February 28, 2024 Share this article: The Sound of Sunrise: Microsoft AI-powered musical Venture An enchanting form of artistic expression, music has always conveyed unspeakable wonders to human experience. Whether as an upbeat sound that makes us dance or a sad ballad that sends us into tears, it never fails to touch our core being. We experience music every day. We use it to relax, express ourselves, and deal with our emotions. Music, after all, is the language of the soul. Songs and melodies have the power to inspire people, guide their actions, and aid in the formation of identities. Music can unite people – even if absorbed in solitude, capture your imagination and boost creativity. It has the power to connect with and influence people because it can bridge a divide in communication. And music has not limited the expression of human creativity even in the age of digital technology. 88rising, an Asian media collective and music company based in the US, embarked on a music experiment with an equipment installation that “captures the sound of sunrise.” Well, sure it sounds weird but it came out with the fascination of the skyline above the San Gabriel Valley. The San Gabriel Valley, located just east of Los Angeles, is home to the largest concentration of Asian American communities in the country and remains a historically important enclave for recent Asian immigrants. 88rising has high hopes for Asian American artists to thrive and be appreciated by the American music industry. Above the San Gabriel Valley, the sky is an ever-changing canvas of sights—a warm sunrise over a town, a dramatic pattern of clouds, a flock of birds doing a choreographed dance across a skyline. The 88rising venture is a collaboration with its resident artist Warren Hue. Using a video feed streaming from an overlook above the Valley, the installation took 88rising artist Warren Hue’s track “Too Many Tears” and remixed it using AI as it reacted to events in the landscape and skyline in real-time. It’s a whole new way to experience Hue’s song—not only sonically, but also visually. For example, as dawn rises above the Valley, the track has an ethereal, optimistic feel. Drum patterns are sparse, and audio effects like reverb float over the ambient but harmonious track. Sean Miyashiro, founder and CEO of 88rising, wanted to offer both meditative and inspiring moments for listeners. It was also important to the creative team that the project showcase a place that’s significant to Asian American communities, reflecting on a broader shared experience around the constant nature of change. This was especially true for Warren Hue, who wrote “Too Many Tears” in response to his experiences as an Asian artist: “’[It’s] a hip-hop and R&B song that I wrote with a unique beat and structure—reflecting on myself and my dreams and the reality of how people treat me.” The project is part of an evolution of Microsoft AI-powered musical collaborations, from Julianna Barwick to and Björk and now Warren Hue. But “Too Many Tears” is very much situated in a specific place, a digital manifestation of 88rising’s mission to amplify the voices of Asian and Asian American artists. Power your AI transformation with Microsoft Gain a competitive edge with powerful, trustworthy AI solutions. Amplify human ingenuinty with copilot experiences Accelerate productivity and innovation by embracing built-in AI in the tools you’re already using. Build your own intelligent apps Create your own AI apps and copilot solutions using the same stack and AI services that power Microsoft Copilot. Safeguard your business and data Build safety and responsibility into your AI journey from the very beginning on a trusted and secure cloud. References: Creating a soundtrack for life in real-time (microsoft.com) For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock The Sound of Sunrise: Microsoft AI-powered musical collaboration LEARN MORE Feature Stories Tech O’clock Lenovo Unveils ‘AI Vision for All’ at Global Tech World Event LEARN MORE Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE
Lenovo Unveils ‘AI Vision for All’ at Global Tech World Event
February 26, 2024February 26, 2024 Share this article: Lenovo Unveils ‘AI Vision for All’ at Global Tech World Event Lenovo unveiled in October 2023 its most comprehensive AI capabilities to date, as well as its vision of ‘AI for All’ at the company’s annual global innovation event Tech World held in Austin, Texas. This year’s event, the 9th the company has hosted, focused on how Lenovo is unleashing the power of AI to drive intelligent transformation in every aspect of our lives and in every industry. Lenovo demonstrated the future of AI-ready devices and AI-powered features, including a vision of the future AI PC that will boost productivity, streamline workflow, and safeguard data, and a demo of Personal AI Twin. This is accomplished with AI interactions on the keyboard and natural language from the end-user as well as a new concept feature called AI NOW, which is a personal AI twin (AI assistant) solution for AI PCs. Alongside the AI device demonstrations Lenovo also unveiled a smartphone adaptative display concept that can be bent and shaped into different forms depending on users’ needs and was built upon the display and mechanical innovations from Lenovo foldable devices and rollable concepts, as well as updates to the company’s total solution for AI-powered motion capture, Project Chronos. As part of its focus on smart solutions, Lenovo announced its vision of Enterprise AI Twin – AI applications that have in-depth knowledge about an enterprise and keep that knowledge private and secure. X1 Series The AI Twin can be used for a wide variety of scenarios – from helping employees book travel plans that comply with company policies and fit individual preferences, to supply chain teams mitigating risks based on public AI information such as weather patterns. It finds and extracts relevant information within your enterprise, from devices, edge and private cloud, synthesizes them into assessments and conclusions, and proposes solutions. Alongside CEO Yuanqing Yang, Lenovo CTO and business group leaders shared their view of AI for All: Dr Yong Rui, Senior Vice President and Chief Technology Officer, commented; “In summary, we believe the future AI will involve a hybrid of public, private, and personal foundation models (FM) working together. Our hybrid AI service will leverage the three types of FM, empower AI applications across cloud, edge, and devices with personal twin and enterprise twin. Lenovo would like to build this Hybrid AI ecosystem along with partners, to unleash the potential of foundation models and benefit both our industry and daily life.” Kirk Skaugen, Executive Vice President and President of Lenovo’s Infrastructure Solutions Group, shared Lenovo’s vision for the next generation of AI solutions. He said: “Regardless of where you do your AI, regardless of whether you want general purpose or highly customized compute Lenovo is offering turnkey solutions – enabling AI everywhere for all.” “Through our own cutting-edge AI technology innovation and together with a vast network of best-in-class partners, new Lenovo Hybrid AI solutions are creating a faster and more flexible path to generative AI by bringing data-center level AI to the source of business data anywhere,” he added. References: Lenovo Unveils Comprehensive Vision – ‘AI for All’ – at 9th Global Tech World Event – Lenovo StoryHub For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Lenovo Unveils ‘AI Vision for All’ at Global Tech World Event LEARN MORE Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE
