-
Strategic merger of three digital technology firms in Asia
Three prominent digital services companies in Asia – Digile Technologies, Reveron Consulting, and Innopia Global – have merged to create a digital services powerhouse with a formidable presence in the Asian region.
-
Technology and digitalization are key for sustainable lifestyle, research revealed
More than two-thirds (71%) of consumers think technology and digitalization are key in enabling them to live a more sustainable lifestyle, while over a third (33%) desire apps to provide clearer information on how to live sustainably across various aspects of life, according to an independent research report commissioned by Alibaba Group.
-
Yahoo integrated approach for advertising in a cookieless world
Yahoo Advertising announced a new integration with Twilio Segment Customer Data Platform (CDP) to drive greater advertising reach and relevance, without relying on third-party cookies.
-
Plans for further integration of IBM watsonx with AWS
IBM announced plans to expand its relationship with Amazon Web Services to help more mutual clients operationalize and derive value from generative artificial intelligence.
-
API Security Company Neosec acquired by Akamai Technologies
Akamai Technologies, Inc. announced entering into a definitive agreement to acquire Neosec, an API detection and response platform based on data and behavioral analytics.
-
Google's approach to further reduce the security burden on users
October marks Cybersecurity Awareness Month and with online safety being top of mind, Google has launched new products and features to help people everywhere. These releases include in-built features that work around-the-clock to take the security burden off users, and updates to privacy controls that help to easily protect personal information.
- Dark web report: Users can check if their Gmail address has been exposed on the dark web as well as get guidance on how they can protect themself online by accessing the Dark Web Report in their account menu in the Google App. They just have to sign into the Google App and tap their profile picture to open the menu.
- Passwordless by Default: Passkeys are a simpler and more secure way to sign into sites online and can be used with the Google Accounts. To make transition to passwordless even easier, Google is offering the ability to set up passkeys for all users — by default.
- A new requirement to make email safer for everyone: Gmail recently announced new requirements for large senders to make email safer and more user-friendly for everyone, including enforcing authentication, enabling easy unsubscription, enforcing a clear spam rate threshold. This is in addition to Gmail’s AI-powered defenses, which block more than 99.9% of spam, phishing and malware — that’s 15 billion unwanted emails every day.
- Easier access to clear browsing data: Google added an option to quickly delete users’ browsing history in Chrome without interrupting current activities. Users just need to click the three dots in the top-right corner of the Chrome browser and select “Clear browsing data”.
- Use the Google App as the credential provider for your iOS device: Google Password Manager is built into the Google App and you can already use it to securely save your passwords and sign in faster when you’re using the app. Now, you can set it as your Autofill provider so that the Google App can help you quickly and securely autofill your passwords into any app or website on your iOS device.
Feel free to read more about the announcements in Google’s blog post.
By MediaBUZZ -
Advertisers' awareness of cookieless technologies remains low according to global survey
Ogury, a global leader in personified advertising, commissioned IDC to conduct a global survey on 1,000 major brand and media agency executives to get their perspective and understanding of the future of digital advertising in a cookieless world.
-
Mindful Employer Branding Key to Successful Staff, HR Recruitment
In modern society, building an inclusive employer brand should be considered mission critical for businesses large and small. The most successful companies are the ones that see challenges and opportunities from many different angles, and having a diverse employee population allows you to do just that. An inclusive employer brand lets you engage, recruit, and hire a wonderful spectrum of people who can bring their varied backgrounds to bear for your business. Simply put, building an inclusive employer brand brings a diverse set of experiences and perspectives to the table, which in turn allows your company to be smarter, more thoughtful, and ultimately more successful.
-
Protecting Data in the Cloud
Organizations in Singapore are increasing their reliance on the cloud. Nearly nine in ten organizations in the country are using cloud services, with about 70% taking a hybrid cloud approach.
-
Bilateral 5G roaming agreements will push global losses to $8 billion by 2028
A new study from Juniper Research has found losses from global roaming fraud are anticipated to exceed $8 billion by 2028, driven by the increase in bilateral roaming agreements for data-intensive use cases over 5G networks. In turn, it predicts fraudulent data traffic will account for 80% of global operator roaming-based losses by 2024.
-
Black Friday Online Shopping Safety Checklist
Vigilance is urged during this 2023 Black Friday and Cyber Monday, as “AI generated scams enhance the threat to this year’s festive shoppers, as it’s revealed over 7 in 10 British people worry that AI will make it easier for criminals to commit online fraud” – NCSC.
But while AI scams like voice cloning, romance scams, and language mimicking are on the rise, “93% of the biggest spenders, millennials aged 24-35, plan to shop during this coming weekend. And they spend an average of $419.52 per person.” But with cyber security threats at an all-time high, how can shoppers and businesses stay cyber safe?
Here are our top tips for staying safe online, and the preventative measures that can be taken while shopping for your latest bargain.- Be Aware of Phishing & Quishing Attacks
SecurityHQ analysts have recently observed a significant increase in Business Email Compromise (BEC), regarding phishing attacks containing QR code (Quishing) and captchas for credentials harvesting. Quishing attacks usually occur via the scanning of a QR code. This technique involves tricking users into scanning a QR code using a mobile phone. The QR code then redirects the user to a phishing or fake website that aims to steal their credentials.
Read more about Quishing, and how to spot QR Code vulnerabilities, here. - Read the Small Print
If something seems too good to be true, it probably is. While Black Friday deals can offer huge discounts that are genuine, people still need to make money. Anything ridiculously cheap is a red flag.
What to look for:
- It is worth checking the reputation score of retailers to determine if that retailer can be trusted.
