Higher Productivity with Ultra-thin 14” Acer Swift 5

Higher Productivity with Ultra-thin 14” Acer Swift 5

Higher Productivity with Ultra-thin 14” Acer Swift 5

Design

Acer Swift 5 offers high-end features in a slim and lightweight body

Performance

Premium features include metal chassis, 7th Gen Intel® CoreTM processors, reversible USB 3.1 Type-C port and Acer Bio-Protection Fingerprint Reader

Longevity

Acer Swift 5 provides up to 10 hours1 of battery life for higher productivity on a 14” FHD IPS display in a 13.3” body

SUBANG JAYA, 15 March 2017 – The ultra-thin and lightweight Acer Swift 5 has landed in Malaysia, joining the Swift 7 and Swift 3 line-up here to offer more features-packed, trendy laptops for every budget and lifestyle.

Measuring at 14.58 mm thin and weighing just 1.3 kg, the Acer Swift 5 comes in a stylish metal chassis. Fitting a 14-inch Full HD IPS display into a 13-inch frame, the slim laptop maximizes viewing area for great visual experience with its narrow bezel of just 8 mm on both sides.

The Acer Swift 5 is powered by 7th Gen Intel® CoreTM processors and equipped with a high speed SSD (users can choose from 256GB or 512GB) coupled with up to 8GB of memory for superior performance. It also comes with a reversible USB 3.1 Type-C port, Acer Crystal Eye HD Webcam and the latest 2x2 MU-MIMO 802.11ac wireless technology. The icing on the cake of this great looking, efficient device is the 10 hours1 of battery life. Users can conveniently ëforgetí to bring the charger and still accomplish all-day tasks with just a single charge!

Security is taken to the next level with the Acer Bio-Protection Fingerprint Reader, a biometric authentication system paired with Windows Hello. This system allows users to access their Windows account on the Acer Swift 5 in a quick and secure manner through scanning of a fingertip, without having to remember their passwords.

The large precision touchpad that accurately senses the fingertips and movements provides for faster and smoother work. Fully supporting the new Windows 10 features including Cortana, Multitasking and Action Center, the precision touch pad fits naturally into the palm-rest working area, and delivers a smooth, empowered touch experience.

The Acer Swift 5 also comes with a two-stage adjustable backlit keyboard which allows users to continue their work or play as the environment gets darker. The first stage turns on the backlit keyboard whilst the second stage turns on the lighting to full luminance.

The Acer Swift 5 provides crystal clear and instant communication across the globe via Skype for Business Certification with Windows 10. It allows connection with uninterrupted audio and visuals without echoes, gaps or lags.

All in all, the Acer Swift 5 is a beauty built for work – beautiful and light on the exterior, hardworking and intelligent on the interior.

Available in Pearl White with gold trimming or Obsidian Black with silver trimming, the Acer Swift 5 is priced at RM3,499 and RM4,499 for the 256GB and 512GB variants respectively. Both variants will be available for purchase immediately at select authorized Acer resellers nationwide.

For more information, please visit Acer Malaysiaís Facebook or call Acerís Product Infoline at 1800-88-1288 (9am – 6pm, Mondays to Fridays).

  1. Specifications vary depending on model and region

For more information

Please visit Acer Malaysiaís Facebook or call Acerís Product Infoline at 1800-88-1288 (9am – 6pm, Mondays to Fridays).

How Can SMEs Improve Their Operations During The Tough Economy

How Can SMEs Improve Their Operations During The Tough Economy

How Can SMEs Improve Their Operations During The Tough Economy?

Find out how you improve your company management and operations during this poor economy.

According to the Department of Statistics, there was a 0.4 percent marked decrease in the labour market in September 2016 and employment is going to be tougher this year. On top of that, companies like Shell Malaysia and hard disk maker Western Digital Corporation have announced that they would be laying off a combined total of almost 2000 people by 2017.

It is a tough time now, finding the right people while generating more revenue for your business. But the good news is that everyone, including your competitors are in the same boat as you in this bleak economic situation. However, this represents an opportune time to streamline your operations and strengthen the foundation of your company to stay ahead of the competition and thrive later on when the economy gets better.

