
How to support a remote workforce without losing your mind
Distance makes the heart grow fonder, and apparently, is no longer an obstacle for team productivity.
Thanks to new work habits and rapidly evolving technology, virtual teams are now taking the workplace by storm where technology serves as the only connection between users and the rest of the business.
However, successfully supporting virtual teams demands a comprehensive approach. Lenovo’s ‘How To Guide’ can help you and your company find ways to get there.
The right strategy requires a proactive approach and a focused team with connected users. Your number one goal should be to proactively confront the challenge.
- Before purchasing devices, train your users
- When purchasing devices, look for reliability first
- After purchasing devices, make sure they are well-maintained and managed
Microsoft top targeted brand by cyber criminals in Q4 2020
SOC as a Service market on the up, driven by greater focus on security
SMX partners with Microsoft to deliver email security solution for Office 365
Malwarebytes expands security protection suite for remote workers
Remote working to accelerate cyber attacks - WatchGuard
Singapore makes an example of remote working in APAC, but security concerns persist

Kaspersky steps in to protect automotive industry from cyber threats
The company’s TI report, previously available for a selected range of customers, is able to provide car manufacturers with in-depth analysis of industry-specific security threats.

Ensign and Cybereason expand security offerings with partnership
Partnership enables mutual customers throughout APAC to access managed detection and response capabilities.

IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”

First AML awarded Privacy Trust Mark
“First AML conducts regular, detailed staff privacy and security training sessions and employs regular third-party audits that go above and beyond what is required by law."

Sophos Rapid Response puts out the ransomware fire
“Attackers are using a range of techniques and whichever defence has a weakness is how they get in. When one technique fails they move on to the next, until they find a weak spot."

Cybersecurity strategies must involve every part of the organisation - study
In the past year, a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million.