Dell’s GDPI reinforces data protection in today’s digital world
February 15, 2024February 21, 2024 Share this article: Dell’s GDPI reinforces data protection in today’s digital world According to Dell’s data protection report, cyber threats continue to grow and remain at the top of the list for causes of organizational disruption, with 52% of respondents reporting a cyberattack that prevented access to data within the past 12 months. This is the highest percentage in more than five years. The monetary impact on organizations is considerable with costs more than doubling over their last report. This trend is concerning, as 75% of organizations surveyed are worried their existing data protection measures are unable to cope with ransomware threats and 69% reporting they are not very confident they could reliably recover in the event of a destructive cyberattack. Yet despite these perspectives, most organizations (59%) invest more in cyber prevention than cyber recovery. The latest Dell Global Data Protection Index (GDPI) reinforces the importance of staying the course when it comes to protecting data in today’s digitally transformed world. Navigating the complex terrain of data protection remains a formidable challenge and demands a steadfast commitment to understanding all the risks that can threaten an organization’s data. The latest GDPI brings into focus new insights into the heightened threat of cyberattacks, the rise of generative AI (GenAI) and the ongoing expansion into multicloud environments. The GDPI also uncovered new insights regarding the use and effectiveness of insurance policies to help mitigate an organization’s financial exposure. While 93% of organizations cited the use of ransomware insurance policies, they noted several conditions could limit coverage. For example, 57% responded their insurance providers required proof of best practices for cyber threat prevention, 40% indicated some scenarios would void the policy and 40% pointed to the fact that payments to some entities may be restricted by law. For the first time, the GDPI probed the impact of GenAI on both the cyber threat landscape and future data protection requirements. According to the report, 52% believe GenAI will provide an advantage to their organization’s cyber security posture and 27% feel GenAI will initially provide an advantage to cyber criminals. While multicloud is still the preferred strategy for organizations seeking to deploy or update applications, data protection continues to be a major concern. Of IT decision makers surveyed, 79% are not very confident their organization can protect all the data across their public clouds, and 40% of organizations cite challenges over data security in public, multicloud environments. The Dell Global Data Protection Index, commissioned through Vanson Bourne, surveyed 1,500 IT and IT security decision makers from a wide range of public and private industries in September and October 2023 across the globe References: Charting a Path to Cyber Resilient Data Protection | Dell Philippines For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
A lookback at the 2000 “Love Virus” Outbreak: 24 years after
February 14, 2024February 14, 2024 Share this article: A Lookback At The 2000 “Love Virus” Outbreak: 24 Years After THE LOVE BUG — nobody saw it coming, nobody expected or even suspected because it was cleverly disguised as a text file with the title “love-letter-for-you.” So, who would have thought of the danger? Nobody, actually… hence the outbreak! It’s been 24 years since the infamous computer virus had spread throughout the world wide web affecting, infecting, and crashing the entire digital systems of the world. The “love virus” was unleashed on May 4, 2000. It was simple, but devastatingly effective and highly contagious. Once infected, many of the user’s files would be overwritten with copies of the virus, so that whenever the victim tried to open the files, they’d reinfect their system. The virus also tried to steal people’s passwords. But the true genius lay in how it spread. Once infected, the victim’s computer would send an email to everyone in their Microsoft Outlook contacts book. The emails read: “kindly check the attached love letter coming from me,” and attached was a copy of the virus, disguised as a text file with the title “love-letter-for-you.” This unfortunate “love story” started in the Philippines and was delivered with the subject line ILOVEYOU along with instructions to read the attached email. The virus was tracked to an email address registered to an apartment in Manila, which led to Onel de Guzman. He created the Love Bug virus, not thinking it would reach as many people as it did. In 2000, Guzman, 24, was a computer science student at the AMA Computer College. Within 24 hours of releasing the virus, it had spread across the world. Due to the way this virus multiplies and spreads, it is categorized as a worm. It self-replicates, which means that it can send copies of itself through a network without any action from an actual person. The worm would then steal passwords and overwrite files, including both documents and photos stored on any device connected to the original affected computer. Meanwhile, it would also go into the Microsoft Outlook Windows contact list and send a copy of itself to that entire list, starting the cycle over again. In April 2019, BBC News reporter Geoff White tracked down Onel De Guzman in Manila. White interviewed De Guzman for his book on cyber crime called Crime Dot Com. The reporter says he flew to the country and found De Guzman at a phone repair shop in a shopping mall in the Quiapo district. According to White, De Guzman admitted having created the “I