Acer Malaysia unleashes the true potential of gamers via new gaming device lineup

Acer Malaysia unleashes the true potential of gamers via new gaming device lineup

Acer Malaysia Unleashes the True Potential of Gamers via New Gaming Device Lineup

Editor’s Summary

Acer Aspire VX 15

gaming laptop sports an aggressive design, enhanced cooling capabilities and NVIDIA® GeForce® GTX 1050 Ti graphics

Acer KG251Q and KG271

monitors  feature the first 75Hz refresh rate in Malaysia with 1ms high response time

Acer Aspire GX781

The sharply styled desktop PC, Acer Aspire GX781, is designed for smooth gaming, graphic-intensive tasks and everyday computing

PETALING JAYA, 23 March 2017 – Acer Malaysia today raises the bar in gaming devices with its performance-oriented Acer Aspire VX 15 laptop with dual-fan cooling system; its first ever 75Hz gaming monitor series in Malaysia with 1ms high response time — the Acer KG251Q and KG271 monitors and the Acer Aspire GX781 desktop capable of performing graphics-intensive tasks besides gaming.

Gentlemen from Acer Malaysia with the newly launched Acer devices. From left Edmund Hoh, Product Manager, Acer Malaysia, Johnson Seet, Director of Products, Acer Malaysia, Jeffrey Lai, Product Manager, Acer Malaysia

Acer Sales & Services Sdn Bhd Director of Products, Johnson Seet said,

“As the market leader in the industry, Acer is known for products with meaningful innovations and superior performance. Our wide range of products is designed to improve usability, to meet the real needs of customers, both for work and for leisure, and this includes innovating devices for the gaming community.”


Acer Malaysia Director of Products, Johnson Seet delivering his welcome note

Acer Malaysia Product Manager, Jeffrey Lai introducing the new Acer Aspire VX 15 and Acer Aspire GX781

Acer Malaysia Product Manager, Edmund Hoh during the product presentation

Acer Aspire VX 15

Aggressive Design with
Dual-Fan Cooling

The Acer Aspire VX 15 laptop features an aggressive red chassis and an iron red backlit keyboard that make sure gamers are always striking the right notes during gameplay, while also providing a hardcore look and feel.

Available at an attractive price point of RM4,399.00, this gaming laptop does not skimp on its gaming power. Powered with the latest 7th Gen Intel® Core™ i7 HQ processor, the Aspire VX15 offers an exceptional performance with lower battery consumption. The gaming laptop also comes with the most anticipated NVIDIA® GeForce® GTX 1050 Ti graphics with GDDR5 VRAM (delivering up to 32GB/s bandwidth). Speed is also a notable attribute of the memory system, offering up to 4GB DDR4 memory out of the box and is readily upgradeable to a maximum of 32GB. Storage is provided by a large 1TB HDD.

The dual fan cooling system keeps all the features running quietly at optimal temperatures, ensuring that the machine is always up to the task without compromising super-smooth gameplay. The gaming experience is further elevated by high-definition audio with Acer TrueHarmony™ speakers, Dolby Audio™ Premium and Skype for Business certification, and great visual clarity with a 15.6-inch Full HD IPS screen.

Especially available in Malaysia are 200 units of Acer Aspire VX 15 which will be bundled with a free Steel Series Rival 100 Special Edition gaming mouse (with free Dota 2 in-game item) worth RM259 each.

Acer KG251Q and KG271 Monitors

Discover the True Potential
of Gaming

The Acer KG1 Series gaming monitors, KG251Q and KG271 are Acer’s first ever gaming monitors to come with a 75Hz refresh rate in Malaysia. Supporting HDMI on FreeSync, the monitors can work with a FreeSync-supporting graphics card to eliminate screen tearing and minimize lag and latency. Coupled with the Adaptive-Sync technology, users will enjoy fluid-like, smooth gaming experiences and video playbacks.

Featuring a 24.5-inch and 27-inch Full High Definition 1920 x 1080 resolution display respectively, the Acer KG251Q and KG271 monitors provide the finest natural colours and sharp original quality with TN panel and 100,000,000:1 contrast ratio.

These gaming monitors allow gamers to get an edge over the competition with lightning fast response time of 1ms GTG (Gray to Gray) and the Black Boost technology. The ultra-fast 1ms allows gamers to aim at the first gaze with super smooth transition without any ghosting and image dragging; whilst the Black Boost provides more detail in darker environments. The result: users get to defeat more enemies than others and eventually conquer the battles.

