Ways to Safely Clean Your Mobile Phone
There are a few ways to ensure that your phone is as clean as your hands while avoiding any unnecessary damage to the device. Before cleaning, always start by turning your phone off, and ensure you leave it to dry
Mobile Device Hygiene and Why It’s Important
What’s the one item that never leaves your side?It goes into the bathroom with you. You use it in the kitchen too. It often touches your face, your desk any other surface within arm’s reach. It is your smartphone. The habits
Use Case of Kiosk Technology in Banking Industry
Consumer behavior and smart device trends are driving the banking and financial sector towards the direction of IT consumerism. Banking and financial institutes are using this transformation to automate processes, offer innovative products and services, ensure regulatory compliance and improve
How to Help Your Neighbours during MCO
As an increasing number of school districts and institutions shut down and more and more people practise social distancing, you might be looking inward as you try to make sense of the COVID-19 pandemic. While you go about your preparations, think
COVID-19: Secured Workforce during MCO
As the number of the confirmed positive cases and death cases of the pandemic COVID-19 continue rises even under Movement Control Order in Malaysia, the Prime Minister, Tan Sri Muhyiddin Yassin announced the extension of MCO for another two weeks
COVID-19: Managing Cyber Security Risks of Remote Work
As cases of the Novel Coronavirus (COVID-19) are increasing over the country, most of the companies are changing their workforce to home-working to curb the virus spread. Teleworking, “remote working,” or simply “working from home,” is a centerpiece of those
COVID-19: Work from Home May Increase Cyber Threats
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the
Key Security Functions of Unified Endpoint Management – Part 2
Enterprise mobility management: Securing data at rest, in transit, and in use Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more
Bring Your Own Device doesn’t come without risk
[vc_row][vc_column][vc_column_text]The growing adoption of mobile devices in business, boosted by trends such as Bring Your Own Device doesn’t come without risk. Devices, holding your companies’ deepest secrets, get lost or stolen. It happened to NASA a couple years ago when a
Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured.
[vc_row][vc_column][vc_column_text]Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured. Just imagine 200,000 new malwares being found everyday! It continues to evolve to bypass most levels of IT protection, which makes