Cybersecurity: Four Misconceptions about Digital Transformation

Jordan Cueto | October 19, 2017 at 4:18 pm

2017 brought in new horizons in the ever-changing landscape of digital transformation. We have seen cyberattacks, digital trends, and business processes evolve as we pushed through the very busy year. We are now at an era of hybrid clouds, intense machine learning, and revamped workplaces. However, it can’t be denied that the transition is still a problem for most companies. CIO stated that one of the top challenges for most companies, aside from technology and…


Cybersecurity on Every Level: Three Things About Executive Protection

Jordan Cueto | October 10, 2017 at 2:19 pm

Just this month, we’ve talked about the crucial skills required for a better cybersecurity posture. Today, we’re going to get deeper as we dissect what we can do for one of the most important positions in a company: the executives. With cybersecurity risks at an all-time high and with more cybersecurity holes to patch up, the executive positions now have more risks as an entry point for attackers. Stolen credentials used for authentication, executive data…


Cybersecurity: Three Ways to Hack against Hacking

Jordan Cueto | September 29, 2017 at 4:50 pm

cybersecurity microsoft azure hack

Hackers have changed throughout the years. Back then, they started as people who had too much free time they taught themselves the ins and outs of technology. Nowadays? They influence a lot of areas in digital transformation. Ransomware, phishing sites, identity theft, even nationwide shutdowns of public and private infrastructures are now the many forms of cybersecurity threats that modern day hackers capitalize on. Thankfully, the industries have adapted. Nowadays, many cybersecurity professionals are now embracing…


Tech One Global: Data Center Technology Summit 2017

Jordan Cueto | September 28, 2017 at 2:11 pm

September 15, 2017, Bangabandhu International Conference Center (BICC) – DCtSUMMIT together with DCiCON LTD brought senior IT professionals together with the biggest and best names in the field of data center marketplace. DCtSUMMIT is about one thing: to bring investors interested in the fastest developing data center market together with companies who can provide them with the solutions they need. Along with good food and camaraderie, two days went by filled with productive engagement. Experts…


Bridging the Skill Gap in Cybersecurity and Digital Transformation

Jordan Cueto | September 25, 2017 at 3:25 pm

Behind every contagious cybersecurity threat is a case of human error. Information Systems Audit and Control Association (ISACA), a non-profit information security advocacy group, predicts that there will be a shortage of two million cybersecurity professionals by 2019. Good news for applicants, bad news for companies. It’s easy to see why businesses are now investing more on hiring experts on cybersecurity. A quick glance at Information is Beautiful shows that almost every big name in…


TECH ONE GLOBAL: THREE AWARDS FROM MICROSOFT’S SEANM PARTNER SUMMIT

Jordan Cueto | September 21, 2017 at 2:21 pm

We are on a roll! Tech One Global bagged three more awards from this year’s Microsoft SEA New Market Partner Summit. That’s a total of eight awards including last year’s big win. The Summit was held at Bangkok, Thailand on September 12, 2017. It brought together partners from diverse markets including Sri Lanka, Maldives, Bangladesh, Bhutan, Vietnam, Myanmar, Laos, Brunei, Cambodia, and Nepal. It was a night of celebrating the culmination of digital transformation efforts…


Three things to master that will improve your cybersecurity posture

Jordan Cueto | September 15, 2017 at 3:44 pm

As we enter the last months of 2017, we have seen many cybersecurity issues arise. There are the contagious malware attacks that are still going on right now, the different innovations in the form of hybrid clouds, and the total movement to establishing modern workplaces. With that in mind, here are three basic tools that any innovator and decision maker should master to prepare for the unpredictable future:   Cloud Infrastructure Cloud infrastructures are the…


Cybersecurity and AI: Three Questions to Ask When Dealing With AI.

Jordan Cueto | September 8, 2017 at 4:00 pm

cybersecurity microsoft philippines

If you look at today’s headlines you might notice three things: Elon Musk, Artificial Intelligence, and World War 3. With his recent statements and even tweets talking about the dangers of artificial intelligence, Elon Musk implies that the most probable arms race won’t be nuclear, but artificial intelligence. Musk is not alone in considering artificial intelligence as a top priority. Even the Russian President, Vladimir Putin, recently said that “whoever becomes the leader in this area…


Cybersecurity and IoT: What aspect of security is your biggest concern?

Jordan Cueto | August 31, 2017 at 5:22 pm

There is no universal agreement on what the Internet of Things (IoT) really is, but as industries progress through the fourth industrial revolution, a lot of IoT concepts are starting to show patterns revolving around three basic principles: the presence of devices, a platform that connects them, and an intelligence that governs the formed network. As more and more sectors are undergoing digital transformation and embracing IoT, certain risks are starting to pop up. With…


Cybersecurity with Microsoft Azure: The Three Key Principles for Data Control

Jordan Cueto | August 25, 2017 at 2:44 pm

What happens with data? With the boom of cloud computing, IT organizations are now playing an increasingly important role in driving business strategies. Cost reduction is still a top priority, but scalability and flexibility are now becoming priorities for key decision makers. This trend drives the mobile-first, cloud-first mentality that Microsoft is doing in all its offers. For many organizations, the benefits of moving to the cloud are clear. Still, fear of losing control causes…


