Interested in Competitive Intelligence qualifications. We are faculty members of the Institute of Competitive Intelligence offering Accredited CI & MI training.
Phishing attacks are more rampant than ever before, rising by more than 162 percent from 2010 to 2014. They cost organizations around the globe $4.5 billion every year and over half of internet users get at least one phishing email per day.
The best defense companies have against phishing attacks is to block malicious emails before they reach customers with the DMARC (Domain-based Message Authentication Reporting and Conformance) standard. Brands must also work with a vendor that can offer email threat intelligence data revealing attacks beyond DMARC (e.g., attacks that spoof their brand using domains outside of the company’s control).
Unfortunately, no matter what companies do, some phishing emails will always make it to the inbox. And those messages are extremely effective—97% of people around the globe cannot identify a sophisticated phishing email. That’s where customer education comes in.
The article lists 10 tips on how to identify a phishing or spoofing email. Share them externally with family, friends and internally with your company.
Phishing attacks are more rampant than ever before, rising by more than 162 percent from 2010 to 2014. They cost organizations around the globe $4.5 billion every year and over half of internet users ...
We all want searching to be more comprehensive, targeting the exact information that we need with the least amount of effort and frustration. Today, it is estimated that more than 65% of all internet searches in the U.S. are done using Google. Google and other standard web search engines can be infuriating when you’re trying to do intensive background research, due to their lack of deep searching into the content of the databases and websites they retrieve.
Researchers Andrea Cali and Umberto Straccia noted in a 2017 article, “the Deep Web (a.k.a. the Hidden Web) is the set of data that are accessible on the Internet, usually through HTML forms, but are not indexable by search engines, as they are returned only in dynamically-generated pages.” This distinction has made reaching the content in these databases very difficult.
There are a number of tools now that attempt to extract data from such sources and also that protect privacy - and these are listed in the article. However building the ideal tool is hard and nothing yet hits the spot. #Search #SearchEngine #OSINT ... See MoreSee Less
For more than 20 years, researchers have worked to conceptualize methods for making web searching more comprehensive--going beyond the surface sites that are easily accessed by today's search engines ...
10 Ingredients of a Knockout Presentation (Number 9 is NOT easy)
1) Treat your presentation like a conversation 2) Be Yourself 3) If you make a mistake, move on 4) Decide where you are going 5) Visual communication is everything 6) Empathise with your audience 7) Start well - your opening words count 8) Finish with a strong conclusion 9) Plan your presentation! (This should really be first). (What's the audience take-away; what points need to come across; learn the material; practice and practice again.... ) 10) Pause rather than speak with erms and show lack of preparation ... See MoreSee Less
This was a terrible idea. Archie swallowed hard, took one step towards the stage, and froze. 300 sets of eyes peered at the stage. Awoken by the movement in the shadows behind the bright lights. Archi...
Your digital footprint — how often you post on social media, how quickly you scroll through your contacts, how frequently you check your phone late at night — could hold clues to your physical and mental health.
That at least is the theory behind an emerging field, digital phenotyping, that is trying to assess people’s well-being based on their interactions with digital devices. Researchers and technology companies are tracking users’ social media posts, calls, scrolls and clicks in search of behavior changes that could correlate with disease symptoms. Some of these services are opt-in. At least one is not.
People typically touch their phones 2,617 per day, according to one study — leaving a particularly enticing trail of data to mine.
“Our interactions with the digital world could actually unlock secrets of disease,” said Dr. Sachin H. Jain, chief executive of CareMore Health, a health system, who has helped study Twitter posts for signs of sleep problems. Similar approaches, he said, might someday help gauge whether patients’ medicines are working.... ... See MoreSee Less
6 Essential Questions for Evaluating Secondary Data Sources. buff.ly/2FnqLYU
Effective market research requires reliability and responsibility. When opinion is confused with fact and ranting is given the weight of truth, things get a little muddy or even become dangerous. There is not only “fake news,” but also “fake data” and misleading data.
So what is the best process for the evaluation of secondary data and sources? Ask the following questions: Who collected the data? What is the data provider’s purpose or goal? When was the data collected? How the data was collected? What type of data was collected? Whether the data is consistent with data from other sources?
The Powerful Global Spy Alliance You Never Knew Existed
This item shows why checking sources is essential. The item talks about a global alliance of Western Nation security agencies - an extension of the Echelon security network known as the "5 Eyes". It is based on leaks from Edward Snowden and published in The Intercept - run by Glen Greenwald who worked with Snowden.
So for an item such as this (and any news item that appears suspicious) it is important to ask if it is true, false or exaggerated? Look at the source. Who is Glenn Greenwald? (buff.ly/2FapDrh). So true or false? It seems believable but I have questions e.g. some of the nations are not overly sophisticated in their capabilities whereas it is known that countries like Israel (which provide extensive intelligence on terrorism to countries globally) was not named as a member. Also the more individuals involved the more likely there will be leaks so a principle of secrecy is to limit those who know intelligence. Having 14 (or 17) nations participating is a sure why to have security leaks.
