Petya: Is it just a ransomware or something far more dangerous?

Petya might be more than just your everyday ransomware attack. According to Gizmodo, NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) announced that the attack is believed to be a potential act of cyber war. At this point in time, it is clear that it uses the same exploit as WannaCry (EternalBlue and […]

“Cloud today success tomorrow” – A Tech One Sanje event on the potential of the cloud

June 21, 2017, Hilton Colombo — Tech One Sanje together with Microsoft initiated an event titled “Cloud today. Success Tomorrow” to take digital transformation to its next steps: exploring cloud capabilities.The cloud has been a centerpiece in the overall canvass of digital transformation. It’s where many functions are taking place: software development, testing, deployment, and […]

Petya/GoldenEye: The deadliest cybersecurity threat of 2017

Weeks ago, experts predicted that there will be stronger copycats of WannaCry. Enter Petya/GoldenEye “ransomware”, a threat that also leverages from the EternalBlue exploit. The two share a lot of traits: both spread easily, and both target high-profile entities like multinational organizations. The twist? It’s deadlier.The current attack is like 2016’s Petya with added improvements […]

Compliance and Protection: A Tech One Global Event on Cybersecurity and Data Privacy

June 19, 2017 Discovery Primea, Makati — Tech One Global together with Microsoft initiated an event titled “Cybersecurity and Data Privacy.” With data quickly becoming the new oil of this generation, cybersecurity and data protection is now an utmost concern for any IT infrastructure.The event started with Tech One Global’s very own CEO, Lars Jeppesen, […]

Five habits that might be a cybersecurity risk

One part of a strong cybersecurity structure are the digital habits of your company’s employees: how they surf, which sites they go to, what files they download, and what transactions they do are all potential entry points for cybercrime. With that in mind, here are five common habits you do in the office that might be […]

Data is the new oil: Five tips to stop it from leaking

“Data in the 21st Century is like Oil in the 18th Century: an immensely, untapped valuable asset. Like oil, for those who see Data’s fundamental value and learn to extract and use it there will be huge rewards.” – Wired.com.  Ten years ago, we can’t even imagine anything that will surpass the oil industry in […]

Cybersecurity 2017: Five Key Investments for Cybersecurity

“2016 was the year that hacking became mainstream, but 2017 will be the year where hackers innovate.” — Dan Patterson, Senior Writer for TechRepublicCybersecurity is an issue that most people often take for granted. Recently, the world witnessed as WannaCry laid waste to the entire internet, paralyzing even hospitals and government units. With the advent of […]