Forget about the thick frames found on conventional monitors. The ZeroFrame™ design of Acer KG251Q and KG271 makes for a near-seamless look, allowing users to see more of what matters most – the screen. Enjoy stunning images from every position with Acer’s wide viewing angle of up to 170 degree. No matter which angle users choose to view it from, the monitor will display colors perfectly. The monitors also come with enhanced user-friendly features, for instance, the three-prong glossy black stand and the VESA mount support for space-saving. Both are also equipped with an ergonomically-designed stand with a -5° to 15° tilt adjustment for users to find that ideal viewing position.

The Acer KG251Q and KG271 come with a unique 6-axis color adjustment ranging from R,G,B to C,M and Y, to aid professionals in obtaining the exact color they prefer. Acer VisionCare™ technology incorporates protective features such as Flicker-less, Blue Light Filter, ComfyView and Low Dimming to reduce eye strain and provide a more comfortable viewing experience to heavy users besides gamers, such as programmers, writers and graphic designers.

The Acer KG251Q is available at RM659.00 at select authorized Acer resellers nationwide, whereas the Acer KG271 is priced at RM899.00 and will be available in end-April 2017.

Acer Aspire GX781

Powerful Gaming and Premium Computing with Style

The Acer Aspire GX781 desktop is equipped with up to 7th Gen Intel® Core™ processors, up to 8GB of DDR4 RAM, and up to NVIDIA® GeForce® GTX 1050 graphics to perform gaming and graphics-intensive tasks in a brilliant way. The desktop computer is capable of delivering stunning 4K2K resolution visuals and support up to four displays at once for immersive and maximized gaming experiences, as well as multi-tasking.

The excitingly styled desktop is designed to perform premium everyday computing and graphics-intensive tasks, as well as reasonably powerful gaming. With up to 1TB HDD and 128GB SSD storage, storing high-resolution files within the desktop is a breeze. To top it all off, the GX781 comes with striking designs, featuring an edgy armor-inspired chassis with front-facing LED lighting that emits a sinister red glow.

The Aspire GX781 is priced at RM4,399.00, and available at all authorized Acer resellers nationwide. Customers who purchase the Aspire GX781 will also enjoy a 3-year Local on-site Warranty.

For more information, please visit Acer Malaysia Facebook or call Acer’s Product Infoline at


(9am – 6pm, Mondays to Fridays).

Higher Productivity with Ultra-thin 14” Acer Swift 5

Higher Productivity with Ultra-thin 14” Acer Swift 5

Higher Productivity with Ultra-thin 14” Acer Swift 5


Acer Swift 5 offers high-end features in a slim and lightweight body


Premium features include metal chassis, 7th Gen Intel® CoreTM processors, reversible USB 3.1 Type-C port and Acer Bio-Protection Fingerprint Reader


Acer Swift 5 provides up to 10 hours1 of battery life for higher productivity on a 14” FHD IPS display in a 13.3” body

SUBANG JAYA, 15 March 2017 – The ultra-thin and lightweight Acer Swift 5 has landed in Malaysia, joining the Swift 7 and Swift 3 line-up here to offer more features-packed, trendy laptops for every budget and lifestyle.

Measuring at 14.58 mm thin and weighing just 1.3 kg, the Acer Swift 5 comes in a stylish metal chassis. Fitting a 14-inch Full HD IPS display into a 13-inch frame, the slim laptop maximizes viewing area for great visual experience with its narrow bezel of just 8 mm on both sides.

The Acer Swift 5 is powered by 7th Gen Intel® CoreTM processors and equipped with a high speed SSD (users can choose from 256GB or 512GB) coupled with up to 8GB of memory for superior performance. It also comes with a reversible USB 3.1 Type-C port, Acer Crystal Eye HD Webcam and the latest 2x2 MU-MIMO 802.11ac wireless technology. The icing on the cake of this great looking, efficient device is the 10 hours1 of battery life. Users can conveniently ëforgetí to bring the charger and still accomplish all-day tasks with just a single charge!

Security is taken to the next level with the Acer Bio-Protection Fingerprint Reader, a biometric authentication system paired with Windows Hello. This system allows users to access their Windows account on the Acer Swift 5 in a quick and secure manner through scanning of a fingertip, without having to remember their passwords.

The large precision touchpad that accurately senses the fingertips and movements provides for faster and smoother work. Fully supporting the new Windows 10 features including Cortana, Multitasking and Action Center, the precision touch pad fits naturally into the palm-rest working area, and delivers a smooth, empowered touch experience.

The Acer Swift 5 also comes with a two-stage adjustable backlit keyboard which allows users to continue their work or play as the environment gets darker. The first stage turns on the backlit keyboard whilst the second stage turns on the lighting to full luminance.