So how does one even start? There are so many things to tackle but amidst all the distractions that need your attention, there are TWO important questions you need to ask yourself to get the right results.

Question 1

How do I keep my employees engaged in the company? How do I keep them committed to fight for the company’s dream and goals?

Question 2

How can I get my employees to be more productive? How can we focus in execution, execution, execution?

That’s it, just these two questions. But sadly, there are many businesses that forget to answer the questions above. They want to, but aren’t doing so.

Why is that?

Well, we’re busy. Splitting time between generating revenue and administrative matters such as payrolls, approving leaves, being sucked in to the mundane paperwork day after day. No wonder it’s so difficult to focus on the important things.

So now that you know the problem, how can one save time, energy, and resources from all the pesky administrative work and focus on things that matter?

We’ve got an answer for you. Kakitangan.com. Imagine all your administrative work done, just within minutes. Don’t believe us? Here’s how it helps:

1. It saves you both time and cost!

In many companies today, one has to apply for leave through a physical leave form, only to be processed by the HR department manually. Here’s the problem that affects  the employees, the employer, and the poor HR person.

As an employee: The amount of paperwork is terrible, one form needs multiple signatures, has to be done manually, and the worst of all, it takes some time to reach the manager’s desk for that final approval. It’s really a case of not knowing your leave application status at all!

As an employer: Keeping track of each individual’s leave day balance through paperwork is crazy! On top of that, one has to go through the whole list of employees to ensure that there is enough manpower available during that time period.

As the HR person: Paperwork, paperwork, paperwork. Data entry is going to be a nightmare.

However, with Kakitangan.com, an employer is able to approve their employees annual leave on their desktop or on mobile with a few simple clicks. The employer has full access to all employee’s leave dates and the best thing about it is that it is synced with the Malaysian public holidays calendar – from Penang all the way to Sabah, Kakitangan.com also syncs each state’s holidays! It even allows us to customize weekends to start on Fridays and Saturdays for businesses in Kelantan and Johor.

This is undoubtedly the best leave management system in Malaysia. The best thing about it? It’s free.

So, there’s no reason not to use Kakitangan.com, especially if your company is still applying for and approving leaves on paper.

Kakitangan.com isn’t just a one trick pony. Besides solving the frustration of applying and approving leaves, Kakitangan.com solves one of the MOST painful and troublesome HR work especially in SMEs: payrolls. Kakitangan.com also has a cloud payroll system and it automatically calculates each employee’s EPF/SOCSO/LHD and issues pay slips. For a SME of 10 people, the cost will shock you. It’s just RM50 per month. Which is just RM1.70 a day, the price of one glass of teh ais!

The real value one gets it the time saved from all the nitty gritty numbers of issuing pay slips. Hours of works turn into minutes and it is probably the easiest and most user-friendly payroll system in town. All your data is backed up on Amazon Web Services, the number one data center in the world. This means that there’s no need to fear when your computer crashes because everything will be backed up, safe, and secure.

2. It makes your employees’ (and yours) lives easier

When my company migrated to use Kakitangan.com, my staff’s feedback has only been positive with the wonderful experience of applying for their leave and getting their payslips on their phone. They told me that they do enjoy a modern company that makes it easier for them.

And there’s more to that! I used to buy medical insurance from an agent, and after a period of time when someone actually gets admitted into the hospital, our HR team had forgotten the insurance coverage for this particular employee. However, since buying medical insurance from Kakitangan.com, my employees, HR team and I can login and view their own insurance coverage with a listing of panel hospitals and the room rates per night! It’s definitely a lifesaver!

Kakitangan.com is also the perfect platform to ensure your employee’s happiness and job satisfaction. What do I mean by this? Let’s take birthdays for an example. Birthdays of each employee are synced in the calendar, giving your team the opportunity to bond together and to plan things in advance. Who says you can’t have your cake and eat it too?

On top of that, Kakitangan.com is also the platform to buy birthday cakes, flowers, team lunches and activities and a corporate gym membership. This definitely improves your employees’ well-being in the company.

3. It’s SME friendly

Yes, although there are plenty of different HR platforms out there, a big problem especially for a small and growing business is that they are quite technical, expensive, or have features that does not suit SMEs. Kakitangan.com is really designed with the SMEs in mind. I am able to start utilizing the leave and payroll system in minutes and for free! For a nominal price, you get the payroll system too! You can’t get any better than that!