Love You” virus while he was a computer science student, but he says he only did it so he could steal passwords and access the internet for free. The efforts to recover data from affected systems and remove the infection cost as much as $10 billion, according to Winder. Government agencies, such as the Pentagon, CIA and the U.K. Parliament, were also affected and, as a consequence, all shut down their email. Information technology (IT) systems around the world were shut down from overload, due to computer systems not being made to process this type of virus, or turned off in an effort to prevent spread of the infection. The Love Bug had a highly publicized introduction to the world. As one of the first examples of malware, it changed the way people viewed and used both email and the internet. The deception of the email being from a loved one paired with it sending itself to people’s personal contact lists, hardened people. They now knew to be more apprehensive and less trusting of emails. The Smithsonian Institute named the “I Love You” virus the 10th most destructive computer virus in history. As for De Guzman, although he was initially arrested by authorities, he was later released and all charges against him were dropped, primarily because there were no laws against writing malware at the time. In June 2000, Congress enacted Republic Act No. 8792, or the E-Commerce Law. White says De Guzman, who was already 44 years old at that time, regrets creating the virus and doesn’t like the infamy it has brought him. “I’m a shy person,” he tells White. “I don’t want this.” Cybersecurity impact Microsoft has defined Cybersecurity as a set of processes, best practices, and technology solutions that help protect your critical systems and network from digital attacks. As data has proliferated and more people work and connect from anywhere, bad actors have responded by developing sophisticated methods for gaining access to your resources and stealing data, sabotaging your business, or extorting money. Advance Solutions Inc (ASI) being one of the leading providers of technology solutions in the country since 1996 has always recognized the importance of cyber security. In fact, ASI conducted a tech update seminar in September 2023 aimed at addressing this current technology trend. In the seminar, ASI’s brand partners Microsoft, HP Philippines, Intel, and Aruba provided a comprehensive discussion on the subject matter of cyber security. A 2022 report produced by HP Wolf Security in collaboration with Forensic Pathways – and alongside security experts in both industry and academia – has identified how cybercriminals are now operating on a professional footing with easy-to-launch malware and ransomware attacks being offered on a “Software as a Service” basis. As a result, even people with rudimentary IT skills are now able to launch cyberattacks at targets of their choosing. A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. References:Throwback Attack: ILOVEYOU, a Love Letter No One Wanted | Industrial Cybersecurity Pulse | Industrial Cybersecurity Pulse For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Smartphone apps that make
Social media security: the crucial role of email and phone number
January 22, 2024January 31, 2024 Share this article: Social media security: the crucial role of email & phone number In a tech update seminar conducted by Advance Solutions Inc (ASI) on Sept. 13, 2023, Art Samaniego who is Technology Editor of Manila Bulletin, said: “We need to just follow best practices: Strong password, authentication, not sharing of personally identifiable information. We don’t need to be the most high-tech person to protect ourselves.” Mr. Samaniego was guest panelist in the seminar about Cybersecurity and he emphasized the need to educate all employees of any company or organization about cybersecurity because he believes it’s the only way to put a stop to incidences of cyber crimes in the workplace. In a recent article for Manila Bulletin, he said that our social media accounts, which contain precious memories, connections, and sensitive information, are susceptible to attacks by cybercriminals. Fortunately, social media platforms like Facebook offer layers of security to keep these virtual doors locked tight. But among these security measures, two stand out as essential partners in crime prevention: a working email address and a phone number. Cybercriminals know the importance of these digital locks. After compromising an account, their first move is to change the associated email and phone number. This disarms you, the rightful owner, by severing the communication channels needed for recovery. Without these, regaining access becomes an uphill battle. But this is where a verified email shines. When a hacker tries to change your password or other critical account details, Facebook automatically sends an alert to your registered email address. This immediate notification acts as a red flag, allowing you to react swiftly and reverse the changes before the hacker locks you. It’s like a security camera catching the intruder in the act! Phone verification further strengthens your defense. If you miss the email notification or lose access to your inbox, the linked phone number becomes your lifeline. Through it, you can receive recovery codes or initiate account restoration processes directly from your mobile device. It’s like having a spare key hidden under a rock, accessible only to you! Remember, email and phone number verification complement, not replace, 2FA. Think of 2FA as the complex key mechanism unlocking your door. Having the key (code) alone isn’t enough; you must know where it’s hidden (email/phone). Therefore, using all three security measures together creates an impregnable fortress for your online accounts. In today’s connected world, everyone benefits from advanced cyber defense programs. A cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning. References: The crucial role of email and phone number in social media security For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
AI to radically transform jobs, healthcare, and education – Bill Gates