The Acer Swift 5 provides crystal clear and instant communication across the globe via Skype for Business Certification with Windows 10. It allows connection with uninterrupted audio and visuals without echoes, gaps or lags.

All in all, the Acer Swift 5 is a beauty built for work – beautiful and light on the exterior, hardworking and intelligent on the interior.

Available in Pearl White with gold trimming or Obsidian Black with silver trimming, the Acer Swift 5 is priced at RM3,499 and RM4,499 for the 256GB and 512GB variants respectively. Both variants will be available for purchase immediately at select authorized Acer resellers nationwide.

For more information, please visit Acer Malaysiaís Facebook or call Acerís Product Infoline at 1800-88-1288 (9am – 6pm, Mondays to Fridays).

  1. Specifications vary depending on model and region

For more information

Please visit Acer Malaysiaís Facebook or call Acerís Product Infoline at 1800-88-1288 (9am – 6pm, Mondays to Fridays).

How Can SMEs Improve Their Operations During The Tough Economy

How Can SMEs Improve Their Operations During The Tough Economy

How Can SMEs Improve Their Operations During The Tough Economy?

Find out how you improve your company management and operations during this poor economy.

According to the Department of Statistics, there was a 0.4 percent marked decrease in the labour market in September 2016 and employment is going to be tougher this year. On top of that, companies like Shell Malaysia and hard disk maker Western Digital Corporation have announced that they would be laying off a combined total of almost 2000 people by 2017.

It is a tough time now, finding the right people while generating more revenue for your business. But the good news is that everyone, including your competitors are in the same boat as you in this bleak economic situation. However, this represents an opportune time to streamline your operations and strengthen the foundation of your company to stay ahead of the competition and thrive later on when the economy gets better.

So how does one even start? There are so many things to tackle but amidst all the distractions that need your attention, there are TWO important questions you need to ask yourself to get the right results.

Question 1

How do I keep my employees engaged in the company? How do I keep them committed to fight for the company’s dream and goals?

Question 2

How can I get my employees to be more productive? How can we focus in execution, execution, execution?

That’s it, just these two questions. But sadly, there are many businesses that forget to answer the questions above. They want to, but aren’t doing so.

Why is that?

Well, we’re busy. Splitting time between generating revenue and administrative matters such as payrolls, approving leaves, being sucked in to the mundane paperwork day after day. No wonder it’s so difficult to focus on the important things.

So now that you know the problem, how can one save time, energy, and resources from all the pesky administrative work and focus on things that matter?

We’ve got an answer for you. Imagine all your administrative work done, just within minutes. Don’t believe us? Here’s how it helps:

1. It saves you both time and cost!

In many companies today, one has to apply for leave through a physical leave form, only to be processed by the HR department manually. Here’s the problem that affects  the employees, the employer, and the poor HR person.

As an employee: The amount of paperwork is terrible, one form needs multiple signatures, has to be done manually, and the worst of all, it takes some time to reach the manager’s desk for that final approval. It’s really a case of not knowing your leave application status at all!

As an employer: Keeping track of each individual’s leave day balance through paperwork is crazy! On top of that, one has to go through the whole list of employees to ensure that there is enough manpower available during that time period.

As the HR person: Paperwork, paperwork, paperwork. Data entry is going to be a nightmare.

However, with, an employer is able to approve their employees annual leave on their desktop or on mobile with a few simple clicks. The employer has full access to all employee’s leave dates and the best thing about it is that it is synced with the Malaysian public holidays calendar – from Penang all the way to Sabah, also syncs each state’s holidays! It even allows us to customize weekends to start on Fridays and Saturdays for businesses in Kelantan and Johor.

This is undoubtedly the best leave management system in Malaysia. The best thing about it? It’s free.

So, there’s no reason not to use, especially if your company is still applying for and approving leaves on paper. isn’t just a one trick pony. Besides solving the frustration of applying and approving leaves, solves one of the MOST painful and troublesome HR work especially in SMEs: payrolls. also has a cloud payroll system and it automatically calculates each employee’s EPF/SOCSO/LHD and issues pay slips. For a SME of 10 people, the cost will shock you. It’s just RM50 per month. Which is just RM1.70 a day, the price of one glass of teh ais!

The real value one gets it the time saved from all the nitty gritty numbers of issuing pay slips. Hours of works turn into minutes and it is probably the easiest and most user-friendly payroll system in town. All your data is backed up on Amazon Web Services, the number one data center in the world. This means that there’s no need to fear when your computer crashes because everything will be backed up, safe, and secure.

2. It makes your employees’ (and yours) lives easier

When my company migrated to use, my staff’s feedback has only been positive with the wonderful experience of applying for their leave and getting their payslips on their phone. They told me that they do enjoy a modern company that makes it easier for them.

