External Blog
Monday, July 6, 2009
CoRpoRate BloGging : A New Marketing Communication Tool for Companies
External Blog
How to Saveguard Our Personal and Financial Data?
As science has spawned new and exciting technologies, from online shopping to mobile payment, it has opened up new opportunities for frauds and swindles, from computer hacking to identity theft. Every year, consumers and financial institutions lose millions of dollars to credit cards and debit card theft by unauthorized users pretending to be legitimate users of the cards. It may not possible to stop this fraudulent activity entirely, but it is possible to protect your personal and financial data by taking proper safeguard.
To safeguard your personal and financial data, you SHOULD always:
- Install a firewall - This is a software program that blocks unauthorized users to access your data. Majority of the new computers come up with firewalls integrated into their operating systems. Unless you are using a older computer or dial up, in such case, you may need to buy a firewall separately and install it by yourself. Click this link for more understanding on firewalls.
- Install and update antispyware and antivirus programs - Protecting your data against viruses and Trojan Horses that may steal or modify your data on your own computer. Besides, many operating offer automatic updates, you should turn it on as it is available for you.
- Lock your access - Use a strong password or pass-phrase to protect access your confidential data.
- Limit transportation and transmission of data - Avoid transporting or transmitting your confidential data if not necessary to do so. For instance, transport your confidential data via email.
- Encrypt stored confidential data - Whenever is possible, encrypt stored confidential data, no matter it is stored temporarily or permanently.
In order to protect your privacy now and ever, you should aware the latest fraudulent activity exists and take accurate and consistent prevention against it. It then can lessen dramatically the opportunities of your confidential data being stolen.
- http://finance.yahoo.com/banking-budgeting/article/103893/Six-Ways-to-Safeguard-Your-Online-Assets
- http://www.us-cert.gov/cas/tips/ST06-008.html
Prepared by Carrie Hon.
E-Government in Malaysia: Its Implementation So Far and Citizen's Adoption Strategies
Briefly, the 7 pilot projects of our nation’s e-government flagship applications include:
1) Project Monitoring System – Monitor the entire lifecycle of the country’s national developmental programs.
2) Human Resources Management Information System – provide consolidated HR data such as best global HP practices for Malaysian Public Service
3) Generic Office Environment – a powerful web-based office management tool providing users the solutions to effectively and efficiently manage their office environment.
4) Electronic Procurement – enable suppliers to advertise, present pricing, process orders and deliveries and ultimately to sell goods and services to the government.
5) Electronic Services – allow public to conduct transactions with government agencies such as Road Transport Department and utilities companies such as TNB.
6) Electronic Labour Exchange – one-stop-center for labor market information.
7) E-syariah – a case management system to improve the services of Syariah Courts.
During the early years of e-government implementation in Malaysia, as in accordance to a survey carried out by market information group TNS in 2003, citizen adoption is growing but at a slow pace. For instance, as shown in the study, about 15% of Malaysians have used online government services in 2003 as compared to 12% in 2002. Furthermore, Malaysia is ranked 25 out of 32 countries in terms of e government usage growth. Such slow growth rate can be attributed to inhibiting factors such as lack of public awareness, IT literacy, and citizen’s perceived security and privacy risks. Specifically, citizens are generally concerned about the security of e-services transactions as they are fearful that their credit card or banks account details are intercepted. In addition, privacy concern is also a major issue as citizens are worried that their specific personal information would be exploited by companies, government agencies and so forth.
Nonetheless, in the past few years, the government has been undertaking various initiatives to overcome the barriers of e-government implementation. For example, several cyber laws such as Personal Data Protection 2004 and Electronic Government Activities Act 2007 have been introduced to mitigate the security and data concern. Besides that, numerous advertisements on services such as MyEG have also been rolled out to increase the public awareness about the availability of online road tax renewal, driving license renewal and so forth.
Example of myeg online tax renewal form:
As a result, citizen’s adoption of e-government has been growing positively as according to survey done by Brown University in U.S in 2007, Malaysia was ranked 25 out of 198 countries in terms of international e-government ranking, leapfrogging from 157 in 2005! As evidence, Inland Revenue Board has announced that e-filing of income tax return has increased by 30% to 1.25 million in 2009, gradually increasing from 78,718 (2006) to 538,558 (2007) and 881,387(2008). Source: TheStar
If you’re interested to know more about income tax returns and e-filing, click here.
