Skip to content

ESET cybersecurity survey amongst internet users in APAC reveals large gap between threat awareness and taking action

Three out of five respondents in APAC have experienced a cyberattack or online threat with common forms being malware (17%), theft of personal data (13%) and social media breach or duplication (11%).
Only 23% respondents have installed free or paid antivirus/ security app on their mobile devices.
Majority of parents have not spoken to their children about cybersecurity. 32% of parents from Thailand and 25% from Hong Kong said that their children have been exposed to inappropriate content online.
11,200 respondents from Hong Kong, India, Indonesia, Malaysia, Singapore, Taiwan, and Thailand were surveyed.

SINGAPORE – November 22, 2021 – ESET, a global leader in cybersecurity, today released the results from its APAC Consumer Cybersecurity Survey, revealing that three in five (62%) respondents in APAC said they have experienced a cyberattack or online threat in the past 12 months. By analysing consumers’ habits based on previous online interactions, the survey provided a deeper insight on the awareness of basic cybersecurity threats and best practices of actions online. The survey was conducted earlier this year with 11,200 respondents from Hong Kong, India, Indonesia, Malaysia, Singapore, Taiwan, and Thailand.

While the pandemic has introduced a new paradigm in the way we live, work, learn, socialize and play, it has also resulted in consumers’ increased reliance on digital technologies and services, which is a major factor for cybercriminals to pursue illegal activities.

“As we continue to navigate challenges from the pandemic, the reliance on digital technology for various aspects of our daily lives will likely spill into the future. Our survey findings suggest that it is now common for internet users to encounter online threats. Therefore, it is critical that consumers are educated about the growing threats, and are aware of the steps they can take to protect themselves as well as their children when conducting online activities,” said Parvinder Walia, President of Asia Pacific and Japan, ESET.

Of the seven APAC markets surveyed, India (81%), Thailand (65%), and Taiwan (63%) had the highest number of respondents who have experienced a cyberattack or online threat. Across the surveyed markets, the most common forms were attributed to malware/virus attacks (17%), theft of personal data (13%), and social media breach or duplication (11%). Only about 23% respondents installed free or paid antivirus/security app on their mobile devices.

 

Figure 1: Respondents were asked if they experienced at least one cyberattack or online threat such as malware attack, theft of personal data and social media breach in the past 12 months

Consumers’ vigilance is critical as online shopping scams are rife
As people are increasingly dependent on the internet to work, communicate, shop and entertain themselves, scammers are also taking advantage of the new normal to lure victims. Around two thirds (67%) of surveyed respondents indicated that they have come across online scams.

Figure 2: The number of respondents who said they came across online scams

The most common types of scams were online shopping (21%), social media (18%), investment (15%). With close to half of surveyed respondents saying that they shop online at least once a month, it is critical for consumers to remain vigilant when engaging in online transactions.

Figure 3: The most common outcomes for online shopping scam victims across APAC

Moreover, more than half of the respondents in APAC trust the security measures by online retailers completely. 45% and 23% of respondents from Thailand and India respectively, also indicated that they would continue shopping at an online retailer even after a data breach, regardless of the security status thereafter.

To protect themselves from scams, consumers should take precautions when shopping online. Fortunately, more than 90% of surveyed respondents take some form of precaution when shopping online, with checking for product/seller reviews being the most popular method of assessing a retailer’s legitimacy across APAC.

Children are vulnerable and need guidance in an increasingly digital world
With the pandemic resulting in a hybrid model of learning, children’s risk exposure via devices and through various online platforms offering services ranging from collaboration, online learning and video streaming to online games and social media is growing. This puts them at greater risk of encountering online threats, and it is important to teach children the essential skills to remain safe while navigating in an online environment.

The survey revealed that 95% of respondents who are parents from Indonesia have never spoken to their children about cybersecurity, and this remains significantly high in the region – over three out of four (77%) respondents across APAC have never spoken to their children about the issue. To ensure that minors are protected in the digital world, parents should have a hand in demonstrating the threats that the online world poses. 32% of parents from Thailand and 25% from Hong Kong also said that their children have been exposed to inappropriate content online.