And there’s more to that! I used to buy medical insurance from an agent, and after a period of time when someone actually gets admitted into the hospital, our HR team had forgotten the insurance coverage for this particular employee. However, since buying medical insurance from, my employees, HR team and I can login and view their own insurance coverage with a listing of panel hospitals and the room rates per night! It’s definitely a lifesaver! is also the perfect platform to ensure your employee’s happiness and job satisfaction. What do I mean by this? Let’s take birthdays for an example. Birthdays of each employee are synced in the calendar, giving your team the opportunity to bond together and to plan things in advance. Who says you can’t have your cake and eat it too?

On top of that, is also the platform to buy birthday cakes, flowers, team lunches and activities and a corporate gym membership. This definitely improves your employees’ well-being in the company.

3. It’s SME friendly

Yes, although there are plenty of different HR platforms out there, a big problem especially for a small and growing business is that they are quite technical, expensive, or have features that does not suit SMEs. is really designed with the SMEs in mind. I am able to start utilizing the leave and payroll system in minutes and for free! For a nominal price, you get the payroll system too! You can’t get any better than that!

So, there you have it! Whether you’re just starting out with a few employees or you have a larger team with you, always remember that your employees are your greatest assets.

From paper leave forms and manual payroll processes, it’s baffling to know that a lot of companies are still applying HR practices from 40 years ago! It’s time to do things better and more efficiently. And with the help of, you will see your company becoming better and your business grow faster! Create a system for your company today at and become a better company!

It’s time to change!

Kakitangan is effective in helping a company to save time and money. It is super efficient and organised in its on way. Find out more now!

The first 24 hours after a cyber attack

The first 24 hours after a cyber attack

The first 24 hours after a cyber attack

A simple guide on how to respond to a cyber attack:

Data Breaching

by Praise Maukazuva

A data breach is when your personal data has been viewed, stolen or used without any authorization.

Computer Security Incident Response Team (CSIRT)

Dealing with cyber attacks is strenuous. There is no guarantee that your security measures will keep your system or data safe.

Ways to respond to these attacks in an effective and comprehensive manner are actively being developed at the highest level in government bodies and International communities. However it is difficult to identify the type of attack you are facing until an investigation has been carried out.

First of all, you need a Computer Security Incident Response Team (CSIRT) to manage the whole process. They should all be assigned to a task each, for example one member will deal with how to notify affected users or IT specialists in case there is a technical fault.


Secondly, notifications are sent to affected users. For example, in a company, employees, investors, and customers should be notified. Most importantly the law enforcement and legal authorities should also be notified. The notification should include key details to show the source of the problem, how it is currently being fixed and assurance that it will not be a problem in the future. E-bay was criticized for not notifying its victims in time after its system was hacked in 2014.

As mentioned earlier, the type of attack is essential to determine the type of response. The network will be slower than normal due to reduced internet speed. This can be a sign of a hacking attempt or that the computer has been infected by a form of malware, or a network worm could be replicating itself. There could also be frequent antivirus software alerts reporting an infection in the computer.

After detecting the type of attack the next step would be to assess whether it is massive or not. Cyber attacks can either be a basic or sophisticated. So how do we distinguish between the two.


BASIC ATTACKS involve small-time criminals such as individual hacktivists that target other private individuals and non-strategic Government departments for financial gain and publicity. They have limited skills and resources that are publicly known.


SOPHISTICATED ATTACKS are seriously organized crimes that are usually sponsored by the State and advanced tools are used. Their targets are the Government or Major Corporate Organizations for warfare, terrorism, major financial rewards and also to unveil National secrets.

In a sophisticated attack the whole system may be shut down and you will know that you have been attacked. For example a certain department in an Organization has its system shutdown by an attacker and for them to restore their system they need to pay money.


Next step is to prevent the attack from spreading into other systems as well. You can keep all affected systems or devices offline,isolated or suspended to stop incoming traffic from the attacker. Passwords should be changed and strengthened.

Do not delete any files, as they might be useful during the investigation.

Continuously document the whole process. So far, the type of attack, the areas it has affected, how it occurred and how it was detected should have been documented. This will be for future references.


The most important step would be to contact a forensic team or cyber security experts to further investigate the incident. The investigation will include:

  • Identifying the attacker or the cause of the attack
  • Detecting previously unknown security vulnerabilities
  • Identifying areas that need improvement or better security.
  • Assist in repairing the damage and re-building a stronger system protection with sophisticated security measures.

The forensic team uses a variety of tools during the investigation process. A simple example is TRIPWIRES, a software that detects critical file changes and intrusions on the network.