January 3, 2024January 19, 2024 Share this article: AI to radically transform jobs, healthcare, education – Bill Gates “AI” or artificial intelligence has become a catchall term to describe any advancements in computing, systems and technology in which computer programs can perform tasks or solve problems that require the kind of reason we associate with human intelligence, even learning from past processes. But what is AI? A straightforward definition from Britannica states that artificial intelligence is “the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings.” In reality, AI is already at work all around us, impacting everything from our search results, to our online dating prospects, to the way we shop. Data shows that the use of AI in many sectors of business has grown by 270% over the last four years. Bill Gates thinks AI is “revolutionary” Microsoft cofounder Bill Gates recently published a six-page blog post outlining his predictions for the future impact of the technology on healthcare, education, and the workforce. Gates said in his blog post that 2023 marked the first time he’d used AI at work or for “serious reasons.” Compared to previous years, the world has a better sense of what jobs AI will be able to do itself and “which ones it will serve as a copilot for,” Gates said. Numerous studies conducted this year have tried to pinpoint which skills and sectors would be the most impacted by advanced AI. There’s already evidence that using the tech as a copilot at work can help employees get ahead. Several companies have developed internal AI tools to boost employees while others encourage workers to use publically available technology. Gates also laid out several medical questions that scientists around the world were trying to use AI to answer. He said the work was ambitious and in an early stage of development. Gates believed that most of it wouldn’t emerge in the next year and some may not leave the lab at all. He said the work was setting the stage “for a massive technology boom later this decade.” A few of the projects Gates namechecked were attempting to use AI to combat antibiotic resistance, treat high-risk pregnancies, and help people assess their risk for HIV. Gates’s nonprofit, the Bill & Melinda Gates Foundation, which he runs with his ex-wife, has donated billions of dollars to medical research worldwide. The foundation’s work has particularly focused on researching, developing, and delivering vaccines to the world’s poorest countries. Gates previously predicted that AI could transform education in the next five to 10 years by delivering content tailored to a student’s learning style. He suggested AI could engage students by learning what motivates them and what causes them to lose interest in subjects. While he said teachers likely wouldn’t become redundant, they may need to adapt to the new technology. In his most recent post, Gates called the AI education tools being piloted today “mind-blowing.” References: Bill Gates’s Predictions: AI Will Radically Transform Jobs, Health, Education; How AI Will Impact The Future Of Work And Life; The road ahead reaches a turning point in 2024 For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
The indelible imprint Technology has placed on our world
December 29, 2023January 15, 2024 Share this article: The indelible imprint Technology has placed on our world Technology has been clearly enriching our lives with uninterrupted information sharing and resource access, but its excessive use has apparently raised concerns on mental health, privacy and increased social divisions. The quick growth of AI tools like ChatGPT has further intensified technology’s role in various industrial settings. The year 2023 saw technology dominate nearly every aspect of our daily life. From the transport system, access to food, and health care to socialization, productivity, and the ease of learning, technology has left an indelible imprint on our world. It has not only made knowledge more accessible but has also led to the formation of global communities in the digital world. Let’s explore the eight key ways in which technology has shaped our lives in recent years. 1. Enhanced Communication Technology has converted traditional voice calls into text-based messaging and social media as the primary means of connection. Moreover, video calling, though not a recent invention, has thrived with the proliferation of high-speed, affordable broadband. The COVID-19 pandemic has solidified video calling as a ubiquitous way to stay connected with loved ones, with Zoom emerging as a popular choice for video conferencing. 2. Work In 2023 with AI The AI revolution is underway, with businesses contemplating the use of AI to replace hiring new staff. Launched in November 2022, AI tool ChatGPT has already revolutionized the way students and professionals access information. It has simplified various tasks, from creating resumes to composing essays, summarizing historical events, crafting emails, among others. Its impact is evident as it garners around 1.8 billion monthly visits to the ChatGPT website. 3. Privacy at Risk In 2022, the average global internet user spent seven hours online each day. But our online actions are also suspiciously tracked making us susceptible and at risk to hackers and scammers. Technology, however, provides solutions for safeguarding our digital lives. Password managers shield existing passwords, generate secure ones, and monitor potential data breaches. Anti-virus software acts as a shield against malware and ransomware, while tools for removing personal information from search engines enhance privacy. 4. Convenient Way to Shop Technology has introduced the convenience of contactless payments through cards and mobile devices, simplifying transactions. For businesses, Point of Sale (POS) systems provide electronic payment solutions while enabling inventory management, receipt creation, and loyalty program management. Moreover, the majority of us now possess tablets, laptops, or smartphones, affording easy access to online stores. 5. Information Access In the old days, a visit to the library was necessary to acquire in-depth knowledge. Today, online resources offer a wealth of information on practically any topic imaginable. Google Maps guide us to destinations, combining directions and satellite imaging for ease of navigation. Various apps have reshaped how we interact with the world, spanning categories like learning, dating, dining, and more. The smartphone has shifted from a mere communication device to an essential portal to the online world. 6. Social Lives Online Social media platforms like Twitter, Snapchat, TikTok, and Instagram offer real-time glimpses into the lives of friends, family, and celebrities. Additionally, companies aim to extend our online presence into the “Metaverse,” where users interact within a computer-generated environment. This paradigm shift in communication has given rise to social commentary and movements, while also presenting challenges such as issues related to mental health, privacy, and the vulnerability of younger users. 7. Flexible Work Setup The pandemic forced a transition from office settings to home-based work in 2020. The trend has persisted, as big and small corporations practice indefinite work-from-home options. Technological progress is instrumental in making this shift sustainable, with remote work software facilitating organization, time management, and goal alignment for employees dispersed across various locations. 8. Advanced Health Tracking Today’s fitness devices offer a scientific approach to health monitoring, delivering instant feedback and personalized recommendations. The Apple Watch can now monitor heart rate, blood pressure, exercise routines, and sleep patterns. These innovations enable us to embark on fitness journeys with precision, offering a level of engagement never before possible. For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
