Staying relevant in a disrupted future: M365 for Education

Jordan Cueto | March 28, 2018 at 4:23 pm

m365 modern workplace minecraft

The world has changed and digital transformation has arrived. Industries are now on the biggest race since the great 4th industrial revolution and if we learned one thing from history about what a revolution needs, it’s manpower. It is now a challenge for any learning institution to arm its students with the proper knowledge to face the modern workplaces of a digitally disrupted world. Tech One Global together with Microsoft, is on its quest to help…


Boost your Student’s Creative Learning Through Minecraft for Education

Jordan Cueto | March 28, 2018 at 11:48 am

minecraft education

Video games have always been good in teaching ideas using interactivity. Minecraft, one of Microsoft’s premier open world video games, utilizes this idea to its full effect. The revolutionary mining and crafting game changed the world of gaming by providing an open sandbox experience. In the game, players are tossed in a big world where you gather your own resources and build anything your imagination can conjure up. Here are four key points on how…


Multiple log-ins and devices? Three Key Ideas about the modern workplace for education

Jordan Cueto | March 26, 2018 at 5:03 pm

devices identities workplace

Meet Dave. Dave is your regular student at the academy. He does his usual routine of opening his Windows 10 laptop in the morning while having a nice cup of coffee and a freshly baked bagel straight from the bakery downstairs. He proceeds with his day by opening his mobile and checking the latest updates in on his school’s SharePoint portal and checking the progress of the academy’s projects and events. He finishes up everything before lunch…


Women’s Month: The Wonder of Women in Workplace Multitasking

Jordan Cueto | March 13, 2018 at 2:19 pm

Multitasking is increasingly becoming a key trait to survive today’s changes in industry and a key figure in this is your mother, girlfriend, wife, daughter – the women. Women have always been brilliant at juggling tasks at the same time and have been a key aspect in today’s digital workplace. To celebrate women’s month and to give recognition to our workmates and family, here are a few reasons why technology and women go hand-in-hand in…


Three Key Ideas to Focus on Cybersecurity for 2018

Jordan Cueto | November 9, 2017 at 12:08 pm

cybersecurity tech one global ideas

2017 was an explosive year for digital transformation and cybersecurity. With cyber threats sprouting left and right, cybersecurity experts and professionals are all on their guard while trying to anticipate the next attacks. Amongst all the trends, one idea surfaced: you can’t really protect everything equally. According to Earl Perkins, Vice President at Gartner, experts must focus not on protecting entire company but just the crucial parts of it. In line with this, an article…


Cybersecurity: Four Misconceptions about Digital Transformation

Jordan Cueto | October 19, 2017 at 4:18 pm

2017 brought in new horizons in the ever-changing landscape of digital transformation. We have seen cyberattacks, digital trends, and business processes evolve as we pushed through the very busy year. We are now at an era of hybrid clouds, intense machine learning, and revamped workplaces. However, it can’t be denied that the transition is still a problem for most companies. CIO stated that one of the top challenges for most companies, aside from technology and…


Cybersecurity on Every Level: Three Things About Executive Protection

Jordan Cueto | October 10, 2017 at 2:19 pm

Just this month, we’ve talked about the crucial skills required for a better cybersecurity posture. Today, we’re going to get deeper as we dissect what we can do for one of the most important positions in a company: the executives. With cybersecurity risks at an all-time high and with more cybersecurity holes to patch up, the executive positions now have more risks as an entry point for attackers. Stolen credentials used for authentication, executive data…


Cybersecurity: Three Ways to Hack against Hacking

Jordan Cueto | September 29, 2017 at 4:50 pm

cybersecurity microsoft azure hack

Hackers have changed throughout the years. Back then, they started as people who had too much free time they taught themselves the ins and outs of technology. Nowadays? They influence a lot of areas in digital transformation. Ransomware, phishing sites, identity theft, even nationwide shutdowns of public and private infrastructures are now the many forms of cybersecurity threats that modern day hackers capitalize on. Thankfully, the industries have adapted. Nowadays, many cybersecurity professionals are now embracing…


TECH ONE GLOBAL: THREE AWARDS FROM MICROSOFT’S SEANM PARTNER SUMMIT

Jordan Cueto | September 21, 2017 at 2:21 pm

We are on a roll! Tech One Global bagged three more awards from this year’s Microsoft SEA New Market Partner Summit. That’s a total of eight awards including last year’s big win. The Summit was held at Bangkok, Thailand on September 12, 2017. It brought together partners from diverse markets including Sri Lanka, Maldives, Bangladesh, Bhutan, Vietnam, Myanmar, Laos, Brunei, Cambodia, and Nepal. It was a night of celebrating the culmination of digital transformation efforts…


Digital Transformation: Cloud Experts Group August Meetup

Jordan Cueto | August 11, 2017 at 5:04 pm

August 5, 2017, The Olives, Bangladesh — Tech One Global (Pvt.) Ltd along with the Cloud Experts Group has initiated the event for creating awareness among the IT professionals. The community meetup became a platform where the members especially the IT professionals can get the opportunity to share knowledge, learn, network, and build relationships within community. The event started with Humayun Kabir Mamun on his introduction for the Cloud Experts Group. His talk highlighted the importance…


5 Cybersecurity Stats of 2017 and What They Mean For You

Jordan Cueto | August 11, 2017 at 3:58 pm

Cybersecurity is the biggest investment you must focus on this 2017, but where do you start? With so many things to consider like business readiness, resources, and digital threats, it’s no surprise that the average decision maker will find trouble on which data to focus on. With that in mind, CSO by IDG nailed down five key statistics this 2017 that shows a basic grasp of the overall state of today’s cybersecurity landscape:   1….