So, there you have it! Whether you’re just starting out with a few employees or you have a larger team with you, always remember that your employees are your greatest assets.

From paper leave forms and manual payroll processes, it’s baffling to know that a lot of companies are still applying HR practices from 40 years ago! It’s time to do things better and more efficiently. And with the help of Kakitangan.com, you will see your company becoming better and your business grow faster! Create a system for your company today at Kakitangan.com and become a better company!

It’s time to change!

Kakitangan is effective in helping a company to save time and money. It is super efficient and organised in its on way. Find out more now!

The first 24 hours after a cyber attack

The first 24 hours after a cyber attack

The first 24 hours after a cyber attack

A simple guide on how to respond to a cyber attack:

Data Breaching

by Praise Maukazuva

A data breach is when your personal data has been viewed, stolen or used without any authorization.

Computer Security Incident Response Team (CSIRT)

Dealing with cyber attacks is strenuous. There is no guarantee that your security measures will keep your system or data safe.

Ways to respond to these attacks in an effective and comprehensive manner are actively being developed at the highest level in government bodies and International communities. However it is difficult to identify the type of attack you are facing until an investigation has been carried out.

First of all, you need a Computer Security Incident Response Team (CSIRT) to manage the whole process. They should all be assigned to a task each, for example one member will deal with how to notify affected users or IT specialists in case there is a technical fault.

Notifications

Secondly, notifications are sent to affected users. For example, in a company, employees, investors, and customers should be notified. Most importantly the law enforcement and legal authorities should also be notified. The notification should include key details to show the source of the problem, how it is currently being fixed and assurance that it will not be a problem in the future. E-bay was criticized for not notifying its victims in time after its system was hacked in 2014.

As mentioned earlier, the type of attack is essential to determine the type of response. The network will be slower than normal due to reduced internet speed. This can be a sign of a hacking attempt or that the computer has been infected by a form of malware, or a network worm could be replicating itself. There could also be frequent antivirus software alerts reporting an infection in the computer.

After detecting the type of attack the next step would be to assess whether it is massive or not. Cyber attacks can either be a basic or sophisticated. So how do we distinguish between the two.

BASIC ATTACKS

BASIC ATTACKS involve small-time criminals such as individual hacktivists that target other private individuals and non-strategic Government departments for financial gain and publicity. They have limited skills and resources that are publicly known.

SOPHISTICATED ATTACKS

SOPHISTICATED ATTACKS are seriously organized crimes that are usually sponsored by the State and advanced tools are used. Their targets are the Government or Major Corporate Organizations for warfare, terrorism, major financial rewards and also to unveil National secrets.

In a sophisticated attack the whole system may be shut down and you will know that you have been attacked. For example a certain department in an Organization has its system shutdown by an attacker and for them to restore their system they need to pay money.

Prevention

Next step is to prevent the attack from spreading into other systems as well. You can keep all affected systems or devices offline,isolated or suspended to stop incoming traffic from the attacker. Passwords should be changed and strengthened.

Do not delete any files, as they might be useful during the investigation.

Continuously document the whole process. So far, the type of attack, the areas it has affected, how it occurred and how it was detected should have been documented. This will be for future references.

Forensic

The most important step would be to contact a forensic team or cyber security experts to further investigate the incident. The investigation will include:

  • Identifying the attacker or the cause of the attack
  • Detecting previously unknown security vulnerabilities
  • Identifying areas that need improvement or better security.
  • Assist in repairing the damage and re-building a stronger system protection with sophisticated security measures.

The forensic team uses a variety of tools during the investigation process. A simple example is TRIPWIRES, a software that detects critical file changes and intrusions on the network.

In short, a cyber attack response involves:

  • Form an incident response team
  • Notify victims and law enforcement
  • Detect the type of attack
  • Assess the scale of the attack
  • Prevent further damage
  • Document the steps taken and why they were taken
  • Contact security specialists for forensic investigation
  • Recover system with prevention measures

An effective method of response to a cyber attack is necessary as it minimises loss and data destruction. It shows vulnerabilities that were compromised and methods to avoid or reduce future risks!