Figure 4: The number of respondents who said they have never spoken to their children about cybersecurity

Most parents (90%) in APAC did take actions to ensure their children’s online safety. Popular methods include limiting the amount of time their children spend online (31%), using parental control applications (29%) and checking what apps are installed on their children’s devices (24%).

For guides and tips on how to keep kids safe on the internet, please visit ESET’s Safer Kids Online at https://saferkidsonline.eset.com/.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Scale Computing Recognized on the 2021 CRN Edge Computing 100 List

INDIANAPOLIS – November 8, 2021 – Scale Computing, a market leader in edge computing, virtualization, and hyperconverged solutions, announced today that CRN®, a brand of The Channel Company, has named Scale Computing to its 2021 Edge Computing 100 list.

With the rising importance of business intelligence and data analytics, the ability to quickly collect and process that data is becoming a key differentiator for businesses of all sizes. At the same time, the need to expand corporate networks to encompass larger numbers of remote and hybrid workers makes securing the edge even more critical.

“IT leaders require the ability to run applications and process data outside centralized data centers or public cloud, at the edge of their network, closest to where that data is created and utilized. We understand these needs and have created solutions to centrally monitor and manage hundreds or even thousands of distributed edge deployments in today’s complex infrastructure environments,” said Jeff Ready, CEO and co-founder of Scale Computing. “We are very proud of the innovations we’ve made in technology, products, and partnerships that have positioned us as a leader. This recognition by CRN is a testament to the fact that we are dedicated to the channel and continue to deliver innovative, highly available, highly scalable, and simple solutions.”

Today’s companies require simple, affordable and easy-to-deploy IT infrastructure solutions to meet complex infrastructure environments and support a wide range of modern and legacy applications — both in the datacenter and at the edge. Scale Computing expanded its Edge Computing offerings earlier this year by introducing HC3 video surveillance and security solutions, optimized to consolidate video storage, video management, access control and analytics workloads. Scale Computing’s video surveillance offers autonomous self healing, providing hands-off resiliency to keep VMS recorders running and maintain access to previously recorded data even when hardware components fail.

Scale Computing’s award-winning HC3 Edge series enables on-premises edge computing with high availability and disaster recovery at remote locations at an affordable entry level cost. All edge models can be deployed quickly, managed locally or remotely, and can self-heal almost instantly.

The second-annual CRN Edge Computing 100 list spotlights the vendors leading the way in providing channel partners with the technology needed to build next-generation, intelligent edge solutions that ultimately bring data collection and processing closer to users. The categories include Edge Hardware, Software and Services; IoT and 5G Edge Services; and Security.

“CRN’s 2021 Edge Computing 100 list returns this year to recognize the leaders bringing the technology required for channel partners to build unique edge solutions that empower businesses to work better and smarter,” said Blaine Raddon, CEO of The Channel Company. “The contributions of these innovators continue to pave the way for the IT channel to deliver bold, progressive, and trusted offerings to its customers.”

The contributions of these innovators continue to pave the way for the IT channel to deliver bold, progressive, and trusted offerings to its customers.

CRN editors compiled the 2021 Edge Computing 100 list based on a variety of criteria, including feedback from solution providers during the year regarding the company’s impact on the market, the company’s overall influence on the channel, and the types of technology and services it makes available to partners. This recognition follows the ARC awards Scale Computing won this summer from CRN®, a brand of The Channel Company, in both the Edge Computing category and the Hyperconverged Infrastructure category. The company also swept all of the subcategories including Product Innovation, Support, Partnership, and Managed & Cloud Services in both Edge Computing and Hyperconverged Infrastructure.

