<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.com.sg/blogs/Infra_Support/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services Singapore - Blog , Technology Infrastructure Support</title><description>Managed IT Services Singapore - Blog , Technology Infrastructure Support</description><link>https://www.brocent.com.sg/blogs/Infra_Support</link><lastBuildDate>Fri, 12 Sep 2025 08:02:14 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Overcome the Barriers to a Smooth BYOD Program]]></title><link>https://www.brocent.com.sg/blogs/post/Smooth_BYOD_Program</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/TTT_Blog-Post-Social-Media-Image-Tips-for-Overcoming-Barriers-to-a-Smooth-BYOD-Program-V1.png"/>Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_sD7iSGUOQOyIg4V_UFPIDA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_xR_c9XKFTFGCxpnnamVvIw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nx1MDw8kT6e_EXBmjVUF1A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_h8tKy5yuT02fjHh_v80CAQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_h8tKy5yuT02fjHh_v80CAQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="font-weight:700;">Overcome Barriers to a Smooth BYOD Program</span></h2></div>
<div data-element-id="elm_ir63BUOSx_OCuPVNCXY6vA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ir63BUOSx_OCuPVNCXY6vA"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_ir63BUOSx_OCuPVNCXY6vA"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_ir63BUOSx_OCuPVNCXY6vA"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_ir63BUOSx_OCuPVNCXY6vA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Post202301/TTT_Blog-Post-Social-Media-Image-Tips-for-Overcoming-Barriers-to-a-Smooth-BYOD-Program-V2.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_j8ov8BZuRG-_Rb_3xCj1Ig" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_j8ov8BZuRG-_Rb_3xCj1Ig"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work.</span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">According to Microsoft, mobile devices make up about <a href="https://www.microsoft.com/security/blog/2020/04/07/mobile-security-60-percent-problem/">60% of the endpoints</a> in a company network. They also handle about 80% of the workload. But they’re often neglected when it comes to strong cybersecurity measures.</span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);">This is especially true with employee-owned mobile devices. BYOD differs from corporate-owned mobile use programs. Instead of using company tools, employees are using their personal devices for work. Many businesses find this the most economical way to keep their teams productive.</span></p><p style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><br></span></p><div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">Purchasing phones and wireless plans for staff is often out of reach financially. It can also be a pain for employees to carry around two different devices, personal and work.&nbsp;<b style="text-align:center;"><i>It’s estimated that </i></b><span lang="EN-AU" style="text-align:center;"><a href="https://www.zippia.com/advice/byod-statistics/"><b><i><span lang="EN-US">83% of</span></i></b></a></span><b style="text-align:center;"><i> companies have some type of BYOD policy.&nbsp;</i></b>You can run BYOD securely if you have some best practices in place. Too often, business owners don’t even know all the devices that are connecting to business data. Or which ones may have data stored on them.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p class="MsoNormal" style="text-align:left;"><span style="color:rgb(0, 0, 0);"></span></p><p class="MsoNormal" style="text-align:left;"><span style="color:rgb(0, 0, 0);">Here are some tips to overcome the security and challenges of BYOD. These should help you enjoy a win-win situation for employees and the business.&nbsp;</span><span style="color:inherit;"></span></p></div></div></div>
</div><div data-element-id="elm_5ebleBWVk-knZtxK9mSrGA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5ebleBWVk-knZtxK9mSrGA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Define Your BYOD Policy</span></h3></div>
<div data-element-id="elm_HaMQkGYATl7dWWPpmFDMfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HaMQkGYATl7dWWPpmFDMfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">If there are no defined rules for BYOD, then you can’t expect the process to be secure. Employees may leave business data unprotected. Or they may connect to public Wi-Fi and then enter their business email password, exposing it.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">If you allow employees to access business data from personal devices, you need a policy. This policy protects the company from unnecessary risk. It can also lay out specifics that reduce potential problems. For example, detailing the compensation for employees that use personal devices for work.</span></p></div></div>
</div><div data-element-id="elm_gz-Bd2yhoJSeQx-RKVbssw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gz-Bd2yhoJSeQx-RKVbssw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Keep Your Policy &quot;Evergreen&quot;</span></h3></div>
<div data-element-id="elm_XGFpJQnMJNLZbDWwFKmrBA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XGFpJQnMJNLZbDWwFKmrBA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">As soon as a policy gets outdated, it becomes less relevant to employees. Someone may look at your BYOD policy and note that one directive is old. Because of that, they may think they should ignore the entire policy.&nbsp; </span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Make sure that you keep your BYOD policy “evergreen.” This means updating it regularly if any changes impact those policies.</span></p></div></div>