EleCtrOnic CurReNcy
If you are interested to know about electronic currency, feel free to surf the websites as below:
i) Future of Electronic Currency
E-tailing – A review on the post ‘Digital music sales increase 50%’
One of the major examples that depict how e-tailing has transformed consumers’ purchasing method involves the sales of digital music. According to the current trend, digital music is gradually and inevitably replacing the traditional physical album as a mean for consumer to purchase song tracks. For instance, in the first half of year 2007, the sales of digital tracks surged 49% up to USD$ 417.3 million while sales of physical albums have suffered a plunge of 15%. The rise of online music stores such as iTunes and Amazon is expected to further increase the popularity of digital music and on April 3 2008, iTunes store has surpassed Wal-Mart as the largest music retailer in the US, marking an unprecedented record in history that online music has outperformed the physical music format
Apple iPod
In order to further expand the online music market, companies such as Amazon and Apple has initiatedcollaboration with music records such as EMI to sell songs that come without copyright protection (DRM-free) and such moves have enabled consumers to transfer their purchased songs to any computers and music playing devices as well as burn their own CDs freely.
As online music continues to grow, consumers need to be constantly aware of protecting intellectual property and are widely encouraged not to share and download uncopyrighted music. Just a couple of weeks back, a woman in the US has been ordered by the court to pay a bizarre amount fine totaling USD$ 2.92 million for willfully infringe music copyrights by sharing 24 files on Kazza. To read more about the story, click here.
Here are links to some of the pioneer online music stores:
http://www.apple.com/itunes/whatson/
http://www.amazon.com/MP3-Music-Download/b?ie=UTF8&node=163856011
http://free.napster.com/
Sunday, July 5, 2009
The threat of online security: How safe is our data?
Do you truly believe that your data is well protected? If your answer is a yes, now you should be aware that as we continue to derive countless of benefits from the Internet, the main issue that continue to concern us is online security, which once compromised could prove to be extensively disastrous and damaging. In fact, online and data security threats continue to grow in number and sophistication, therefore it is an enormous concern which bears the potential harm of collapsed computer system, lost confidential data and so forth.
One of the most common types of online fraud involves identity theft, which simply means the private information of victims such as credit card number is being intercepted illegally when it is transferred over the network due to the vulnerabilities of computer security. As a result, the thief can do whatever that they desire using the stolen number. Another category of online fraud takes place in the form of data theft which encompasses the theft, perusal and manipulation of private data. In order to illustrate the startling adverse impact of this fraud, we look at a case in U.S back in 2001. What happened was two employees working in the accounting division of Cisco Systems managed to broke into the company’s system which handled stock distributions and successfully transferred shares worth US$6.3 millions to their private portfolio.
Next, we shall discuss some of the underlying threats to online security. First, Malware, is a software designed to penetrate and damage a computer system without the owner’s informed consent. Generally, Malware includes computer viruses, worms, trojan horses, rootkits, spyware and so forth. Specifically, computer viruses are small software programs which intent to interfere with computer operations and they may corrupt and damage your data or even erase everything on your hard disk! On the other hand, worms are self-replicating programs which do not required to be attached to other programs as it spread by exploiting security loopholes of operating system. For instance, Windows ExploreZip worm, is a destructive software with malicious purposes of crippling the file system by writing invalid data and destroying files on hard disk.
To know more about the devastating impact of Malware and to get information on Trojan horses, these are some helpful links:
Malware: http://news.cnet.com/8301-1009_3-10257277-83.html
Trojan: http://en.wikipedia.org/wiki/Trojan_horse_(computing)
Today’s viruses spread and are created at a faster rate as they capitalize on the increased network services such as Word Wide Web and e-mail. For instance, the statistics below (Microsoft Security Intelligence Report April 2009) shows the startling total number of new unique samples of virus detected in the second half of 2008.
Hence, preventive measures are definitely needed to be in place. The following are some suggestions:
1) Firewall- Firewall is a part of computes system useful in preventing unauthorized access to networks especially private network such as company’s Intranet. All messages going into the network must first be screened by the established firewall and meet its security criteria.
2) Anti virus software is capable of detecting and eliminating known viruses, hence it is vital to install a good package with comprehensive protection and ensure that it is always updated.
3) Data encryption- Encryption involves transfoming text into some unreadable form of codes and only the intended recipient posseses the key to decode the document back into a readable format. Thus, encryption should be widely used especially when the transmission of documents entail top security data.
4) Never open an e-mail attachment from someone you don't know.
5) Avoid opening an e-mail attachment from someone you know, unless you know exactly what the attachment is. The sender may be unaware that it contains a virus.
ReView oN a pOst oN Internet Security
Based on a statistical analysis of 28,000 passwords from a US website, the result reveals that people often do the easy things. Why say so? This is because, after the research has been done,it was found that 16% of Internet users preferably took their first name as a passwords and another 14% relied on easiest keyboard combination such as 123 and 123456. Not only that, there are 5% of Internet users like to use the name of movie or name of popular star as their password. This is particular true to the young teenagers. Besides, the words such as "password", "Yes", "I love you" or even "I hate you" are commonly used by the users.
Robert Graham, researcher who did this analysis and published the conclusion advises the users that to better protect against cyber intrusion, users are encouraged to choose a password which is longer than eight characters with one capital letter and one symbol.