COVID-19: Secured Workforce during MCO

COVID-19: Secured Workforce during MCO

As the number of the confirmed positive cases and death cases of the pandemic COVID-19 continue rises even under Movement Control Order in Malaysia, the Prime Minister, Tan Sri Muhyiddin Yassin announced the extension of MCO for another two weeks until April 14. The extended MCO will certainly impact incomes and cash flows. How could the companies in Malaysia keeps their employees at safe during the virus attack and sustain their business at the same time?

Most of the companies comply the MCO and urged employees to work from home with company-owned or dedicated mobile devices. Ideally, companies may want to […] Read more

COVID-19: Business Continuity Outside the Workplace

COVID-19: Business Continuity Outside the Workplace

COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more

COVID-19: Managing Cyber Security Risks of Remote Work

COVID-19: Managing Cyber Security Risks of Remote Work

As cases of the Novel Coronavirus (COVID-19) are increasing over the country, most of the companies are changing their workforce to home-working to curb the virus spread. Teleworking, “remote working,” or simply “working from home,” is a centerpiece of those efforts to reduce the risk of contact with COVID-19, complying the Movement Control Order. While remote working arrangements may be effective to slow the community spread of COVID-19 from person to person, they present cybersecurity challenges that can be different than on-premise work. Here is a list of considerations and tips to help guide businesses through these challenges:

Policy
Review your current […] Read more

COVID-19: Work from Home May Increase Cyber Threats

COVID-19: Work from Home May Increase Cyber Threats

As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the Movement Control Order, companies are determined to protect their employees and minimize the impact of COVID-19 by enforcing work from home policies. However, those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which companies have to […] Read more

Improving Work Experience with a Digital Workspace

Improving Work Experience with a Digital Workspace

An employee’s work space has evolved a lot over time an there are increased of the employee’s need for flexibility due to the idea of “sit down job”. The digital work space should allow the employee to work from any place and at any time. It should enable them to make well-informed decisions on the go. The initiatives like bring your own device (BYOD) should be encouraged in such an environment. This should all be possible without compromising security. There are five keys on how to improve employee work space experience to build an employee-centric work space.
Provide a smooth on-boarding experience
Empowerment […] Read more

Key Security Functions of Unified Endpoint Management – Part 2

Key Security Functions of Unified Endpoint Management – Part 2

Enterprise mobility management: Securing data at rest, in transit, and in use

Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more geography-specific functionalities are required to be considered.

For Data at Rest
Passcode enforcement is used for encryption and a strong passcode can prevent unauthorized access of data at rest. By providing the security policies, the app authorization for data access is able to avoid unauthorized apps from accessing data by enterprise-approved apps and vice versa. The organization can […] Read more

Key Security Functions of Unified Endpoint Management – Part 1

Key Security Functions of Unified Endpoint Management – Part 1

As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints.
Why is endpoint security essential in enterprises with multiple types of endpoints?

Most business applications have expanded to the cloud. Employees who use laptops, mobile devices, and other devices, need to access data from anywhere, including within the office, from a remote office, or when traveling. By empowering employees to work with their devices around the clock, this arouses the need for […] Read more

Kiosks Solution for Restaurants – Part 1

Kiosks Solution for Restaurants – Part 1

Nowadays, more and more companies are regaining  customer experience in various aspects and implementing the same at multiple touch points, they are utilizing many ways to make customer decision or purchase journey at ease. Kiosks are playing a vital role in several business sectors by delivering delightful experiences to customers who find using kiosks easier and more convenient instead of waiting for individual assistance.  Kiosks’ role will be particularly discussed on transforming guest experience at restaurants. This will also throw light on how to seamlessly manage and secure these kiosks, so they continue doing what they do best […] Read more

Mobile device management and unified endpoint management

Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding mobile devices poses an additional challenge for security teams and administrators.

Mobile devices come in various shapes in sizes with equally varying operating systems, further complicating administrator management. For example, most OS allow for remote control capabilities, while Apple only permits remote view.

The most effective way […] Read more