How to React When You Found Out Your Data is Compromised
Aug11

How to React When You Found Out Your Data is Compromised

 As we increase our reliance on online shopping, e-commerce companies and online payment service providers will continue to be a prime target for hackers as they often contain a wealth of customer’s data. The key takeaway from this recent incident is that cybercriminals do not look at auspicious timings before acting – the moment they detect any vulnerabilities in your system, they will take immediate action to exploit it. With a...

Read More
How to Choose A Right Payment Gateway
Aug04

How to Choose A Right Payment Gateway

 What is a payment gateway? A Payment Gateway is the middle party between your online store and the acquiring bank or acquirer that receives payments from your customers. In other words, once a customer enters their payment details on your website, the payment gateway is responsible for sending payment data securely (using encryption) to the Acquirer to seek payment authorization. Once the payment is authorized, online store will...

Read More
Malaysian Executives Assume Their Company Will Never Be Attacked
May23

Malaysian Executives Assume Their Company Will Never Be Attacked

 In the last two years, the COVID-19 pandemic has served as a major catalyst for businesses to transform digitally, greatly accelerating Malaysia’s digital economy. However, this has also resulted in an increase of targeted cyberattacks and cybercrimes on organisations. Malaysia’s Ministry of Home Affairs revealed in 2021 that more than 20,000 cybercrime cases were reported, totalling losses of RM560 million to the victims....

Read More
Why Timely Response Is Essential And How To Achieve It
Apr26

Why Timely Response Is Essential And How To Achieve It

 Advanced persistent threats continue to test organizations’ strength by exploiting new vulnerabilities, organizing massive supply chain incidents and targeting specific industries. According to one study, 84% of enterprises globally acknowledge that cyberattacks have become more sophisticated. They worry about vulnerabilities, attack surfaces, threat tactics, malware, mobile device security and the use of consumer cloud services...

Read More
Preparing for the Journey Ahead: Role of AI in improving Customer Experience as Malaysia’s Travel Industry Rebounds
Apr20

Preparing for the Journey Ahead: Role of AI in improving Customer Experience as Malaysia’s Travel Industry Rebounds

 The travel and hospitality industry were among the hardest hit industries during the pandemic. For Malaysia, a country that boasts a thriving travel and tourism economy, this led to adverse circumstances. In the first nine months of 2020, tourism receipts plunged 80.9% to RM12.6 billion from RM66.1 billion.That said, the opening of the country’s borders on 1st April 2022 signals hope for the tourism industry. While the tourism...

Read More
The Hidden Capabilities Of VPN Services – Five Unexpected Scenarios
Apr09

The Hidden Capabilities Of VPN Services – Five Unexpected Scenarios

 A VPN is a versatile tool that many see as an assistant to protect personal data while carrying out everyday tasks online. However, in addition to well-known standard task such as surfing the internet, there are several other uses for a VPN. VPNs hide the location of users and change their IP address to the country where the server is placed. Sites are then under the impression that the user is physically located in the selected...

Read More
Gaining Telehealth Patients’ Trust: Cybersecurity Tips Every Doctor Should Know
Mar23

Gaining Telehealth Patients’ Trust: Cybersecurity Tips Every Doctor Should Know

 Medicine and privacy are concepts that have always gone hand in hand. Indeed, a commitment to medical confidentiality is even mentioned in the Hippocratic Oath, historically taken as an ethical code by physicians. But disclosure of health-related information may significantly affect a person’s private and personal life, so this kind of data is naturally something that one would prefer to control and, in some cases, keep secret....

Read More
Low Code / No Code: The Advent of Digital Transformation and Customer Experience
Mar22

Low Code / No Code: The Advent of Digital Transformation and Customer Experience

 Low code / no code is setting a new benchmark in software development and the advancement of digital transformation. Although a relatively new concept in Malaysia, low code / no code solutions are quickly gaining traction among local businesses because of how it flawlessly bridges the gap between business and technology. The advent of low code / no code has made it possible for non-IT personnel to master it without prior...

Read More
Designing The Workplace of The Future
Mar10

Designing The Workplace of The Future

 COVID-19 has forced a large segment of the workforce to work-from-home (WFH) over the last two years. Ever since the internet and technology allowed us to communicate remotely, people have been working outside of the office albeit not as popular and widely accepted. However, the current rise of WFH arrangements has shown us that it has been very possible to work remotely and still get the job done. All it took was a catalyst to...

Read More
Metaverse – Everyone Wants to be There
Mar09

Metaverse – Everyone Wants to be There

 The term Metaverse is pretty hot right now. More and more brands are striving to conquer the Metaverse using various integration formats. For example, Gucci is creating its own world in the Sandbox metaverse. The luxury brand has announced that it will buy the virtual land in The Sandbox to start building its world on the platform. At the same time, the first NFT restaurant, the Flyfish Club, opened in New York. You need to buy...

Read More