In short, a cyber attack response involves:

  • Form an incident response team
  • Notify victims and law enforcement
  • Detect the type of attack
  • Assess the scale of the attack
  • Prevent further damage
  • Document the steps taken and why they were taken
  • Contact security specialists for forensic investigation
  • Recover system with prevention measures

An effective method of response to a cyber attack is necessary as it minimises loss and data destruction. It shows vulnerabilities that were compromised and methods to avoid or reduce future risks!

3 methods Cyber Criminal uses to hack your password

3 methods Cyber Criminal uses to hack your password

3 Methods Cyber Criminal Uses To Hack Your Password

Praise Maukazuva, 7 Feb 2017

Most people use a convenient password that they can recall in the future.

According to the Cyber Streetwise campaign that was carried out by the U.K Government in 2016, it is said that 35% of the people struggle to remember their passwords.

Unauthorized access is a major problem for people who use computers, tablets, mobile phones and other computer devices, and passwords act as the main defense in protecting your data. Here are some of the methods used by cyber criminals to acquire your passwords, for fraudulent reasons.

1. Password cracking

This includes guessing the most common passwords used by people.

The “Most Common Passwords of 2016 List” researched by Keeper Security revealed that 17% of the people used “12345” as their password to secure their accounts. More weak passwords include “Password” which comes as the second worst password. “QWERTY,” on the other hand is also widely used. Besides it being rather short and letters only, which makes it easy to break down. However, the movie “StarWars” based passwords have been widely used lately.

An example of a strong password that can be difficult to crack is “My$3cur1ty#” for “My security number.” as it includes all the required characters.

So how do these cyber criminals crack passwords? Two most common ways are “Brute Force Attack” and “Dictionary Attacks”.

In Brute Force attack, every possible password is tried and tested until it finds the right password. This method is only suitable for short words, because the longer the word the more time it takes to test the password. Brute force attack uses a lot of software tools, such as Cain and Abel, John the Ripper and Air cracking depending on the operating system.

Dictionary attack uses a list of common single words from the dictionary. This method is suitable for long words, and it is more advanced as you can add symbols and numbers in front or at the end of the word. But the words have to be real dictionary words that are spelt properly which can be a limiting factor. Software tools such as brutus and crowbar are used.

Image: Dribbble, Kristin Fall Bonett

2. Malware

Spyware is an example of malware, a malicious code that can access your computer through downloading pirated files or simply clicking pop up ads that are infected. This malware monitors a user’s activities such as sites visited and programs that were run thereby tracking log in passwords and usernames.

Shockingly 80% of personal computers is infected with some kind of spyware, without their knowledge, as it works in the background silently making changes and recording activities.


3. social engineering

This is a manipulative way of getting personal information from individuals, this information is then used for fraudulent ways. Types of social engineering include, phishing and scareware.

  • In phishing, you receive an email that will enable you to click a link that redirects you to a fake website asking your for your passwords and credit card details. An email may come as :

“You won $1 million! Click here for your reward!”

With all the excitement you are quick to click on the link that will require you to enter your password.

  • Scareware on the other hand, involves the attacker tricking you into believing that you have malware in your computer. They will act as if they are helping you get rid of it but in turn, they are making you download the actual malware.

The more developed we are in terms of technology, the more methods of acquiring passwords maliciously there are, advancing with time also.

However, There are many ways of keeping your data safe with a password that is difficult or impossible to acquire.

Tips on choosing a good password

People struggles to create a good password because they think that the strongest passwords are not easy to remember. This is not true. Below are some of the ways of creating a strong password.


Use of Long phrases with numbers, symbols, letters, lower cases and upper cases. The longer it is, the harder it is to break down.


You need to have a different and unique password for every service. Avoid using the same password for your E-mail services and also banking services.


Use of Biometrics. Nowadays mobile smart phones, tablets or laptops allow you to gain access to them using your fingerprints or through voice recognition. You don’t need to remember your password.


Use of Password Managers. Examples of these include LastPass, DashLane, 1Password and Norton. It can be in the form of a mobile application, that stores all your passwords, for every service. You just need to remember your master password that will unlock your other passwords. They usually come with a browser extension where you can log in to your accounts automatically.


The two-step Verification. During the signing in process, a code is sent to your mobile phone, and you are supposed to enter that code in order to gain access for example to your e-mails. However without the code, there is no access.


This consists of simple steps, that are easily ignored such as, not sharing the password, not to write it down, and also to change it regularly.

Implementing a few of these facts is better than not implementing any of them. However the goal here is to make sure that our Personal files and data are kept safe by a very strong password.

Page 2 of 512345