</div><div data-element-id="elm_L5Qwvpr3EsBALM4_5ZKCsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_L5Qwvpr3EsBALM4_5ZKCsQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Use VoIP Appls for Business Calls</span></h3></div>
<div data-element-id="elm_uAXe7p_PuJwCUQIPmuWU8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_uAXe7p_PuJwCUQIPmuWU8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Before the pandemic, <a href="https://financesonline.com/byod-statistics/">65% of</a> employees gave their personal phone numbers to customers. This often happens due to the need to connect with a client when away from an office phone. Clients also may save a personal number for a staff member. For example, when the employee calls the customer from their own device.</span></p><p><span style="color:rgb(0, 0, 0);">Customers having employees’ personal numbers is a problem for everyone. Employees may leave the company, and no longer answer those calls. The customer may not realize why.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">You can avoid the issue by using a business VoIP phone system. These services have mobile apps that employees can use. VoIP mobile apps allow employees to make and receive calls through a business number.</span></p></div></div>
</div><div data-element-id="elm_BDZcOMxznOdhi-ADXG6sFA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_BDZcOMxznOdhi-ADXG6sFA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Create Restrictions on Saved Company Data</span></h3></div>
<div data-element-id="elm_nua0_gIiYLIP55WHu9zHow" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_nua0_gIiYLIP55WHu9zHow"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Remote work has exasperated the security issue with BYOD. While BYOD may have meant mobile devices in the past, it now means computers too. Remote employees often will use their own PCs when working outside the office.</span></p><p><span style="color:rgb(0, 0, 0);">No matter what the type of device, you should maintain control of business data. It’s a good idea to restrict the types of data that staff can store on personal devices. You should also ensure that it’s backed up from those devices.</span></p></div></div>
</div><div data-element-id="elm_PBDYzLx-QdV4bxrKzvf6qg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PBDYzLx-QdV4bxrKzvf6qg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Require Devices Updates</span></h3></div>
<div data-element-id="elm_ZFQ_g3FHWb8V6jzBKudYSg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZFQ_g3FHWb8V6jzBKudYSg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">When employee devices are not updated or patched, they invite a data breach. Any endpoint connected to your network can enable a breach. This includes those owned by employees.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">It can be tricky to ensure that a device owned by an employee is kept updated. Therefore, many businesses turn to endpoint management solutions. An endpoint device manager can push through automated updates. It also allows you to protect business data without intruding on employee privacy.</span></p><p><span style="color:rgb(0, 0, 0);">The monitoring and management capabilities of these tools improve security. This includes the ability to safelist devices. Safelisting can block devices not added to the endpoint manager.</span></p></div></div>
</div><div data-element-id="elm_4bL7mOJFqlbU2TSPBgX0sw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4bL7mOJFqlbU2TSPBgX0sw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Include BYOD in Your Offboarding Process</span></h3></div>
<div data-element-id="elm_1aX-PWPdNV1m2gO_LaRqew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1aX-PWPdNV1m2gO_LaRqew"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">If an employee leaves your company, you need to clean their digital trail. Is the employee still receiving work email on their phone? Do they have access to company data through persistent logins? Are any saved company passwords on their device?</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">These are all questions to ask when offboarding a former staff member. You should also make sure to copy and remove any company files on their personal device. Additionally, ensure that you deauthorize their device(s) from your network.</span></p></div></div>
</div><div data-element-id="elm_UnlJqE-MpwNlRkDWUFJcgQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_UnlJqE-MpwNlRkDWUFJcgQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Let Us Help You Explore Endpoint Security Solution</span></h2></div>
<div data-element-id="elm_L-RJnO3NtU5ApNpAmbIhfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L-RJnO3NtU5ApNpAmbIhfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>We can help you explore solutions to secure a BYOD program. We’ll look at how your company uses personal devices at your business and recommend the best tools. Contact us today for a free consultation.</p></div></div>
</div><div data-element-id="elm_nGC5gygfS9KU89YI-H0sUA" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Jan 2023 13:43:28 +0000</pubDate></item><item><title><![CDATA[Advantage of Implementing Conditional Access]]></title><link>https://www.brocent.com.sg/blogs/post/Implement_Conditional_Access</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/TTT_Blog-Post-Social-Media-Image-What-Are-the-Advantages-of-Implementing-Conditional-Access-V1.png"/>Access and identity management have become a priority for many organizations. This is largely due to the rise of the cloud. As well as the practice of people needing to only enter a username and password to access systems.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_wYfL9z3FRGCW6bpHFZ3tuw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_MmWLjflQTSeI0HQuX8MDQA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_W8LzYQTyRCGzKXOs_z47Jg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_W8LzYQTyRCGzKXOs_z47Jg"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_J08XZLEYTHuMMeHdvKnY_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_J08XZLEYTHuMMeHdvKnY_g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">Advantage of Implementing Conditional Access</h2></div>
