Formjacking: What’s That?

Answer these questions? Has your site been infected with formjacking? How did you find out? How hard was it to repair? How much damage did you or your users sustain? Symantec Internet Security Threat Report describes formjacking as malicious code inserted into websites. To capture personally identifiable information (PII) and debit/credit card information. Compromised sites perform legitimate transactions, even as the data is being transferred to illegitimate servers. This form of attack is inexpensive to deploy and almost impossible for users to quickly detect. Are you at risk ? Consider statistics drawn from “Smart Speaker, get me a cyber attack” — IoT was a key entry point for…

READ MORE

In Faith-Based Information Sharing and Analysis Organizations We Trust?

President Obama issued Executive Order (E.O.) C.F.R. 13691 to promote private sector cybersecurity information sharing. See  Executive Order No. 13691  For over 1 million faith-based and nonprofit organizations exist in the Unite States alone.  See NonprofitDirectory In 2018 Faith-based Information Sharing and Analysis Organizations, ISAO emerged to help these organizations improve their cyber security posture.  Websites, such as,  faithbased-isao.org, exist to help their members analyze and share data about threats and risks.  They offer best practices and training.  They can also serve as a focal point for legislative initiatives. Many FB organizations remain hesitant about participating in ISAOs.   Reasons include. Deference. Many FB organizations form media and technology…

READ MORE

Avoid Pitfalls in Vendor Selection

You saw software do something your organization cannot do today but should do soon. What do you do? Capterra blog details how technology is changing how churches connect with its members. As a result, faith-based organizations are adopting and leveraging technology-centric tools and services. To better engage their communities. Avoid the potential for poor decision-making and costly mistakes when selecting and procuring vendors. Follow these tips. 1. Adopt the mantra of trust but verify.  If you can’t exploit a tool it might as well not exist. Software offerings maybe built on older data models. Containing code that is difficult for rewriting applications. Be circumspect of vendor participation in…

READ MORE

Artificial Intelligence: Reimagine Worship and Worshippers

Rev. Billy Graham once stated, “when used correctly tech could do wonderful things” Observer Technology is reimagining habits for worship and for the worshipper. Vendors now offer mobile apps, social media and websites for the faithful. For example, traveling Catholics can access apps or the Internet to locate nearby services. www.masstimes.org Vendor’s offerings, such as, Subsplash (community engagement) and Tithe.ly (online giving) and Pushpay, enable secure automation for many administrative and management tasks. In doing so, Big Data is now part of doing business as a place of worship. Data is collected on attendees and members’ activities, especially, if a multi-site or mega place of worship. How will…

READ MORE

Is AI needed to cure this existential business crisis?

Reading time: 6:30 In Apex internet predators will devour you I explored Amazonization —  being taken out by Amazon’s mojo — and its predecessor, Walmartization. Many senior business executives secretly shake with fear and anger over what Amazon and Walmart could separately do to their businesses. Consider the stresses on Consumer Packaged Goods (CPG) companies.

READ MORE