TECH ONE GLOBAL: THREE AWARDS FROM MICROSOFT’S SEANM PARTNER SUMMIT

Jordan Cueto | September 21, 2017 at 2:21 pm

We are on a roll! Tech One Global bagged three more awards from this year’s Microsoft SEA New Market Partner Summit. That’s a total of eight awards including last year’s big win. The Summit was held at Bangkok, Thailand on September 12, 2017. It brought together partners from diverse markets including Sri Lanka, Maldives, Bangladesh, Bhutan, Vietnam, Myanmar, Laos, Brunei, Cambodia, and Nepal. It was a night of celebrating the culmination of digital transformation efforts…


Three things to master that will improve your cybersecurity posture

Jordan Cueto | September 15, 2017 at 3:44 pm

As we enter the last months of 2017, we have seen many cybersecurity issues arise. There are the contagious malware attacks that are still going on right now, the different innovations in the form of hybrid clouds, and the total movement to establishing modern workplaces. With that in mind, here are three basic tools that any innovator and decision maker should master to prepare for the unpredictable future:   Cloud Infrastructure Cloud infrastructures are the…


Cybersecurity and AI: Three Questions to Ask When Dealing With AI.

Jordan Cueto | September 8, 2017 at 4:00 pm

cybersecurity microsoft philippines

If you look at today’s headlines you might notice three things: Elon Musk, Artificial Intelligence, and World War 3. With his recent statements and even tweets talking about the dangers of artificial intelligence, Elon Musk implies that the most probable arms race won’t be nuclear, but artificial intelligence. Musk is not alone in considering artificial intelligence as a top priority. Even the Russian President, Vladimir Putin, recently said that “whoever becomes the leader in this area…


Cybersecurity and IoT: What aspect of security is your biggest concern?

Jordan Cueto | August 31, 2017 at 5:22 pm

There is no universal agreement on what the Internet of Things (IoT) really is, but as industries progress through the fourth industrial revolution, a lot of IoT concepts are starting to show patterns revolving around three basic principles: the presence of devices, a platform that connects them, and an intelligence that governs the formed network. As more and more sectors are undergoing digital transformation and embracing IoT, certain risks are starting to pop up. With…


Cybersecurity with Microsoft Azure: The Three Key Principles for Data Control

Jordan Cueto | August 25, 2017 at 2:44 pm

What happens with data? With the boom of cloud computing, IT organizations are now playing an increasingly important role in driving business strategies. Cost reduction is still a top priority, but scalability and flexibility are now becoming priorities for key decision makers. This trend drives the mobile-first, cloud-first mentality that Microsoft is doing in all its offers. For many organizations, the benefits of moving to the cloud are clear. Still, fear of losing control causes…


Cybersecurity: Five hackable things that shouldn’t be hackable

Jordan Cueto | August 18, 2017 at 2:36 pm

There used to be a time when the term “hacking” pertains solely to compromising PC units. Nowadays, with the rise of advanced AI and focus on networked everything, hacking and cybersecurity risks have now transcended from the PC realm straight to… well, everything. With that in mind, here are some examples of seemingly safe objects being hacked that you should be careful with:   1. Cars Today, developments are being done to perfect AI systems…


Digital Transformation: Cloud Experts Group August Meetup

Jordan Cueto | August 11, 2017 at 5:04 pm

August 5, 2017, The Olives, Bangladesh — Tech One Global (Pvt.) Ltd along with the Cloud Experts Group has initiated the event for creating awareness among the IT professionals. The community meetup became a platform where the members especially the IT professionals can get the opportunity to share knowledge, learn, network, and build relationships within community. The event started with Humayun Kabir Mamun on his introduction for the Cloud Experts Group. His talk highlighted the importance…


5 Cybersecurity Stats of 2017 and What They Mean For You

Jordan Cueto | August 11, 2017 at 3:58 pm

Cybersecurity is the biggest investment you must focus on this 2017, but where do you start? With so many things to consider like business readiness, resources, and digital threats, it’s no surprise that the average decision maker will find trouble on which data to focus on. With that in mind, CSO by IDG nailed down five key statistics this 2017 that shows a basic grasp of the overall state of today’s cybersecurity landscape:   1….


The 5 Key Players of Today’s Cybersecurity War

Jordan Cueto | August 4, 2017 at 1:02 pm

The cybersecurity landscape of 2017 is insane. Attacks are happening simultaneously and industries are getting disrupted. There’s the contagious WannaCry and the deadly Petya that decimated an entire country. To counter that, sophisticated cybersecurity measures are getting developed at a rapid pace, making a scenario somewhat like a war — a cybersecurity war. With that in mind, here are the five key players of today’s Game of Cybersecurity:   1. The Innovators They spearhead everything in…


Mirai: Cyberthreats from big industries to your household

Jordan Cueto | July 28, 2017 at 2:52 pm

The innovations in cyberthreats are flooding and Mirai shows that even the most common form of attack like a distributed denial-of-service (DDoS) can deal great damage on many industries. Mirai stands at the top of today’s IoT threats, a malicious worm that targets smart devices within your home. Mirai was involved in some of the largest cyberattacks ever recorded. In 2016, hackers managed to penetrate thousands of household networked things like printers, baby monitors, and…


5 Reasons Why Azure Stack Disrupted Digital Transformation 2017

Jordan Cueto | July 26, 2017 at 3:40 pm

Cloud is the driving force of digital transformation and with data jumping in value every second, it will stay that way for a very long time. With that in mind, Microsoft revealed its secret weapon in the current cloud wars: Azure Stack. Azure Stack is an extension of Azure with one key idea: it focuses on on-premise environments. This means that existing infrastructures can now have the same environment as those fully-operating in the cloud….


