What is Consumer Data Protection and Why is it Important?

Protecting consumer data is an important and necessary part of conducting business in today’s information society. Companies that fail to do so properly can lose consumer trust which can make a major impact on a company’s success as a business. Increasingly today, companies are more frequently making headlines for not taking the appropriate steps to protect consumer data. With huge payouts to customers, fines imposed by government counsels, and damaged reputations, enterprise-level companies must find ways to stay ahead of data thieves. Consumer data must be protected at all costs and implementing policies to do so are paramount to the success of enterprise-level companies. Consumers ultimately pay the price when a company fails to protect sensitive consumer data which can lead to loss of consumer trust in the company and a shift to a more capable company. The majority of businesses today do have a tight security strategy to protect themselves as Continue reading

Case Study of Air Asia: Information Technology Implementation for Business Success

Information Technology (IT) is one of the major enablers of AirAsia’s successful low cost business model. AirAsia had demonstrated the strategic value of information and communications technology (ICT) in improving competitiveness with a very high majority of its passengers making their bookings online. AirAsia was also the world’s first airline to allow SMS (short messaging service) booking and payment of airline tickets. In 2003, AirAsia proud to be the first airline in the world to offer flight booking and payment via Short Messaging Service (SMS) and make their guests flight booking anytime and from anywhere 24 hours and 7 days a week. Apart from making a Flight Booking, AirAsia guests can also make enquiry on lowest fare, departure or arrival information and city codes. All this is available at a normal cost of RM0.15 cents per SMS and without any additional charges. AirAsia guests can also register to be the Continue reading

Social Engineering – Meaning, Types and Defenses

Living at the height of the Information Age means information security has never mattered more. With a greater amount of people and businesses going paperless, there is an ever-increasing need and demand to keep digital information secure. The CIA triad or the Confidentiality, Integrity, and Availability of a company’s data is a general model designed to guide security policies for information security inside an organization.  Confidentiality refers to the privacy of data – making sure that only people who are allowed to access data are able to access it.  Integrity refers to maintaining a data’s accuracy and trustworthiness – making sure that data cannot be altered by an unauthorized person. And lastly, availability refers to the ability to access data when an authorized person tries to access it. Cybercrime is a billion-dollar industry, which is built upon hackers breaking an organization’s CIA triad. This includes but is not limited to: Continue reading

The Impact of Artificial Intelligence (AI) in the Workforce

The term “Artificial Intelligence” (AI) was first coined by American computer scientist, John McCarthy, in 1955 as a way to describe the science and engineering of making intelligent machines. This concept was based on the conjecture that every aspect of learning or any feature of intelligence in principle can be simulated by a machine as the ultimate effort to reach human-level intelligence. While, the more modern-day definition of this phenomenal change in technology focuses on Artificial Intelligence (AI) being a sub-field of computer science that has the ability to imitate human intelligence such as visual perception, decision-making, speech recognition and the translation between languages. Consequently, these transformations in technology opened up new opportunities for individuals, society and the economy as it provides unprecedented options for a prosperous future. However, despite AI’s intrinsic benefits, the pervasive force is largely attributed to the poor performance of labour markets across advanced economies as Continue reading

Ethical Hackers and Ethical Hacking

An ethical hacker is a security professional who helps organization to take defensive measures against malicious attacks and usually the process he doing to find those vulnerable point is called Ethical Hacking. Sometimes this is also known as Penetration Testing or Intuition Testing. In this case, the ethical hackers are getting into the minds of computer criminals; think like them to find about innovative ways the hackers may use to get into the systems. Then organizations can take required actions to avoid those vulnerabilities. It has identified that the almost all computer systems have vulnerabilities that can be exploited by a hacker to come to do damages. This can be due to an unpatched application, a misconfigured router or a rough network device and it will be not able to detect unless penetrate the networks and assess the security posture for vulnerabilities and exposures regular basis. As the hacking is Continue reading

How Does Blockchain Technology Work?

The ability to own and to transfer assets via transactions is at the heart of economic value creation. And to keep track of these business agreements, market participants have always relied on ledgers. But to make sure that these ledgers remain accurate and are not being tampered with by fraudulent market participants, most business networks rely on central, trusted parties, such as banks or other intermediaries, to oversee these business ledgers and to validate each transaction that is taking place within the network. This need for an intermediary has become even more important in the modern age, as assets have increasingly been digitalised and central third parties are required to make sure that a digital asset is not duplicated and spent more than once by the same party. But while the use of such a central intermediary brings the major benefit of introducing trust into the system, it also comes Continue reading