3 methods Cyber Criminal uses to hack your password

3 methods Cyber Criminal uses to hack your password

3 Methods Cyber Criminal Uses To Hack Your Password

Praise Maukazuva, 7 Feb 2017

Most people use a convenient password that they can recall in the future.

According to the Cyber Streetwise campaign that was carried out by the U.K Government in 2016, it is said that 35% of the people struggle to remember their passwords.

Unauthorized access is a major problem for people who use computers, tablets, mobile phones and other computer devices, and passwords act as the main defense in protecting your data. Here are some of the methods used by cyber criminals to acquire your passwords, for fraudulent reasons.

1. Password cracking

This includes guessing the most common passwords used by people.

The “Most Common Passwords of 2016 List” researched by Keeper Security revealed that 17% of the people used “12345” as their password to secure their accounts. More weak passwords include “Password” which comes as the second worst password. “QWERTY,” on the other hand is also widely used. Besides it being rather short and letters only, which makes it easy to break down. However, the movie “StarWars” based passwords have been widely used lately.

An example of a strong password that can be difficult to crack is “My$3cur1ty#” for “My security number.” as it includes all the required characters.

So how do these cyber criminals crack passwords? Two most common ways are “Brute Force Attack” and “Dictionary Attacks”.

In Brute Force attack, every possible password is tried and tested until it finds the right password. This method is only suitable for short words, because the longer the word the more time it takes to test the password. Brute force attack uses a lot of software tools, such as Cain and Abel, John the Ripper and Air cracking depending on the operating system.

Dictionary attack uses a list of common single words from the dictionary. This method is suitable for long words, and it is more advanced as you can add symbols and numbers in front or at the end of the word. But the words have to be real dictionary words that are spelt properly which can be a limiting factor. Software tools such as brutus and crowbar are used.

Image: Dribbble, Kristin Fall Bonett

2. Malware

Spyware is an example of malware, a malicious code that can access your computer through downloading pirated files or simply clicking pop up ads that are infected. This malware monitors a user’s activities such as sites visited and programs that were run thereby tracking log in passwords and usernames.

Shockingly 80% of personal computers is infected with some kind of spyware, without their knowledge, as it works in the background silently making changes and recording activities.

Image: www.taringa.net

3. social engineering

This is a manipulative way of getting personal information from individuals, this information is then used for fraudulent ways. Types of social engineering include, phishing and scareware.

  • In phishing, you receive an email that will enable you to click a link that redirects you to a fake website asking your for your passwords and credit card details. An email may come as :

“You won $1 million! Click here for your reward!”

With all the excitement you are quick to click on the link that will require you to enter your password.

  • Scareware on the other hand, involves the attacker tricking you into believing that you have malware in your computer. They will act as if they are helping you get rid of it but in turn, they are making you download the actual malware.

The more developed we are in terms of technology, the more methods of acquiring passwords maliciously there are, advancing with time also.

However, There are many ways of keeping your data safe with a password that is difficult or impossible to acquire.

Tips on choosing a good password

People struggles to create a good password because they think that the strongest passwords are not easy to remember. This is not true. Below are some of the ways of creating a strong password.

1.

Use of Long phrases with numbers, symbols, letters, lower cases and upper cases. The longer it is, the harder it is to break down.

2.

You need to have a different and unique password for every service. Avoid using the same password for your E-mail services and also banking services.

3.

Use of Biometrics. Nowadays mobile smart phones, tablets or laptops allow you to gain access to them using your fingerprints or through voice recognition. You don’t need to remember your password.

4.

Use of Password Managers. Examples of these include LastPass, DashLane, 1Password and Norton. It can be in the form of a mobile application, that stores all your passwords, for every service. You just need to remember your master password that will unlock your other passwords. They usually come with a browser extension where you can log in to your accounts automatically.

5.

The two-step Verification. During the signing in process, a code is sent to your mobile phone, and you are supposed to enter that code in order to gain access for example to your e-mails. However without the code, there is no access.

6.

This consists of simple steps, that are easily ignored such as, not sharing the password, not to write it down, and also to change it regularly.

Implementing a few of these facts is better than not implementing any of them. However the goal here is to make sure that our Personal files and data are kept safe by a very strong password.