Video Gaming Fraud
December 28, 2023January 10, 2024 Share this article: Video gaming, retail most targeted for fraud in PH – study A new analysis by TransUnion (NYSE: TRU), a global information and insights company, finds that suspected global digital fraud went up in the first half of 2023 while retail and video gaming were among the most targeted industries during that timeframe, digital fraud affected all businesses. This new TransUnion analysis comes on the heels of its recent Q3 Philippines Consumer Pulse Study which explored, among other things, consumer awareness of being targeted by any online, email, phone call or text messaging fraud attempt in the last three months. The TransUnion survey of 1,000 Filipino adults was conducted from July 06 to 24, 2023. Video gaming is the most targeted industry for fraudulent digital transactions in the Philippines, while more than one in 20 global digital transactions in the first half of this year were suspected fraudulent. When the consumer is located in the Philippines during the transaction, among all industries, the suspected digital fraud rate stood at 8.2% in the first half of 2023, TransUnion said. In the first half of 2023, the analysis showed that the retail and video gaming industries saw the highest rates of suspected digital fraud globally at 10.6% and 7.0%, respectively, followed by telecommunications at 5.3%. Also, for transactions coming from the Philippines, the analysis stated that the video gaming industry had the highest suspected digital fraud attempt rate among all industries in the first semester of 2023 at 15.2%. Conversely, the number of digital transactions coming from the Philippines in that industry decreased when comparing first half 2022 to H1 2023 (down 19.4% YoY). While the insurance industry saw the largest increase in digital transactions coming from the Philippines year on year at 160.3%, the suspected digital fraud rate for that industry for transactions coming from the Philippines was 7.1%. Globally, insurance and logistics were the industries with the lowest suspected digital fraud attempt rate in the first semester 2023. Among all industries, the suspected digital fraud rate stood at 5.3 percent, up from 4.5 percent a year ago. TransUnion added that as consumers and businesses continue to use digital transactions to engage in commerce, fraudsters are increasingly using them for their own benefit. Yogesh Daware, chief commercial officer at TransUnion Philippines, said: “If left unchecked, fraud results in an erosion of trust between consumers and industries. When attempting to measure the impact of digital fraud on any one particular industry or another, it’s not enough to look at fraud rates alone.” Reference: Video gaming most targeted industry for fraud in PH – study (mb.com.ph) For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
Amazing facts to learn about technology!
December 4, 2023December 4, 2023 Share this article: Amazing Facts To Learn About Technology! Another Set of Amazing Tech Information! 1. As of 2022, there are 5.1 billion Internet users, and 4.5 billion of them access it on their mobile phones.2. In 1884, William Henry Fruen invented the Automatic Liquid-Drawing Device” or the first vending machine.3. Some Android versions were named after desserts since Android devices make people’s lives sweeter.4. The first computer virus was named ‘Creeper.’5. According to statistics, Americans spend two hours and 54 minutes using their mobile phones per day.6. Nuclear energy is a zero-emission energy source.7. Your Apple product’s warranty may be void if you smoke near it.8. King’s Field is the world’s first PlayStation game.9. The word “robot” originated from a Czech word that means “forced labor.”10. Since 2016, Pokemon Go, a type of augmented reality, has become a game fad. More and more Awesome Tech Trivia! 1. You cannot access the Deep Web using Google.2. The first iPod has the capacity to store 1000 mp3 songs.3. Charles Babbage, an English mathematician, is the father of computing.4. Elon Musk has recently taken over Twitter for a whopping 44 billion dollars.5. Google has worked with a goat-herding company to help reduce the company’s carbon emissions.6. Electronic mail already existed before the birth of the World Wide Web.7. The world’s most luxurious car, Bugatti La Voiture Noire, costs a whopping $18.7 million.8. Banks and other corporate giants hire white hats or “good hackers” to help fix security issues and prevent system infiltration.9. 350, 000 tweets are sent every minute.10. 92% of the global money is digitally stored. Random but Fascinating Technology Facts! 1. The computer mouse is named after its uncanny resemblance to a mouse having a long tail.2. Anyone can edit and modify any page on Wikipedia.3. An average person can blink seven times every minute when using a computer.4. The intense fear or dislike of new technology is called technophobia.5. The corporate giant Samsung is a leading contributor to landfill waste in 2022.6. The inventor of the first computer mouse named it after the gadget’s cord that resembles the long tail of a mouse.7. Jeff Bezos named his company Cadabra Inc before renaming it Amazon.8. India tops the list of Facebook users, having 329.65 million people active on Facebook.9. The most common computer password is “123456.”10. Apple’s OS is more difficult to crack than Android system. Reference: 60+ Amazing Technology Facts – Teach Your Kids Code For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
Digital wallet users encouraged to practice cyber hygiene