CRN editors compiled the 2021 Edge Computing 100 list based on a variety of criteria, including feedback from solution providers during the year regarding the company’s impact on the market, the company’s overall influence on the channel, and the types of technology and services it makes available to partners. This recognition follows the ARC awards Scale Computing won this summer from CRN®, a brand of The Channel Company, had named Scale Computing a winner of the 2021 CRN Annual Report (ARC) Awards in both the Edge Computing category and the Hyperconverged Infrastructure category. This was the third consecutive year Scale Computing has been recognized as a CRN ARC Award winner. The company also swept all of the subcategories including Product Innovation, Support, Partnership, and Managed & Cloud Services in both Edge Computing and Hyperconverged Infrastructure.

The 2021 Edge Computing 100 list will be featured in a special November issue of CRN Magazine and online at www.crn.com/edge100.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

The Importance of Access Management in Remote Work

Remote work has some challenges, one of which is performing access management. But do you know the real importance of managing access even with remote work?

Check it now and understand why it is important to manage access even when working remotely and be prepared to ensure your company’s security.

How Important Is Access Management?

Understanding the importance of managing all accesses made in remote activities is essential for a company to pay close attention and work with caution and efficiency.

Therefore, access management becomes important, as it will be able to control and protect the use of all high-privilege and generic credentials.

Also, the proper management of access provides full traceability of use, in addition to the segregation of accesses carried out in the infrastructure. So, it is not because an employee is accessing something away from the company’s premises that access management does not need to be done, it is the very opposite, as the rates of virtual attacks are large and growing.

Thus, when there is a habit of managing all access and guaranteeing the aforementioned tools, the chances of attacks drop, making the practice even more important, relevant, and indispensable.

See How It Works

To understand a little more and learn how management works, it is important to understand the core mechanism. First, it is possible to segregate access, for example, allowing groups of users with administrative powers to be created. Administrator user groups gain permission to obtain physical access passwords.

Moreover, it is also possible to select the group of users who will receive remote access passwords for a target system or device to be used.

In this way, the group receiving the remote access password can follow workflows with reasons and approvals provided by the requesting user, just as much as the physical user group.

What Are the Benefits of Access Management?

Once you understand a little more about the importance and how management is covered in this article, knowing the benefits is also relevant to understanding the value of the whole.

Therefore, one of the main benefits is the operational gain that exists in the access control process performed in the infrastructure. This is a high-impact benefit that saves management time.

In addition, another benefit is the management of credential passwords, allowing the delivery of passwords in a controlled and secure manner, preventing interceptions and the password of employees working remotely from ending up in the possession of unauthorized third parties, which may cause a serious failure in the system’s security.

Furthermore, another benefit of managing remote work access is the fact that the authentication of the target system is done with transparency, as well as the authentication on the network device.

In addition to transparency, authentication also has the advantage that the password is displayed to third parties or network administrators, further increasing security with management.

Is your company prepared for a cyberattack? See all about it in this article and find out!

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

訊連科技 FaceMe® 人臉辨識引擎之活體檢測技術通過iBeta PAD認證

【2021年11月15日,台北訊】— AI人工智慧領導廠商訊連科技(5203.TW)宣布,旗下FaceMe® 人臉辨識引擎之活體檢測技術,通過iBeta依據ISO/IEC 30107-3標準進行的PAD 測試(Presentation Attack Detection,活體冒用攻擊),獲得 iBeta PAD Level 1認證。此項測試係以各種照片及影片等方式,嘗試以假亂真的欺騙破解人臉辨識系統。FaceMe®人臉辨識技術通過iBeta測試,代表其於金融、門禁等須具備活體辨識能力之應用,可有效避免身分冒用之情事。

iBeta 為全球少數獲得美國國家標準暨技術研究院(NIST, U.S. National Institute of Standards and Technology) 之 國家實驗室自願認可程序 (NVLAP, National Voluntary Laboratory Accreditation Program) 認證的獨立第三方生物特徵測試實驗室。iBeta的PAD測試是依據ISO/IEC 30107-3標準進行的防偽攻擊測試,主要係透過各式照片(平面、曲面、立體堆疊照片等) 及影片進行人臉辨識系統之破解。FaceMe® 通過iBeta PAD Level 1測試,測試結果為零分類錯誤 (APCER, Attack Presentation Classification Error Rate,0%),代表FaceMe可以完全擋下測試人員企圖以偽造影像或視訊的任何攻擊。

