrew or have read his publications. In both English-speaking as well as non- English-speaking countries, Andrew Hiles' training courses and publications are, and will always remain, in great demand.

In the end, I would like to say that Andrew Hiles has made great contribution to the BCM profession and through this 4th edition of Business Continuity Management: Global Best Practices he has made the jobs of all BCM practitioners easier and has given to the students studying BCM at university level very comprehensive reading material. This book will help corporate and political leadership to understand the need to prepare against unexpected man-made or natural hazards.

Andrew Hiles 4th Edition of Business Continuity Management : Global Best Practices published by ROTHSTEIN ASSOCIATE INC., USA is available on Amazon

 

 




Sunday, 8 May 2022

Ai Technologies to make Deep Fake

A deepfake is made using AI technologies. A program is trained to replace or synthesize faces, speech and manipulate emotions. It is used to imitate an action by a person that he or she did not commit.

Deep Fake – ai Technology
https://recfaces.com/articles/what-is-deepfake


Sent from my iPhone

Wednesday, 16 March 2022

FW: ICIL-LexisNexis Emailage - Email Fraud Identification Solution

 

 

LexisNexis Emailage is proprietary / patented solution to differentiate  between Fraudulent & Legitimate Email is ideally suited for Digital Banking / Ecommerce & Businesses using email for financial transaction. .

       https://icilpk.blogspot.com/2022/03/icil-lexisnexis-emailage-patented.html

In Pakistan, as a local partner of LexisNexis, this Solution is being offered by ICIL -Pakistsn

  Every country's Law Enforcing Agencies / Regulators have issued alert about Email Fraud / Email Scam . Pakistan's FBR . American's Federal Trade Commission and Interpol  

 Intentional deception for either personal gain or to damage another individual by means of email. Almost as soon as email became widely used, it began to be used as a means to defraud people. Email fraud can take the form of a "con game", or scam.

  1. Pakistan – FBR

https://www.fbr.gov.pk/beware-fradulant-emails/21095

Email phishing refers to the act of creating and sending fraudulent or spoofed emails with the goal of obtaining sensitive financial and personal information. Under such schemes, emails are designed to look exactly like the ones that are sent by legitimate companies. Sophisticated phishing attacks use the email addresses of people who are registered to use certain services. When those people receive emails that are supposed to be from those companies or institutions, they are more likely to trust them. Spoofed emails often contain links that lead to spoofed websites, where various methods are used to request and collect a person's financial and personal information. Forms are occasionally contained within the emails themselves too

  1. American Federal Trade Commission

https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/business

     Scammer sets up an email address that looks like it's from your company.

  • The scammer sends out messages using that email address. This practice is called spoofing, and the scammer is what we call a business email imposter.
  • Then the scammer sends out messages using that email address. This practice is called spoofing, and the scammer is what we call a business email imposter.
  • Scammers do this to get passwords and bank account numbers or to get someone to send them money. When this happens, your company has a lot to lose. Customers and partners might lose trust and take their business elsewhere — and your business could then lose money.
  1. Interpol

https://www.interpol.int/en/Crimes/Financial-crime/Business-Email-Compromise-Fraud

BeCareful - Don't let scammers trick you into making payments to their accounts

Criminals hack into email systems or use social engineering tactics to gain information about corporate payment systems, then deceive company employees into transferring money into their bank account.