This sort of news item shows how important it is to check and corroborate using other sources if obtainable on any intelligence before making any business or strategic decision. Basing a decision on one news story only is potentially dangerous - especially if biased or wrong.
Over the last 20-25 years the world has changed considerably due to new technologies - whether computer or mobile phone. Google has replaced Rolodex. Automatic Cars will soon mean self-driving cars. Blockchain and crypt-currencies and the Internet of Things may change our lives even more.
Market research is not exempt from these changes. The Information Age has created a wealth of valuable data gathering opportunities for market research analysts. But in others, it has presented a great challenge to analytical firms that find their roles shifting alongside rapid technological changes. Here are five ways in which technology has permanently altered the market research landscape: 1) Facebook, Fake News and Fact Checking 2) Data Democratisation 3) Data Analysis Automation 4) The problem of Noise - impacting research verification approaches 5) The importance of Insights - or in other words, the key aim of market research has not really changed even if the technology has!
Just as technology has changed the way we live our everyday lives, so too has it permanently reshaped the market research landscape. Check out these 5 ways innovations in technology have spurred marke...
Israel based Cellebrite claims they can crack any iPhone / Android or Tablet security - giving law enforcement globally access to locked criminal devices. The catch - the device needs to be sent to Cellebrite as they won't release the code. However this is a safeguard as it ensures only legitimate requests will be answered e.g. from police forces that respect law & order (and have friendly relations with #Israel)
Cellebrite is known for its mobile forensics work. Their technology was reportedly used by the FBI following the San Bernardino, USA shooting. The FBI apparently used Cellebrite's technology to acquire data from shooter Syed Rizwan Farook's iPhone 5c bypassing the passcode lock to gain entry. buff.ly/2Fdc9Lk #CyberSecurity #Forensics ... See MoreSee Less
Material gathered as part of an #OSINT investigation or any online research project can disappear - yet may still be needed as evidence. It needs to be archived. Tools include archive.is and archive.org. But what about social media - e.g. posts on Facebook and other social media platforms... ... See MoreSee Less
Throughout this story, click on any of the images to view in full resolution. When conducting open source investigations, an ever-present issue is how to archive away the materials you are researching...
30 Technologies of the next decade. The majority of these have only actually come out of research and theory in the last 10 years or less.
Many are impacting our lives in unexpected ways already - for good and bad. We can expect that all will impact the world in one way or another over the next few decades. Those that recognise the changes and take advantage of them will be the winners. Sadly much of the world promises to lose out - leading to potentially greater gaps between rich and poor and more potential for strife as the have-nots try and grab what the haves have.
Part of knowing what is coming is knowing how to manage it (and share it). Are we ready? And if not, what do we need to do to be ready? ... See MoreSee Less
How do we win? How do we prepare for uncertainty …?
Business strategy involves asking questions - such as the above two. This article offers 20 questions business leaders should be asking, and then gives brief answers (in the form of quotations) from relevant business gurus and experts. bit.ly/2EJbeSG #strategy ... See MoreSee Less
The history of business is the story of entrepreneurs, executives, leaders, and employees, all of whom along the way add to the theory of management. For the 20th anniversary of strategy+business, we,...
When taking on a new employee, partner or supplier it's not just the red flags such as overt lying, prior fraud or criminal records, failure to co-operate when asking questions that are warnings to avoid. There are also warning signals that combined should make you wary. Poor ethical conduct, lots of unexplained name changes, hidden information on past (or current) affiliations, bankruptcies and law suits, too many job changes, or employment gaps need to be investigated too. Could some activities involve fraud or money laundering. Could dealing with the company or person lead to a potential reputation problem. (Hence check social media for any signs of behaviour that could damage your reputation). For companies, where are they located and trade? Who is involved.
These questions can usually be answered via basic online research (#OSINT) perhaps backed up by a few confirmatory phone calls. (Previous post: bit.ly/2FkxB1W) ... See MoreSee Less
Warning signs: How to spot a scoundrel. How basic open source research and questioning can identify red flags, and so catch possible fraudsters before they get employed. bit.ly/2EJ2L1O
Look out for past fraud. Check their credentials - did they really get the degree they claim or write the book or work for that blue-chip employer in a senior role. These things can be easily checked - often online (Open Source Intelligence - #OSINT) but otherwise through a single phone call. Where allowed check for police records or crime reports. In some jurisdictions this is less easy - and you need the consent of the candidate. Get it - if they've nothing to hide they will give it. If they do have something to hide they may make excuses and this is a warning sign. So ensure co-operation with your checks. Mistakes do get made - so if you uncover something see what the candidate says as an explanation (and then try and verify their excuse if possible).
If you uncover any of the above view them as red flags and a warning that danger lies ahead if you employ them (or their company). ... See MoreSee Less
“Due diligence mishaps – What were they thinking?”
UK newspapers have been full of news items relating to the sexual shenanigans of Oxfam and other charity workers. It's not just this area that causes problems. Marcy Phelps describes a US case where appropriate due diligence would have exposed a company that failed to deliver the promised aid following the Puerto Rico hurricane in 2017.