<div data-element-id="elm_iD-FHBpA4-hKKQfO485W_g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_iD-FHBpA4-hKKQfO485W_g"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_iD-FHBpA4-hKKQfO485W_g"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_iD-FHBpA4-hKKQfO485W_g"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_iD-FHBpA4-hKKQfO485W_g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Post202301/TTT_Blog-Post-Social-Media-Image-What-Are-the-Advantages-of-Implementing-Conditional-Access-V3.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_cgkJ1AxxSIuKFlWhymuSVg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cgkJ1AxxSIuKFlWhymuSVg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. <a href="https://withpersona.com/blog/two-factor-authentication-statistics">Eighty-one percent</a> of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">For example, 61% of workers use the same password for multiple platforms. And 43% have shared their passwords with others. These factors are why compromised credentials are the main cause of data breaches.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">Access and identity management have become a priority for many organizations. This is largely due to the rise of the cloud. As well as the practice of people needing to only enter a username and password to access systems.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:12pt;">&nbsp;</span>Once a cybercriminal gets a hold of an employee’s login, they can access the account and any data that it contains. This is especially problematic when it’s an account like Microsoft 365 or Google Workspace. These accounts can access things like cloud storage and user email.</span></p><span style="font-size:11pt;"><div style="text-align:left;"><span style="font-size:11pt;color:rgb(0, 0, 0);">Below, we’ll explain what conditional access is. As well as how it works with multi-factor authentication (MFA). We’ll also review the advantages of moving to a conditional access process.</span></div></span></div></div>
</div><div data-element-id="elm_PYXdB3O54HzRNca6-rdMIg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PYXdB3O54HzRNca6-rdMIg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">What is Conditional Access?</h2></div>
<div data-element-id="elm_wU6gxroNRPutXoMdNbx7og" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wU6gxroNRPutXoMdNbx7og"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Conditional access is also known as contextual access. It is a method of controlling user access. You can think of it as several “if/then” statements, meaning “if” this thing is present, “then” do this.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">For example, conditional access allows you to set a rule that would state the following. “If a user is logging in from outside the country, require a one-time-passcode.”</span></p><p><span style="color:rgb(0, 0, 0);">Conditional access allows you to add many conditions to the process of user access to a system. It is typically used with MFA. This is to improve access security without unnecessarily inconveniencing users.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Some of the most common contextual factors used include:</span></p><div><ul><li><span style="color:rgb(0, 0, 0);">IP address </span></li><li><span style="color:rgb(0, 0, 0);"><span style="font-size:7pt;">&nbsp;</span>Geographic location </span></li><li><span style="color:rgb(0, 0, 0);"><span style="font-size:7pt;">&nbsp;</span>Time of day</span></li><li><span style="color:rgb(0, 0, 0);"><span style="font-size:7pt;">&nbsp;</span>The device used</span></li><li><span style="color:rgb(0, 0, 0);"><span style="font-size:7pt;">&nbsp;</span>Role or group the user belongs to</span></li></ul><p><span style="color:rgb(0, 0, 0);">Conditional access can be set up in <a href="https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/plan-conditional-access">Azure Active Directory</a>. It can also be set up in another identity and access management tool. It’s helpful to get the assistance of your IT partner. We can help with setup and the conditions that would make the most sense for your business.</span></p></div></div></div>
</div><div data-element-id="elm_MrWI2kP2e1HJFFjc31AbzQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MrWI2kP2e1HJFFjc31AbzQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Benefits of Implementing Conditional Access for Identity Management</h2></div>
<div data-element-id="elm_kzmshgz2i3hCGGLO_Yikhw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kzmshgz2i3hCGGLO_Yikhw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Improves Security</h3></div>
<div data-element-id="elm_y6z7keSOTYFaqapYfT1elw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y6z7keSOTYFaqapYfT1elw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Using conditional access improves security. It allows you more flexibility in challenging user legitimacy. It doesn't just grant access to anyone with a username and password. Instead, the user needs to meet certain requirements.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Contextual access could block any login attempts from countries where no employees are. It could also present an extra verification question when employees use an unrecognized device.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_lpf0SEJDNOoPcq5J_NIEhA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lpf0SEJDNOoPcq5J_NIEhA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Automate the Access Management System</h3></div>