Can you get hacked?

Can you get hacked?

Imagine the amount of personal information, the purchases you make and all your day to day processes that are stored in your computer. Are they all secure?

Cyber Security is one of the most urgent issues of the day. Cyber attacks have evolved over the years in parallel to the advancement of the tech industry and will continue as the network expands. It is advisable to take the right prevention techniques as they say prevention is better than cure.

Let’s take a look at some of the most common cyber attacks around.

1. MALWARE

Malwares are basically software with a malicious intent to either steal your data or to destroy your operating system. It operates on computers, smartphones, tablets and even servers. It houses a variety of cyber threats:

  • Worms – Just like a virus, it replicates itself and spreads, but only across the network.
  • Trojan horses – they are harmless until they are activated and their intentions are to steal data or files. Trojan horses generally don’t spread like worms.
  • Viruses – This type of malware reproduces itself and spreads from file to file, slowing down the system, disrupting operations and also deleting files.
  • Spyware – Spyware monitors all your activities, sites visited, programs run to track login and password information.

Malwares are transmitted via email attachment, instant messaging or a website that is either infected or malicious. Some websites will automatically download the malware without users’ knowledge.

It tricks you into clicking, for example, an email attachment or a software download, resulting in it being installed in your computer. Once installed, it spreads and starts executing malicious commands.

How to avoid

 

  • This type of cyber attack can be avoided by simply installing an antivirus or antimalware software, once installed it has to be updated and run regularly. You can schedule automatic scans on your computer too for consistency.
  • Avoid opening emails or messages from unknown recipients and also websites with illegal or pirated content. Files should always be scanned before they are downloaded.
  • Use strong passwords, include upper cases, lower cases, numbers and symbols as they are difficult to crack. Avoid using common English words.
  • Lastly, backup all your files, using an external hard disk or cloud services regularly.

2. RANSOMWARE

This is a new type of malware. It limits users from accessing their systems or files by locking their screens or the files until a ransom in the form of money is paid in order to restore your computer.

The data can be converted into a code that can not be read or understood, and in order to make your data understandable, an online payment must be made. This malware can be delivered to your computer through email attachments or pirated downloads.

It tricks you into clicking, for example, an email attachment or a software download, resulting in it being installed in your computer. Once installed, it spreads and starts executing malicious commands.

How to avoid

  • Install an antivirus software that supports internet security features. This will scan your emails and downloads.
  • Your data always backup your files. You can use external hard drives, USB flash drives or Cloud storage such as Dropbox.
  • Use strong passwords, include upper cases, lower cases, numbers and symbols as they are difficult to crack. Avoid using common English words.
  • Do not open attachments that look suspicious or messages sent by unfamiliar people and avoid clicking on just any hyperlinks especially on social media.

3. PHISHING

Phishing is when personal data such as passwords, usernames, or credit card information are stolen. How does it work?

A user receives an email from someone pretending to be a trustworthy bank or credit card company for example, that will redirect the user to a fake website that is identical to the original website.

The website will then prompt the user to enter personal email address, password or credit card information.

How to avoid

Phishing, however, can be avoided. Received emails must be checked carefully. Phishing emails usually have a “dear customer” without stating the name of the receiver. Such emails need you to verify with the organization stated in the email. During the verification, one should not use any email address or phone number from the email received.

Entering confidential information should be avoided at all costs, and this information should never be sent through emails. Online banking credentials should be changed regularly to avoid targeted attacks.

4. DENIAL OF SERVICE (DDoS)

This cyber threat disrupts the service of a network and brings servers to a halt. Attackers use multiple computers to send large volumes of data packets and traffic to the network.

This will slow down the network performance and the user will not be able to access any websites, resulting in low productivity especially for businesses. There will also be a dramatic increase in spam emails.

How to avoid

DDoS attacks can be prevented by installing a firewall. Firewalls can be hardware or software based, and they control the amount of incoming and outgoing traffic.

Firewalls can detect irregular traffic patterns and fend them off.

Email filters, on the other hand, will reduce spam emails.

“Understand what data you hold, how you are using it, and make sure that you are practicing good data hygiene

David Mount, Director, Micro Focus, London – April 2016