How Does Enterprise Computing Support Business Organizations?

Nowadays Information technology has a rapid growth. Almost every day there are new ideas to improve the performance of technology. It cannot be denied that people who lives today unconsciously depends on technology. Each task did by the people gets many help from technology. For an instance, a hand phone that help us to communicate with our colleagues, the internet that serve certain time information for us and many more technology which made our daily activity become easier. At least we can follow the technology progress so that we don’t left behind. Technology has an important role both in our lives and business. A company or organization need to know about the technology to help them to running their task in easier way. They must change their manual way to the automatic one. The automatic system will help finishing several tasks easier. There are several benefits if an organization or Continue reading

What is Consumer Data Protection and Why is it Important?

Protecting consumer data is an important and necessary part of conducting business in today’s information society. Companies that fail to do so properly can lose consumer trust which can make a major impact on a company’s success as a business. Increasingly today, companies are more frequently making headlines for not taking the appropriate steps to protect consumer data. With huge payouts to customers, fines imposed by government counsels, and damaged reputations, enterprise-level companies must find ways to stay ahead of data thieves. Consumer data must be protected at all costs and implementing policies to do so are paramount to the success of enterprise-level companies. Consumers ultimately pay the price when a company fails to protect sensitive consumer data which can lead to loss of consumer trust in the company and a shift to a more capable company. The majority of businesses today do have a tight security strategy to protect themselves as Continue reading

Case Study of Air Asia: Information Technology Implementation for Business Success

Information Technology (IT) is one of the major enablers of AirAsia’s successful low cost business model. AirAsia had demonstrated the strategic value of information and communications technology (ICT) in improving competitiveness with a very high majority of its passengers making their bookings online. AirAsia was also the world’s first airline to allow SMS (short messaging service) booking and payment of airline tickets. In 2003, AirAsia proud to be the first airline in the world to offer flight booking and payment via Short Messaging Service (SMS) and make their guests flight booking anytime and from anywhere 24 hours and 7 days a week. Apart from making a Flight Booking, AirAsia guests can also make enquiry on lowest fare, departure or arrival information and city codes. All this is available at a normal cost of RM0.15 cents per SMS and without any additional charges. AirAsia guests can also register to be the Continue reading

Social Engineering – Meaning, Types and Defenses

Living at the height of the Information Age means information security has never mattered more. With a greater amount of people and businesses going paperless, there is an ever-increasing need and demand to keep digital information secure. The CIA triad or the Confidentiality, Integrity, and Availability of a company’s data is a general model designed to guide security policies for information security inside an organization.  Confidentiality refers to the privacy of data – making sure that only people who are allowed to access data are able to access it.  Integrity refers to maintaining a data’s accuracy and trustworthiness – making sure that data cannot be altered by an unauthorized person. And lastly, availability refers to the ability to access data when an authorized person tries to access it. Cybercrime is a billion-dollar industry, which is built upon hackers breaking an organization’s CIA triad. This includes but is not limited to: Continue reading

The Impact of Artificial Intelligence (AI) in the Workforce

The term “Artificial Intelligence” (AI) was first coined by American computer scientist, John McCarthy, in 1955 as a way to describe the science and engineering of making intelligent machines. This concept was based on the conjecture that every aspect of learning or any feature of intelligence in principle can be simulated by a machine as the ultimate effort to reach human-level intelligence. While, the more modern-day definition of this phenomenal change in technology focuses on Artificial Intelligence (AI) being a sub-field of computer science that has the ability to imitate human intelligence such as visual perception, decision-making, speech recognition and the translation between languages. Consequently, these transformations in technology opened up new opportunities for individuals, society and the economy as it provides unprecedented options for a prosperous future. However, despite AI’s intrinsic benefits, the pervasive force is largely attributed to the poor performance of labour markets across advanced economies as Continue reading

Ethical Hackers and Ethical Hacking

An ethical hacker is a security professional who helps organization to take defensive measures against malicious attacks and usually the process he doing to find those vulnerable point is called Ethical Hacking. Sometimes this is also known as Penetration Testing or Intuition Testing. In this case, the ethical hackers are getting into the minds of computer criminals; think like them to find about innovative ways the hackers may use to get into the systems. Then organizations can take required actions to avoid those vulnerabilities. It has identified that the almost all computer systems have vulnerabilities that can be exploited by a hacker to come to do damages. This can be due to an unpatched application, a misconfigured router or a rough network device and it will be not able to detect unless penetrate the networks and assess the security posture for vulnerabilities and exposures regular basis. As the hacking is Continue reading