Had a detailed open source investigation (#OSINT) been carried out the firm concerned would not have won any contracts and US tax money would have been saved plus Puerto Rico residents would have received the promised aid. A worthy entry to the due diligence hall of shame.
Due diligence should always be carried out for any recruitment of an individual or company where there is scope for fraud or an opportunity to hoodwink those paying. Sometimes it's not easy. However there are often warning signs - and certain questions should always be asked (until you get satisfactory answers). In the case of the charity workers, the key question should be why they left previous employment. This reason should then be verified with the charity concerned. Any discrepancy is a flag that not all is as it seems. The same applies for any individual recruitment. ... See MoreSee Less
How Google is killing innovations from potential competitors and why anti-Trust cases against #Google make sense nyti.ms/2Fh5Ib6
Google's policies appear to be anti-competitive in that they suppress innovative new approaches to online search, preventing potential competitors from seeing the light of day. The New York Times Magazine news story reports on attempts to build a better niche search tool - and how Google frustrated this as it is claimed that this was a threat to its search approaches. #search #searchengine ... See MoreSee Less
Disruptive innovation is all around us - and online shopping has made shopping malls much less profitable. In the US - where this was a primary way people used to shop - it's become harder to operate a shopping mall.
Bloomberg has created a game to show some of the issues in keeping a mall open. It's not easy. You choose your management approach and challenges are put out. Can you keep the mall open - for a year? Two years? Longer.
Let me know in the comments how you did. (I kept mine open for over a year - but it gets harder and I'm not sure if it's possible to make it succeed long term. I suspect that's the point of the game!)
Understanding statistics should be a key business skill - and should also be a required skill for anybody talking about economics. This comment shows how easy it is to misinterpret statistics.
The UK is leaving the EU - and there has been lots written on the wisdom or otherwise of this move. Almost all economic experts have said that it will damage the UK economy. For some reason the pro-Brexit pundits dispute this - and I think I now understand why. They fail to understand basic statistics - or even elementary mathematics.
Currently the EU is Britain's main trading partner. Recent UK government (leaked) analysis has stated that the benefits of free trade deals with non-EU countries would add under 1% to the long-term growth of the British economy. Under every scenario modelled the UK economy would be worse off.
This sentence comes from today's London Times (8 Feb 2018) "Brexiteers rejected the civil service calculations last night, however, and said a deal between Australia and the US led to a 70 per cent boost in trade".
This shows a complete misunderstanding of basic school mathematics. The 70% increase is obviously not total trade but only trade between the US and Australia which will be a very small proportion of total trade for both economies. (If they think it's total trade, that's even more worrying). A 70% increase on a small level of trade is great for Australia-US trade relations but it is still tiny and will hardly dent the overall international trade figures. For example, a 70% increase of trade that was worth $1 makes it $1.70. ... See MoreSee Less
DuckDuckGo.com has ramped up its mobile & browser privacy features to further block trackers and ensure anonymous searching. It's still a minnow with 0.25% share of the search market yet is growing with 16m daily queries up by a third from a year ago. It's mobile share is even smaller - at 0.09%. In comparison, Google's browser share in Dec 2017 was 71%, Baidu 15%, Bing 8%, Yahoo! 5% and Yandex 1%. (buff.ly/2GA2JL8)
Two-factor authentication & password managers still not being used to protect accounts, according to Google spokesman at Enigma 2018 security conference. The implication is that most passwords are still guessable and an open invite to hackers. ... See MoreSee Less
Innovative, analytically mature organizations make use of data from multiple sources: customers, vendors, regulators, and even competitors according to MIT SMR's eighth annual data and analytics global survey of over 1,900 business executives, managers, and analytics professionals.
Key findings from the research point to the following trends:
• Competitive advantage from analytics continues to grow. More than half (59%) of managers say their company is using analytics to gain a competitive advantage. This is a higher percentage of respondents than in the previous two years. • Analytics is driving customer engagement. Organizations that demonstrate higher levels of analytical maturity saw a marked advantage in their customer relationships. The most analytically mature organizations are twice as likely to report strong customer engagement as the least analytically mature organizations. • Analytically mature organizations use more data sources to engage customers. Many organizations are already making use of data from customers, vendors, regulators, and competitors, but Analytical Innovators are more than four times more likely to glean data from all four sources. They also are much more likely to use a variety of data types — such as mobile, social, and public data — to engage customers compared with less analytically mature organizations. • Sharing data can improve influence with customers and other groups. Sharing data doesn’t mean giving away the farm. Organizations that share their data with others (customers, vendors, government agencies, and even competitors) reported increased influence with members of their ecosystem. Sharing data can enhance a company’s influence with not only customers but also a broad array of other stakeholders.
Whatever you do online, you are likely to be tracked. A Google search will pass back data to a site owner on what you searched and your IP address. Facebook, Amazon and many other sites track your activity and build profiles based on what you visit, how long you spend on a site, where you came from and where you go next and so on.
There are many tools that can anonymise your data - TOR, VPNs, Proxy services. Which are best to protect your online privacy and to prevent web-tracking tools monitoring your activity so allowing you to keep your data secret. #OSINT #Privacy ... See MoreSee Less