- A website with no company address, descriptions or specifications on items are all red flags. Look for the details. And do not base purchases solely off star ratings, as these can be fake.
- Pop-ups that offer free electronics are obvious scams, containing malicious phishing links, and should be avoided at all costs.
- Read the small print. Often cons are perfectly visible if you know what to look for. Like seeing a picture of a laptop being advertised, going to buy said laptop for a reduced rate without reading the small print, and receiving a literal picture of a laptop in the post. The devil is in the detail.
- Use Reputable Websites/Companies
Tried and Tested – Using websites that are globally known is a good way to avoid any nasty surprises. Even if it is a couple of pounds more, it is worth knowing where your money is going and that your purchase will be tracked and delivered.
Use Antivirus Software that will warn you of potentially dangerous sites in search results as well.
Look For Suspicious Emails, as well as suspicious calls and text messages. Never click on a link you are unsure of, and never provide personal information over the phone. Read more on email security, here. - Stop, Look, Check, Pay
Secure Sockets Layers (SSL) are used to ensure data is encrypted before being transmitted across the web. It is also an indication that an organization has been verified. Keep an eye out for HTTPS in the address bar rather than HTTP, as this highlights a site uses SSL.
Make Sure the Website That You Intend to Shop on is Not a Copy of a legitimate one. Verify that the date and name of the organization are consistent with the site you are visiting. And look for typos in the URL. Your best bet it to go directly to the website yourself, and do not access it through links on other sites/emails.
When using public Wi-Fi, use a VPN as the most effective way to stay safe and so that hackers do not steal your personal data while you are on an unsecure network. - Check Your Bank Account
- Use a credit card or payment method which offers protection (i.e., PayPal).
- Check your accounts regularly for fraudulent activity.
- Only provide enough details to complete your purchase (no extra details required)
- Keep Your Passwords Safe & Don’t Use Default Credentials
Default credentials used by applications and appliances are often published on the internet. This can be a big problem. An attacker will typically first scan your network to see where they can move next. If an attacker was lucky enough to identify applications or appliances with default credentials enabled, it won’t take them long to hunt on the internet for these published credentials. Read how to detect default credentials, here.
Finally, keep your passwords safe. Read this blog on password protocols to learn more. Don’t let cyber scams ruin your festive fun this winter!
By SecurityHQ - Be Aware of Phishing & Quishing Attacks
-
Comprehensive protection measures a must to prevent data leaks and theft
Remote work, home office or hybrid work, have become the norm in today's business world and that most likely will stay that way. But the more employees work remotely, the greater the company's risk of falling victim to a cyberattack, making a sophisticated and multi-layered security concept the more essential for any company.
-
Content Remains King in the Future of Video in India
The Asia Video Industry Association’s (AVIA) Future of Video India conference opened to a full house with a keynote conversation with Shri Apurva Chandra, Secretary, Ministry of Information and Broadcasting (MIB). Secretary Chandra stated that with OTT (over-the-top), Indian content has become more accessible and more acceptable to a global audience. “Quality of content has always been very good in India, but now it is easier for Indian content to travel across the world. OTT has helped it in a big way,” said Chandra. He also reiterated the need for OTT to continue with a soft touch approach, as the three tier self-regulatory system has been working well. While there were concerns that light touch regulation has led to less desirable content, he remained of the view that the industry needed to be more self-aware so that the government need not step in. Chandra also shared that a National Broadcasting Policy has been in the works, as the industry was becoming more fragmented. However, this would take time in order to balance the conflicting interests of all the disparate parties.
The world's No. 1 CRM company, Salesforce.com, released its 2015 State of Marketing report, based on a survey of more than 5,000 marketers globally.
The second annual report revealed marketers plan to increase investments in social media advertising, social media marketing, location-based mobile tracking, mobile apps and email marketing in an effort to create cohesive customer journeys. In addition, 84% of respondents reported they plan to increase or maintain marketing budgets in 2015 with social and mobile marketing topping the priorities list.
"The future of marketing is building cohesive customer journeys across sales, service and marketing interactions. It is more important than ever to connect with each person interacting with your brand, and personalize journeys based on their actions and preferences," said Scott McCorkle, CEO, Salesforce Marketing Cloud, Salesforce. "Our 2015 State of Marketing report shows that this will be the year that businesses connect the dots accordingly and implement a truly multi-channel approach to personalize each customer's engagement", he added.
Key findings include:
The customer journey is now critical to business success. There is a massive shift from campaign-focused marketing to personalized 1:1 customer journeys. According to recent research from Salesforce and LinkedIn, 86% of senior-level marketers say it is critical to create a cohesive customer journey across all touchpoints and channels. In the 2015 State of Marketing report, respondents cited mobile apps, marketing analytics and customer relationship management (CRM) tools as the technologies that are most effective at creating a cohesive customer journey.
Budgets for social are growing more than any other digital marketing channel. There is a major shift in how marketers view social: 64% of marketers now view social as a critical enabler of products and services, up from 25% in the 2014 State of Marketing report, and 70% of marketers said they would increase spending on social media advertising.
Marketers are integrating mobile into their overall marketing strategy and are increasingly focused on ensuring they are reaching their customers with 1:1 interactions in real-time via mobile devices: 68% report they have integrated mobile into their overall marketing strategy (up from 48% in last year's report), 65% plan to spend more on mobile push notifications (a 32% year-over-year increase), and 58% now have a dedicated mobile marketing team (up from 35% in 2014).
Email reigns as the digital marketing engine: 73% of marketers agree that email is core to their business, and 92% report that email produces a return on investment (ROI); 47% of survey participants cited click-through rates as the key metric for measuring email marketing success, while 43% identified conversion rate as the key metric.