Bridging the Skill Gap in Cybersecurity and Digital Transformation

Jordan Cueto | February 2, 2018 at 3:25 pm

Behind every contagious cybersecurity threat is a case of human error. Information Systems Audit and Control Association (ISACA), a non-profit information security advocacy group, predicts that there will be a shortage of two million cybersecurity professionals by 2019. Good news for applicants, bad news for companies. It’s easy to see why businesses are now investing more on hiring experts on cybersecurity. A quick glance at Information is Beautiful shows that almost every big name in…


From Chatbots to Virtual Reality: Four Digital Transformation Trends of 2018

Jordan Cueto | January 23, 2018 at 10:06 am

2017 was an explosive year for digital transformation. We saw the rise of threats such as WannaCry and Petya, movements on global data policies with America’s Net Neutrality fiasco and EU’s GDPR, and a more positive global reception of different technological disruptions on data, the cloud, and artificial intelligence. We at Tech One Global is bracing ourselves again as we enter 2018. With that in mind, here are five new trends to watch out for…


Digital Transformation: Where do humans belong?

Jordan Cueto | January 15, 2018 at 5:01 pm

Technological development is like a flowing river: it never stops and continuously flows in one direction. Digital transformation however, is a tidal wave. Digital transformation may sound like something superficial like the jump from typewriters to personal computers, or from media to social media. In reality, digital transformation is much more than that: it’s the integration of technology in daily human activities not only to survive but to reach new heights as a race. We…


Error while enabling Windows feature: NetFx3

Irshad Nazly | January 11, 2018 at 11:57 am

  Updated: January 12, 2018 Today I came across an error when trying to install SQL Server 2012 on Windows Server 2012 R2. There are several options to fix this error. Using Server Manager, Command Prompt or using PowerShell. Make sure you mount the OS CD before going onward. (D: is my CD Drive) The following error has occurred:     Error while enabling Windows feature : NetFx3, Error Code : -2146498298 , Please try enabling…


Five Starter Tips for GDPR Compliance

Jordan Cueto | December 20, 2017 at 2:50 pm

GDPR 2018

2017 is coming to a wrap and GDPR is becoming the next big concern for cybersecurity. Industries are now scrambling for methods on how to comply before May 2018 comes. It is a fair concern considering that the regulation will transcend its on-paper borders (the EU) and will potentially affect how data is handled and treated by those who use, process, and keep it. GDPR’s benefits are more focused on the user side of things with many of its…


A Child-friendly Coding Experience: Tech One Global and Hour of Code 2017

Noel Labitag | December 14, 2017 at 4:26 pm

  As a proverb puts how malleable a child’s mind is like: “Train up a child in the way he should go, and when he is old he will not depart from it.” Still holds true today that in a matter of nourishing a child’s curiosity on something: passion is kindled, proteges are born, and ignorance is countered through proper education.   Tech One Global is an evangelist of capacities. It seeks to inspire, motivate,…


Hour of Code with Tech One Global

Jordan Cueto | December 6, 2017 at 5:01 pm

Children are filled with innovative ideas. They often surprise you with the things they do with what you give them. Leave them in a sand box and they will make castles, give them building blocks and they’ll build houses and robots. Give them an accessible coding platform? They’ll make video games or… maybe even program the next droid for Mars. The Hour of Code is a global movement with the goal of introducing this generation…


Cybersecurity: What is GDPR?

Jordan Cueto | November 24, 2017 at 3:53 pm

The General Data Protection Regulation (GDPR) will take effect at May 2018 and is Europe’s hottest topic right now when it comes to cybersecurity. Basically, it’s the European Parliament’s form of regulation, which intends to improve and unify all legislation about data throughout European Union (EU). Why does it matter? Despite being an EU regulation, its rules far transcends the boundaries of EU and will ultimately affect the world’s service providers and consumers. GDPR is a set of…


Three Key Ideas to Focus on Cybersecurity for 2018

Jordan Cueto | November 9, 2017 at 12:08 pm

cybersecurity tech one global ideas

2017 was an explosive year for digital transformation and cybersecurity. With cyber threats sprouting left and right, cybersecurity experts and professionals are all on their guard while trying to anticipate the next attacks. Amongst all the trends, one idea surfaced: you can’t really protect everything equally. According to Earl Perkins, Vice President at Gartner, experts must focus not on protecting entire company but just the crucial parts of it. In line with this, an article…


Cybersecurity: Four Misconceptions about Digital Transformation

Jordan Cueto | October 19, 2017 at 4:18 pm

2017 brought in new horizons in the ever-changing landscape of digital transformation. We have seen cyberattacks, digital trends, and business processes evolve as we pushed through the very busy year. We are now at an era of hybrid clouds, intense machine learning, and revamped workplaces. However, it can’t be denied that the transition is still a problem for most companies. CIO stated that one of the top challenges for most companies, aside from technology and…


