Protecting your business from cyberattacks
THE Philippines is one of the countries susceptible to cybersecurity attacks. From hacking of government websites before elections to online bank cyberheist, the country’s defenses against these attacks have yet to be
Recognizing this need, the Philippine government created the Department of Information and Communications Technology (DICT) to establish a system that will safely provide Filipinos access to vital information and communication technology (ICT) structures and services.
Through the formulation of the National Cybersecurity Plan 2022, the DICT aims to assure continuous operation of nation’s critical infostructures, implement cyber resiliency to respond to threats, coordinate with law enforcement agencies and cyber- secure educated society.
“Technological advancements will continue to bring security issues if we don’t know how to utilize them,” said Sue Ong-Lim, sales and marketing director of Acer Philippines, as the Taiwanbased tech company echoes the government’s mission in calling on institutions that are highly vulnerable from cyber threats, like businesses, to strengthen their data security through maximizing available hardware and software. “Cybersecurity has always been a problem in the country and it’s about time we do something about it. Globally, 43 percent of cyber- attacks are aimed at small businesses and with 230,000 new malware samples created every day, the number of data breaches are expected to rise in the coming years.”
Malwares or malicious software are harmful to computer users and can easily spread, especially for Filipinos who thrive on staying online. But online threats are not the only entities Filipinos should be weary of. One can transfer malwares through unsafe transport of data though corrupted hard drives and USB devices. In short, viruses can ride on physical devices through manual transmission and connection.
“Protecting your company’s information is not just an online
effort,” said Ong-Lim. “Threats are not just found online or within the software component of your devices but also in the physical parts of unprotect ed computers. We always recommend to our clients and business partners to choose hardware that provide security features.”
As a top ICT company, Acer puts thought into their designs of both software and hardware. Designed to protect companies’ assets from harm and theft, the tech giant developed the Acer Security Suite. It is a complete hardware and software package that encrypts
user-set passwords and can leverage the trusted platform module ( TPM) technology for totally secure computing.
Aside from the Suite, Acer also offers commercial desktops such as Acer Veriton, that is designed with durable security locks that companies can utilize for protection. At the same time, it is also equipped with security command plug-ins that will give users the liberty to move storage of important information and the urgency to act upon any threat.
“Aside from updating your software, purchasing tools and devices that can protect businesses from cyber threats is a worthwhile investment,” said Ong-Lim. “Businesses might not be aware but proactively safeguarding their
an attack. Whether it’s a database of their customers, or proprietary data, information is currency for every business and technology should be utilized to stop threats from even reaching them.”