Cybersecurity: Five hackable things that shouldn’t be hackable

Jordan Cueto | August 18, 2017 at 2:36 pm

There used to be a time when the term “hacking” pertains solely to compromising PC units. Nowadays, with the rise of advanced AI and focus on networked everything, hacking and cybersecurity risks have now transcended from the PC realm straight to… well, everything. With that in mind, here are some examples of seemingly safe objects being hacked that you should be careful with:   1. Cars Today, developments are being done to perfect AI systems…


Digital Transformation: Cloud Experts Group August Meetup

Jordan Cueto | August 11, 2017 at 5:04 pm

August 5, 2017, The Olives, Bangladesh — Tech One Global (Pvt.) Ltd along with the Cloud Experts Group has initiated the event for creating awareness among the IT professionals. The community meetup became a platform where the members especially the IT professionals can get the opportunity to share knowledge, learn, network, and build relationships within community. The event started with Humayun Kabir Mamun on his introduction for the Cloud Experts Group. His talk highlighted the importance…


5 Cybersecurity Stats of 2017 and What They Mean For You

Jordan Cueto | August 11, 2017 at 3:58 pm

Cybersecurity is the biggest investment you must focus on this 2017, but where do you start? With so many things to consider like business readiness, resources, and digital threats, it’s no surprise that the average decision maker will find trouble on which data to focus on. With that in mind, CSO by IDG nailed down five key statistics this 2017 that shows a basic grasp of the overall state of today’s cybersecurity landscape:   1….


The 5 Key Players of Today’s Cybersecurity War

Jordan Cueto | August 4, 2017 at 1:02 pm

The cybersecurity landscape of 2017 is insane. Attacks are happening simultaneously and industries are getting disrupted. There’s the contagious WannaCry and the deadly Petya that decimated an entire country. To counter that, sophisticated cybersecurity measures are getting developed at a rapid pace, making a scenario somewhat like a war — a cybersecurity war. With that in mind, here are the five key players of today’s Game of Cybersecurity:   1. The Innovators They spearhead everything in…


Mirai: Cyberthreats from big industries to your household

Jordan Cueto | July 28, 2017 at 2:52 pm

The innovations in cyberthreats are flooding and Mirai shows that even the most common form of attack like a distributed denial-of-service (DDoS) can deal great damage on many industries. Mirai stands at the top of today’s IoT threats, a malicious worm that targets smart devices within your home. Mirai was involved in some of the largest cyberattacks ever recorded. In 2016, hackers managed to penetrate thousands of household networked things like printers, baby monitors, and…


5 Reasons Why Azure Stack Disrupted Digital Transformation 2017

Jordan Cueto | July 26, 2017 at 3:40 pm

Cloud is the driving force of digital transformation and with data jumping in value every second, it will stay that way for a very long time. With that in mind, Microsoft revealed its secret weapon in the current cloud wars: Azure Stack. Azure Stack is an extension of Azure with one key idea: it focuses on on-premise environments. This means that existing infrastructures can now have the same environment as those fully-operating in the cloud….


Four Reasons Why Cybersecurity Should be Your Biggest Investment This 2017.

Jordan Cueto | July 20, 2017 at 12:04 pm

Experts predict that there will be 200 billion connected things by 2020. The last decade seemed like a race on who can put the most software into anything and it changed the way we live and do things. As it continues to penetrate every aspect of human life, we as humans also continue to depend on it. A nice thought, except that this dependence also results into a lot of digital vulnerabilities. This puts cybersecurity…


Microsoft Inspire 2017: Where the digital transformation waves meet

Jordan Cueto | July 17, 2017 at 1:37 pm

July 10, 2017, Washington, D.C. — Microsoft together with its partners worldwide have gathered in the biggest digital transformation event of the year: Microsoft Inspire 2017 which was held at Walter E. Washington Convention Center, Washington, D.C. It became an opportunity for every innovator to meet and connect with the goal of pushing digital transformation further. Formerly the Microsoft Worldwide Partner Conference, the newly named event offers the experiences, insight and innovation you’ve come to…


7 Tips for creating the best password for cybersecurity

Jordan Cueto | July 13, 2017 at 2:02 pm

With the rise of cybercrimes in the recent months, there’s only so much that the regular user can do to keep himself/herself protected. Passwords have been here ever since we’ve started using accounts for anything: bank accounts, social media platforms, and emails. It’s the first line of defense against any threat, and strengthening it is one of the most important and accessible safety measure that anyone can do. With that in mind, here are 7…


Petya: Is it just a ransomware or something far more dangerous?

Jordan Cueto | July 7, 2017 at 1:53 pm

Petya might be more than just your everyday ransomware attack. According to Gizmodo, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) announced that the attack is believed to be a potential act of cyber war. At this point in time, it is clear that it uses the same exploit as WannaCry (EternalBlue and EternalRomance) that were leaked from the National Security Agency of America (NSA) by Shadow Broker. This has led to most…