November 28, 2023November 28, 2023 Share this article: Digital wallet users encouraged to practice cyber hygiene Filipinos have learned to embrace digital payments out of necessity because of the COVID-19 pandemic. A 2021 study by Visa Consumer Payment Attitudes shows that about 60 percent of Filipino consumers now carry less cash in their wallets and 84 percent have tried going cashless—reflective of how the pandemic and the consequent lockdowns have sped up digital adoption. Among the preferred payment options were: mobile wallets; card payments online; card payments at physical merchants; and QR (quick response) code payments. However, the use of online transactions has also opened the process to the possibility of cyberattacks and online scams. The increase in cyberattacks around the world has interrupted businesses and government operations, and often led to massive ransomware payouts and damaged corporate reputations. The need for cyber hygiene has become more urgent as a key method for creating operational resilience. Cyber hygiene is a set of habitual practices for ensuring the safe handling of critical data and for securing networks. It’s like personal hygiene, where you develop a routine of small, distinct activities to prevent or mitigate health problems. The Department of Trade and Industry (DTI) and the Bangko Sentral ng Pilipinas (BSP) are encouraging merchants and consumers to cultivate a culture of cyber hygiene in the responsible use of digital wallets or e-wallets for cashless transactions. DTI Assistant Secretary Mary Jean Pacheco emphasized during DTI’s Konsyumer At Iba Pa program in DZBB on Saturday, Nov. 18, that while BSP-regulated digital wallets are safe to use, users should be more careful in handling their e-wallet accounts. For her part, BSP Payments Policy and Development Director Atty. Bridget Rose Mesina-Romero shared that BSP is making a lot of efforts to promote secure digital payment platforms, stressing the importance of consumer awareness in the responsible use of digital services. Particularly, she highlighted the BSP’s Digital Financial Literacy program that educates consumers on the proper use of digital services to prevent scams and other fraudulent activities. Digital payments include transaction history and other service features for easier access and tracking of transactions. In encouraging the responsible use of e-wallets, the BSP conducts financial literacy sessions, cyber hygiene talks and lectures on cybersecurity. The cyber hygiene habit are practices and steps that users of digital devices and financial services take to ensure online security, among others. Under the program, the BSP reminds users to do the following: refrain from entertaining suspicious messages or links; enable verification processes set by e-payment platforms; create strong passwords while keeping them private; and report immediately any suspicious alerts. Digital payments include transaction history and other service features for easier access and tracking of transactions. In encouraging the responsible use of e-wallets, the BSP conducts financial literacy sessions, cyber hygiene talks and lectures on cybersecurity. The cyber hygiene habit are practices and steps that users of digital devices and financial services take to ensure online security, among others. Under the program, the BSP reminds users to do the following: refrain from entertaining suspicious messages or links; enable verification processes set by e-payment platforms; create strong passwords while keeping them private; and report immediately any suspicious alerts. Reference: StoryHubDTI, BSP encourage e-wallet users to practice cyber hygiene (mb.com.ph) For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
Only 15% of Businesses Rated as Data Leaders: Lenovo Report
November 24, 2023November 24, 2023 Share this article: Only 15% of Businesses Rated as Data Leaders: Lenovo Report The world’s leading companies must be able to harness data effectively in order to give them a competitive advantage through the ability to quickly gain insights and advance innovation. But new research commissioned by Lenovo has found that in fact, only a minority (15%) of organizations currently meet the criteria to be considered a “Data Leader.” The “Data for Humanity” report polled senior executives in organizations with revenues of $500 million or more across five countries to explore how the world’s largest businesses are harnessing data, and where they see opportunities to use it to meet their goals and draw an advantage in a competitive landscape. The Data Leaders are an elite group identified through the research that have enacted successful strategies across three key pillars of Data Management, Data Analytics and Data Security, enabling them to use data more effectively across business functions. These data-centered organizations have consequently seen a myriad of benefits, and in the past 12 months have successfully increased revenue (78%) and improved customer satisfaction (70%). The Data Leaders are also far less likely to have experienced the effects of poor employee productivity (13%) and reduced innovation (10%) The three key pillars of Data Management, Data Analytics and Data Security feature prominently in all organizations’ future plans despite just a minority falling into the Data Leaders category. Business leaders state that over the next five years, they are most likely to invest in: Cybersecurity tools (59%); Artificial intelligence (AI) tools (58%); Data analytics tools (57%); and Data storage (55%). Other aspects seen as vital to extracting data capabilities include increasing automation of data management and/or analysis (89%) and improving the use of different types of data, such as external and unstructured data (88%). Organizations are currently seeing success across some areas. Most leaders feel that their data solution is scalable (58%), highly automated (57%), and simple for employees to use (55%). Many also feel that their current tools and technologies improve visibility, helping to provide a single view of all the data across the business (54%), and have the majority of their data stored in the cloud (52%). Yet only half (52%) are happy with their current data platform, and almost a quarter (23%) feel that they are lagging behind competitors in this space. Security and skills are both cited as key areas holding businesses back, in addition to struggles with internal communication and data integration. Over half (56%) also struggle to access their data from anywhere, an increasingly important factor in the hybrid working era. Organizations are currently seeing success across some areas. Most leaders feel that their data solution is scalable (58%), highly automated (57%), and simple for employees to use (55%). Many also feel that their current tools and technologies improve visibility, helping to provide a single view of all the data across the business (54%), and have the majority of their data stored in the cloud (52%). Yet only half (52%) are happy with their current data platform, and almost a quarter (23%) feel that they are lagging behind competitors in this space. Security and skills are both cited as key areas holding businesses back, in addition to struggles with internal communication and data integration. Over half (56%) also struggle to access their data from anywhere, an increasingly important factor in the hybrid working era. EMEA President of Lenovo ISG Giovanni Di Filippo said: “With the three key data pillars playing a prominent role in future IT investment, it’s only a matter of time before we see more organizations become Data Leaders as they continue to harness new tools and solutions.” Reference: Only 15% of Businesses Considered Data Leaders, as Organizations Strive to Enhance Data Strategies to Keep Up with Competitors – Lenovo StoryHub For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: INQUIRE NOW! More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE
Beat the Medusa ransomware with the right technology solution
October 26, 2023Share this article: October 26, 2023 Beat the Medusa ransomware with the right technology solution The Philippine Health Insurance Corporation (PhilHealth) fell victim to a data breach on Sept. 22. The government’s health insurance agency was hit by a ransomware attack known as Medusa. In 2022, there were 65.05 million beneficiaries of PhilHealth that were categorized as direct contributors. The information of this huge number of members was greatly put to risk because of the incident. The Medusa ransomware is a type of malware that encrypts files and demands a ransom payment in exchange for the decryption key. The Medusa ransomware group has executed a sophisticated attack on PhilHealth, compromising sensitive data and exposing select samples online, underscoring the emergent and serious nature of this cyber threat. The compromised data includes confidential information of Filipinos such as names, addresses, contact information, and medical records, as well as internal memos and memoranda from PhilHealth officers, signifying the extensive range of data vulnerable to such attacks. Medusa has demanded a ransom of $300,000, threatening to release the entirety of the stolen PhilHealth data online if the ransom is not paid, highlighting the significant financial implications of such cyber threats. The government has denied any intentions to pay the ransom, and PhilHealth is working with the DICT and other relevant agencies to recover the stolen data and ensure the culprits are brought to justice. In response to the ransomware incident, the National Privacy Commission (NPC) has unveiled a new tool designed to empower citizens, particularly senior citizens, to verify the security of their data. The NPC launched the “Na-leak ba ang PhilHealth Data ko?” portal on October 13, 2023, amidst a disconcerting data breach involving the state insurer. The “Na-leak ba ang PhilHealth Data ko?” portal is an individualized search tool allowing Filipinos to ascertain whether their personal information was included in the leaked data by entering their PhilHealth Identification Number (PIN). Privacy Commissioner Atty. John Henry D. Naga said that the NPC developed the portal in an “exceptionally short period,” as a commitment to protecting citizens’ personal information. It also underscores the commission’s resolve to fortify data privacy and citizens’ peace of mind after the data leak. The recent hacking incident at PhilHealth has brought to light the importance of cyber security in companies and organizations. A cyber security attack can result in everything from identity theft, to extortion attempts, to the loss of important data like in the case of the state insurer. But the good news is, it can be prevented with the right technology solutions. For the last 27 years, Advance Solutions Inc. (ASI) has been one of the leading providers of technology solutions for business, government, education and finance. ASI’s partnership with the best brands in the industry has resulted in bringing a greater technology advantage for their valued clients. In a recent tech update seminar spearheaded by ASI, two of its top brand partners presented their latest security features: A representative from Microsoft Philippines informed the audience about Bitlocker — a Windows disk encryption feature, designed to protect data by providing encryption for entire volumes. BitLocker addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned devices. HP Philippines representative introduced the HP Wolf Security touted as a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Reference: PhilHealth under siege: Medusa group demands US$300,000, threatens to leak data (mb.com.ph) For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE Product Promotion Tech O’clock Fortinet’s next-gen firewall redefines Data Center Security LEARN MORE Product Promotion Tech O’clock Fortinet Security Fabric LEARN MORE Feature Stories Tech O’clock Social media security: the crucial role of email and phone number LEARN MORE Product Promotion Tech O’clock Lenovo hybrid cloud solution integrates AI capabilities LEARN MORE Product Promotion Tech O’clock Harnessing the Power of the Edge with Aruba ESP LEARN MORE
Cybercrime Evolution: HP Wolf Security Report
October 23, 2023October 24, 2023 Share this article: Cybercrime Evolution: HP Wolf Security Report A 2022 report produced by HP Wolf Security in collaboration with Forensic Pathways – and alongside security experts in both industry and academia – has identified how cybercriminals are now operating on a professional footing with easy-to-launch malware and ransomware attacks being offered on a “Software as a Service” basis. As a result, even people with rudimentary IT skills are now able to launch cyberattacks at targets of their choosing. “Digital transformation has supercharged both sides of the attack-defense divide – shown, for instance, by the increasing popularity of ‘as a service’ offerings. This has democratized malicious activity to the point where complex attacks requiring high levels of knowledge and resources – once the preserve of advanced persistent threat (APT) groups – are now far more accessible to a wider group of threat actors,” says Alex Holland, Senior Malware Analyst at HP Wolf Security’s Threat Research team – and author of the report. By the mid-1990s, a thriving hacker subculture was communicating globally over Internet Relay Chat (IRC). Initially, hackers sought to score bragging rights for their technical skills. But with the dotcom boom, many realized there might be serious money to be made. The launch of malware kits began to lower the skills levels needed. But these “sole trader” fraudsters