Four Reasons Why Cybersecurity Should be Your Biggest Investment This 2017.

Jordan Cueto | July 20, 2017 at 12:04 pm

Experts predict that there will be 200 billion connected things by 2020. The last decade seemed like a race on who can put the most software into anything and it changed the way we live and do things. As it continues to penetrate every aspect of human life, we as humans also continue to depend on it. A nice thought, except that this dependence also results into a lot of digital vulnerabilities. This puts cybersecurity…


Microsoft Inspire 2017: Where the digital transformation waves meet

Jordan Cueto | July 17, 2017 at 1:37 pm

July 10, 2017, Washington, D.C. — Microsoft together with its partners worldwide have gathered in the biggest digital transformation event of the year: Microsoft Inspire 2017 which was held at Walter E. Washington Convention Center, Washington, D.C. It became an opportunity for every innovator to meet and connect with the goal of pushing digital transformation further. Formerly the Microsoft Worldwide Partner Conference, the newly named event offers the experiences, insight and innovation you’ve come to…


7 Tips for creating the best password for cybersecurity

Jordan Cueto | July 13, 2017 at 2:02 pm

With the rise of cybercrimes in the recent months, there’s only so much that the regular user can do to keep himself/herself protected. Passwords have been here ever since we’ve started using accounts for anything: bank accounts, social media platforms, and emails. It’s the first line of defense against any threat, and strengthening it is one of the most important and accessible safety measure that anyone can do. With that in mind, here are 7…


Petya: Is it just a ransomware or something far more dangerous?

Jordan Cueto | July 7, 2017 at 1:53 pm

Petya might be more than just your everyday ransomware attack. According to Gizmodo, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) announced that the attack is believed to be a potential act of cyber war. At this point in time, it is clear that it uses the same exploit as WannaCry (EternalBlue and EternalRomance) that were leaked from the National Security Agency of America (NSA) by Shadow Broker. This has led to most…


“Cloud today success tomorrow” – A Tech One Sanje event on the potential of the cloud

Jordan Cueto | July 5, 2017 at 5:17 pm

June 21, 2017, Hilton Colombo — Tech One Sanje together with Microsoft initiated an event titled “Cloud today. Success Tomorrow” to take digital transformation to its next steps: exploring cloud capabilities. The cloud has been a centerpiece in the overall canvass of digital transformation. It’s where many functions are taking place: software development, testing, deployment, and plain old storage. It’s also evolving through time, enough for it to emulate hardware power and bandwidth on par…


Petya/GoldenEye: The deadliest cybersecurity threat of 2017

Jordan Cueto | June 30, 2017 at 3:09 pm

Weeks ago, experts predicted that there will be stronger copycats of WannaCry. Enter Petya/GoldenEye “ransomware”, a threat that also leverages from the EternalBlue exploit. The two share a lot of traits: both spread easily, and both target high-profile entities like multinational organizations. The twist? It’s deadlier. The current attack is like 2016’s Petya with added improvements like stronger encryption and more options to spread on. Some experts call it “GoldenEye” or “NotPetya,” while some stick…


Compliance and Protection: A Tech One Global Event on Cybersecurity and Data Privacy

Jordan Cueto | June 28, 2017 at 1:42 pm

June 19, 2017 Discovery Primea, Makati — Tech One Global together with Microsoft initiated an event titled “Cybersecurity and Data Privacy.” With data quickly becoming the new oil of this generation, cybersecurity and data protection is now an utmost concern for any IT infrastructure. The event started with Tech One Global’s very own CEO, Lars Jeppesen, on his talk about digital transformation and how it disrupts every industry in terms of communication, collaboration, and business…


Five habits that might be a cybersecurity risk

Jordan Cueto | June 23, 2017 at 2:23 pm

One part of a strong cybersecurity structure are the digital habits of your company’s employees: how they surf, which sites they go to, what files they download, and what transactions they do are all potential entry points for cybercrime. With that in mind, here are five common habits you do in the office that might be potential risks.   1. Email You can’t escape emails. Almost everything you do for every project you can think of…


Data is the new oil: Five tips to stop it from leaking

Jordan Cueto | June 15, 2017 at 5:04 pm

“Data in the 21st Century is like Oil in the 18th Century: an immensely, untapped valuable asset. Like oil, for those who see Data’s fundamental value and learn to extract and use it there will be huge rewards.” – Wired.com.   Ten years ago, we can’t even imagine anything that will surpass the oil industry in terms of profit and scale. It’s jarring when Wired said that “We’re in a digital economy where data is…