Cybersecurity on Every Level: Three Things About Executive Protection

Jordan Cueto | October 10, 2017 at 2:19 pm

Just this month, we’ve talked about the crucial skills required for a better cybersecurity posture. Today, we’re going to get deeper as we dissect what we can do for one of the most important positions in a company: the executives. With cybersecurity risks at an all-time high and with more cybersecurity holes to patch up, the executive positions now have more risks as an entry point for attackers. Stolen credentials used for authentication, executive data…


Cybersecurity: Three Ways to Hack against Hacking

Jordan Cueto | September 29, 2017 at 4:50 pm

cybersecurity microsoft azure hack

Hackers have changed throughout the years. Back then, they started as people who had too much free time they taught themselves the ins and outs of technology. Nowadays? They influence a lot of areas in digital transformation. Ransomware, phishing sites, identity theft, even nationwide shutdowns of public and private infrastructures are now the many forms of cybersecurity threats that modern day hackers capitalize on. Thankfully, the industries have adapted. Nowadays, many cybersecurity professionals are now embracing…


Tech One Global: Data Center Technology Summit 2017

Jordan Cueto | September 28, 2017 at 2:11 pm

September 15, 2017, Bangabandhu International Conference Center (BICC) – DCtSUMMIT together with DCiCON LTD brought senior IT professionals together with the biggest and best names in the field of data center marketplace. DCtSUMMIT is about one thing: to bring investors interested in the fastest developing data center market together with companies who can provide them with the solutions they need. Along with good food and camaraderie, two days went by filled with productive engagement. Experts…


TECH ONE GLOBAL: THREE AWARDS FROM MICROSOFT’S SEANM PARTNER SUMMIT

Jordan Cueto | September 21, 2017 at 2:21 pm

We are on a roll! Tech One Global bagged three more awards from this year’s Microsoft SEA New Market Partner Summit. That’s a total of eight awards including last year’s big win. The Summit was held at Bangkok, Thailand on September 12, 2017. It brought together partners from diverse markets including Sri Lanka, Maldives, Bangladesh, Bhutan, Vietnam, Myanmar, Laos, Brunei, Cambodia, and Nepal. It was a night of celebrating the culmination of digital transformation efforts…


Three things to master that will improve your cybersecurity posture

Jordan Cueto | September 15, 2017 at 3:44 pm

As we enter the last months of 2017, we have seen many cybersecurity issues arise. There are the contagious malware attacks that are still going on right now, the different innovations in the form of hybrid clouds, and the total movement to establishing modern workplaces. With that in mind, here are three basic tools that any innovator and decision maker should master to prepare for the unpredictable future:   Cloud Infrastructure Cloud infrastructures are the…


Cybersecurity and AI: Three Questions to Ask When Dealing With AI.

Jordan Cueto | September 8, 2017 at 4:00 pm

cybersecurity microsoft philippines

If you look at today’s headlines you might notice three things: Elon Musk, Artificial Intelligence, and World War 3. With his recent statements and even tweets talking about the dangers of artificial intelligence, Elon Musk implies that the most probable arms race won’t be nuclear, but artificial intelligence. Musk is not alone in considering artificial intelligence as a top priority. Even the Russian President, Vladimir Putin, recently said that “whoever becomes the leader in this area…


Cybersecurity and IoT: What aspect of security is your biggest concern?

Jordan Cueto | August 31, 2017 at 5:22 pm

There is no universal agreement on what the Internet of Things (IoT) really is, but as industries progress through the fourth industrial revolution, a lot of IoT concepts are starting to show patterns revolving around three basic principles: the presence of devices, a platform that connects them, and an intelligence that governs the formed network. As more and more sectors are undergoing digital transformation and embracing IoT, certain risks are starting to pop up. With…


Cybersecurity with Microsoft Azure: The Three Key Principles for Data Control

Jordan Cueto | August 25, 2017 at 2:44 pm

What happens with data? With the boom of cloud computing, IT organizations are now playing an increasingly important role in driving business strategies. Cost reduction is still a top priority, but scalability and flexibility are now becoming priorities for key decision makers. This trend drives the mobile-first, cloud-first mentality that Microsoft is doing in all its offers. For many organizations, the benefits of moving to the cloud are clear. Still, fear of losing control causes…


Cybersecurity: Five hackable things that shouldn’t be hackable

Jordan Cueto | August 18, 2017 at 2:36 pm

There used to be a time when the term “hacking” pertains solely to compromising PC units. Nowadays, with the rise of advanced AI and focus on networked everything, hacking and cybersecurity risks have now transcended from the PC realm straight to… well, everything. With that in mind, here are some examples of seemingly safe objects being hacked that you should be careful with:   1. Cars Today, developments are being done to perfect AI systems…


Digital Transformation: Cloud Experts Group August Meetup

Jordan Cueto | August 11, 2017 at 5:04 pm

August 5, 2017, The Olives, Bangladesh — Tech One Global (Pvt.) Ltd along with the Cloud Experts Group has initiated the event for creating awareness among the IT professionals. The community meetup became a platform where the members especially the IT professionals can get the opportunity to share knowledge, learn, network, and build relationships within community. The event started with Humayun Kabir Mamun on his introduction for the Cloud Experts Group. His talk highlighted the importance…