had little power to scale their operations until they started collaborating and pooling skills. This led to hackers specializing in perfecting different parts of the attack chain – whether penetrating systems, developing malware or laundering stolen money and cryptocurrency. Initially, ransomware variants like CryptoLocker relied on opportunistic attacks by targeting systems already infected by the ZeuS variant Gameover ZeuS, demanding a $700 ransom or the equivalent in Bitcoin to decrypt an infected machine’s data. Attacks like WannaCry and NotPetya took this to the next level by using destructive methods to cripple critical infrastructure. Since 2018 cybercrime has continued its move towards service and platform business models, with threat actors tapping into complex supply chains to launch attacks using specialist “plug and play” components. It has also become more organized and targeted. Criminals are taking much more time to understand a target’s infrastructure to maximize their impact, whether that’s achieving a bigger ransom or disabling a more critical piece of infrastructure. “In the last century, the economy shifted from sole traders to mass production, to service models, to platforms like Amazon,” says Dr. Mike McGuire, Senior Lecturer in Criminology, University of Surrey, UK. “The cybercrime economy did this in less than 25 years.” Reference: HP-Wolf-Security-Evolution-of-Cybercrime-Report For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin Share this article: More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE Product Promotion Tech O’clock Fortinet’s next-gen firewall redefines Data Center Security LEARN MORE Product Promotion Tech O’clock Fortinet Security Fabric LEARN MORE Feature Stories Tech O’clock Social media security: the crucial role of email and phone number LEARN MORE Product Promotion Tech O’clock Lenovo hybrid cloud solution integrates AI capabilities LEARN MORE Product Promotion Tech O’clock Harnessing the Power of the Edge with Aruba ESP LEARN MORE
Endpoint security in your workplace
October 3, 2023October 10, 2023 Endpoint security in your workplace Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes. In today’s connected world, everyone benefits from advanced cyberdefense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos. Everyone relies on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning. In a tech update seminar organized by Advance Solutions Inc in September, HP Philippines presented the HP Wolf Security defined as a new breed of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. HP Wolf Security Threat Insights Report Each quarter HP’s security experts highlight notable malware campaigns, trends and techniques identified by HP Wolf Security. By isolating threats that have evaded detection tools and made it to endpoints, HP Wolf Security gives an insight into the latest techniques cybercriminals use, equipping security teams with the knowledge to combat emerging threats and improve their security postures. The HP Wolf Security Threat Insights Report highlights notable malware campaigns analyzed by their threat research team so that their customers are aware of emerging threats and can take action to protect their environments. Enterprises are most vulnerable from users opening email attachments, clicking on hyperlinks in emails, and downloading files from the web. HP Wolf Security protects the enterprise by isolating risky activity in micro-VMs, ensuring that malware cannot infect the host computer or spread onto the corporate network. HP Wolf Security uses introspection to collect rich forensic data to help their customers understand threats facing their networks and harden their infrastructure. Key findings of the Q2 2023 edition (HP Wolf Security Threat Insights Report) include the following: Email remained the top vector for delivering malware to endpoints. 79% of threats identified by HP Wolf Security were sent by email in Q2, down one percentage point over Q1. The number of email threats that had bypassed email security fell slightly in Q2. 12% of email threats detected by HP Wolf Security had bypassed one or more email gateway scanner, down two percentage points from the previous quarter. Malicious web browser downloads fell slightly by one percentage point to 12% in Q2. Threats delivered by other vectors, such as removable media, grew by two percentage points to 9% compared to Q1. • QakBot spam activity surged in Q2, tallying 56 campaigns over the quarter. The malware’s distributors switched between many combinations of file types to infect PCs. The HP Threat Research team identified 18 unique infection chains used by QakBot distributors in Q2, highlighting how capable attackers are quickly permutating their tradecraft to exploit gaps in network defenses. • HP Wolf Security stopped a flurry of finance-themed malicious spam campaigns in Q2 spreading remote access trojans (RATs) crypted using a Go crypter called “ShellGo”. The malware was packed twice to evade detection, before running shellcode in memory that disarms Windows security features and launches AsyncRAT. The threat actor used a clever technique to run the RAT in memory through a complex sequence of function calls to .NET libraries. The activity shows how easy it is for threat actors to combine tools to thwart detection and analysis, even those with few resources. • Aggah continue to evolve their tactics, techniques and procedures (TTPs) to elude detection. Notably, in campaigns in Q2 we saw this threat actor store malicious PowerShell commands in DNS TXT records that were retrieved through nslookup commands. Reference: HP Wolf Security Threat Insights Report Q2 2023 | HP Wolf Security For further information on ASI’s products and solutions, you may call or visit our social media accounts: Mobile-alt Facebook Instagram Linkedin More Updates Feature Stories Tech O’clock Dell’s GDPI reinforces data protection in today’s digital world LEARN MORE Product Promotion Tech O’clock Perks of Extreme’s Cloud-based network management platform LEARN MORE Feature Stories Tech O’clock A lookback at the 2000 “Love Virus” Outbreak: 24 years after LEARN MORE Product Promotion Tech O’clock Extreme Fabric Network LEARN MORE Product Promotion Tech O’clock Fortinet’s next-gen firewall redefines Data Center Security LEARN MORE Product Promotion Tech O’clock Fortinet Security Fabric LEARN MORE Feature Stories Tech O’clock Social media security: the crucial role of email and phone number LEARN MORE Product Promotion Tech O’clock Lenovo hybrid cloud solution integrates AI capabilities LEARN MORE Product Promotion Tech O’clock Harnessing the Power of the Edge with Aruba ESP LEARN MORE