iBeta的防偽攻擊測試結果,更大力凸顯訊連科技FaceMe® 人臉辨識技術於安控及金融領域應用能準確辨認外並防止詐欺的行為。隨著遠距金融的數位化需求提升,金融科技除了採用視訊服務,採用iBeta認證的FaceMe®人臉辨識引擎,不僅增加客戶的服務體驗,更可以加強客戶對安全身分認證的要求。

「活體防偽是目前人臉辨識技術遇到最大的難題之一,尤其是針對智慧金融與門禁安控之應用。」訊連科技董事長兼執行長黃肇雄表示:「FaceMe®臉部辨識軟體已於全球知名NIST FRVT測試項目中名列前茅,如今更因通過iBeta的生物防偽攻擊測試,進一步肯定FaceMe®為全球最精準且高效能的人臉辨識引擎之一。」

FaceMe® 人臉辨識軟體可支援多數作業系統 (Windows、Linux、Android 、 iOS),並於各式硬體裝置上運行,舉凡高階工作站至低功耗的晶片裝置,皆可彈性建置於IoT和 AIoT邊緣運算裝置上,打造出最適配的人臉辨識解決方案。此外,FaceMe® SDK讓系統整合商可以更快速且便利的方式,將人臉辨識技術導入如門禁安控、智慧金融、智慧零售或智慧居家等不同應用場景。

CyberLink FaceMe® iBeta 活體冒用攻擊(Presentation Attack Detection)測試報告請參閱:
211022-Cyberlink-PAD-Level-1-Confirmation-Letter(PDF)

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

關於CyberLink
訊連科技創立於1996年,擁有頂尖視訊與音訊技術的影音軟體公司,專精於數位影音軟體及多媒體串流應用解決方案產品研發,並以「抓準技術板塊,擴大全球行銷布局」的策略,深根台灣、佈局全球,展現亮麗的成績。訊連科技以先進的技術提供完美的高解析影音播放效果、以尖端的科技提供完整的高解析度擷取、編輯、製片及燒錄功能且完整支援各種高解析度影片及音訊格式。產品包括:「威力導演」、「PowerDVD」、「威力製片」、「威力酷燒」等。

KNTS Consultores controls the file flow and productivity of employees with Safetica

Brazilian consultancy KNTS Consultores needed to comply with LGPD regulation. With Safetica, the company not only fulfils their legal obligation but also has peace of mind that their customers’ confidential documents are safe and protected.

KNTS needed to comply with upcoming regulation.

KNTS provides consulting and outsourcing services in the areas of accounting, direct and indirect taxes, payroll, and corporate regularization. The company had to adapt to the new Brazilian general data protection law (LGPD), and was looking for a solution that would meet this demand and offer greater control over the flow of information from the office.

KNTS Consultores saw Safetica as a differentiator, able to anticipate LGPD and help with performance monitoring and improvement.

 

Regulatory compliance, security of confidential information and insight into productivity

With Safetica, in addition to meeting all the rules stipulated by the LGPD, which will soon be mandatory, it was possible to establish precise control over all activities carried out by employees within the office. The company can now control file traffic by establishing rules that govern on files on the network as well as those sent outside. Safetica solution also provides security for customers’ confidential documents and lets the company audit and improve employee productivity.

Because the company can control all their internal data processes with Safetica, the managers feel much more confident and can concentrate on their business. KNTS Consultores plan on using Safetica and on trying the new features and benefits it will bring in the future.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Safetica
Safetica is to provide small and mid-sized companies with the same quality data protection that corporations have – affordably, and without any additional IT administration or disruptions in operation.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×