The 5 Key Players of Today’s Cybersecurity War

Jordan Cueto | August 4, 2017 at 1:02 pm

The cybersecurity landscape of 2017 is insane. Attacks are happening simultaneously and industries are getting disrupted. There’s the contagious WannaCry and the deadly Petya that decimated an entire country. To counter that, sophisticated cybersecurity measures are getting developed at a rapid pace, making a scenario somewhat like a war — a cybersecurity war. With that in mind, here are the five key players of today’s Game of Cybersecurity:   1. The Innovators They spearhead everything in…


Mirai: Cyberthreats from big industries to your household

Jordan Cueto | July 28, 2017 at 2:52 pm

The innovations in cyberthreats are flooding and Mirai shows that even the most common form of attack like a distributed denial-of-service (DDoS) can deal great damage on many industries. Mirai stands at the top of today’s IoT threats, a malicious worm that targets smart devices within your home. Mirai was involved in some of the largest cyberattacks ever recorded. In 2016, hackers managed to penetrate thousands of household networked things like printers, baby monitors, and…


5 Reasons Why Azure Stack Disrupted Digital Transformation 2017

Jordan Cueto | July 26, 2017 at 3:40 pm

Cloud is the driving force of digital transformation and with data jumping in value every second, it will stay that way for a very long time. With that in mind, Microsoft revealed its secret weapon in the current cloud wars: Azure Stack. Azure Stack is an extension of Azure with one key idea: it focuses on on-premise environments. This means that existing infrastructures can now have the same environment as those fully-operating in the cloud….


Four Reasons Why Cybersecurity Should be Your Biggest Investment This 2017.

Jordan Cueto | July 20, 2017 at 12:04 pm

Experts predict that there will be 200 billion connected things by 2020. The last decade seemed like a race on who can put the most software into anything and it changed the way we live and do things. As it continues to penetrate every aspect of human life, we as humans also continue to depend on it. A nice thought, except that this dependence also results into a lot of digital vulnerabilities. This puts cybersecurity…


Microsoft Inspire 2017: Where the digital transformation waves meet

Jordan Cueto | July 17, 2017 at 1:37 pm

July 10, 2017, Washington, D.C. — Microsoft together with its partners worldwide have gathered in the biggest digital transformation event of the year: Microsoft Inspire 2017 which was held at Walter E. Washington Convention Center, Washington, D.C. It became an opportunity for every innovator to meet and connect with the goal of pushing digital transformation further. Formerly the Microsoft Worldwide Partner Conference, the newly named event offers the experiences, insight and innovation you’ve come to…


7 Tips for creating the best password for cybersecurity

Jordan Cueto | July 13, 2017 at 2:02 pm

With the rise of cybercrimes in the recent months, there’s only so much that the regular user can do to keep himself/herself protected. Passwords have been here ever since we’ve started using accounts for anything: bank accounts, social media platforms, and emails. It’s the first line of defense against any threat, and strengthening it is one of the most important and accessible safety measure that anyone can do. With that in mind, here are 7…


Petya: Is it just a ransomware or something far more dangerous?

Jordan Cueto | July 7, 2017 at 1:53 pm

Petya might be more than just your everyday ransomware attack. According to Gizmodo, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) announced that the attack is believed to be a potential act of cyber war. At this point in time, it is clear that it uses the same exploit as WannaCry (EternalBlue and EternalRomance) that were leaked from the National Security Agency of America (NSA) by Shadow Broker. This has led to most…


“Cloud today success tomorrow” – A Tech One Sanje event on the potential of the cloud

Jordan Cueto | July 5, 2017 at 5:17 pm

June 21, 2017, Hilton Colombo — Tech One Sanje together with Microsoft initiated an event titled “Cloud today. Success Tomorrow” to take digital transformation to its next steps: exploring cloud capabilities. The cloud has been a centerpiece in the overall canvass of digital transformation. It’s where many functions are taking place: software development, testing, deployment, and plain old storage. It’s also evolving through time, enough for it to emulate hardware power and bandwidth on par…


Petya/GoldenEye: The deadliest cybersecurity threat of 2017

Jordan Cueto | June 30, 2017 at 3:09 pm

Weeks ago, experts predicted that there will be stronger copycats of WannaCry. Enter Petya/GoldenEye “ransomware”, a threat that also leverages from the EternalBlue exploit. The two share a lot of traits: both spread easily, and both target high-profile entities like multinational organizations. The twist? It’s deadlier. The current attack is like 2016’s Petya with added improvements like stronger encryption and more options to spread on. Some experts call it “GoldenEye” or “NotPetya,” while some stick…