<div data-element-id="elm_tVlAJ1XtUdaOqpC5Edw_2A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tVlAJ1XtUdaOqpC5Edw_2A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Once the if/then statements are set up, the system takes over. It automates the monitoring for contextual factors and takes the appropriate actions. This reduces the burden on administrative IT teams. It also ensures that no one is falling between the cracks.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Automated processes are more accurate and reliable than manual processes. Automation removes the human error component. This helps ensure that each condition is being verified for every single login.</span></p></div></div>
</div><div data-element-id="elm_HKojOZH-OlTHpuLWYUoS_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HKojOZH-OlTHpuLWYUoS_g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Allows Restriction of Certain Activities</h3></div>
<div data-element-id="elm_dSeNR-Kazkvtle7VQB1RbQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dSeNR-Kazkvtle7VQB1RbQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Conditional access isn’t only for keeping unauthorized users out of your accounts. You can use it in other ways. One of these is to restrict the activities that legitimate users can do.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">For example, you could restrict access to data or settings based on a user’s role in the system. You can also use conditions in combination. Such as, lowering permissions to view-only. You could trigger this if a user holds a certain role and is logging in from an unknown device.</span></p></div></div>
</div><div data-element-id="elm_Oyf69fcaPA2kTPbPp-v2WA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Oyf69fcaPA2kTPbPp-v2WA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Improves the User Login Experience</h3></div>
<div data-element-id="elm_AnpFpp2zrl66jQEZsgYktA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_AnpFpp2zrl66jQEZsgYktA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Studies show that as many as <a href="https://jumpcloud.com/blog/why-arent-more-smes-using-multi-factor-authentication">67% of</a> businesses don’t use multi-factor authentication. This is despite the fact that it’s one of the most effective methods to stop credential breaches.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">One of the biggest reasons it is not used is because of the inconvenience factor for employees. They may complain that it interferes with productivity. Or say that it makes it harder for them to use their business applications.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Using conditional access with MFA can improve the user experience. For example, you can require MFA only if users are off the premises. You can put in place extra challenge questions on a role or context-based basis. This keeps all users from being inconvenienced.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_gV81VSRCFg6qjld7acmjYQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gV81VSRCFg6qjld7acmjYQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Enforces the Rule of Least Privilege</h3></div>
<div data-element-id="elm_Rllvbej0cSNhSLS5WpkruQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Rllvbej0cSNhSLS5WpkruQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Using the rule of least privilege is a security best practice. It means only granting the lowest level of access in a system as necessary for a user to do their work. Once you have roles set up in your identity management system, you can base access on those roles.</span></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">Conditional access simplifies the process of restricting access to data or functions. You can base this on job needs. It streamlines identity management. This is because it contains all functions in the same system for access and MFA rules. Everything stays together, making management simpler.</span></p></div></div>
</div><div data-element-id="elm_gCx_DGSBsPCgFCUv8rpVMQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_gCx_DGSBsPCgFCUv8rpVMQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">Get Help Implementing Conditional Access Todays!</h2></div>
<div data-element-id="elm_QXZJcAWkdFhuWHNCocnBVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QXZJcAWkdFhuWHNCocnBVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Once conditional access is set up, the automated system takes over. It improves your security and reduces the risk of an account breach. Contact us today for a free consultation to enhance your cybersecurity.</span></p></div></div>
</div><div data-element-id="elm_69gSxBj2S26FSKkCCdHsQQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_69gSxBj2S26FSKkCCdHsQQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20-%20IT%20Managed%20Service%20Pricing&amp;body=I%20would%20like%20to%20study%20the%20solution%20of%20implementing%20the%20conditional%20access%2C%20and%20would%20like%20to%20study%20the%20solution%20of%20conditional%20access%20too.%0A%0ARegards%2C"><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 10 Jan 2023 13:52:58 +0000</pubDate></item><item><title><![CDATA[Consideration of Year-end Technology Infrastructure Review]]></title><link>https://www.brocent.com.sg/blogs/post/2022_Yearend_Infra_Reivew</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/TTT_Blog-Post-Social-Media-Image-What-to-Include-i1673281816319.png"/>When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_RKZn0A-5RKCKhXBkIewCRA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_4z3V6Ii3R1G1GK1pehzYVA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_l0cyMMItTfeUwWst2u8d_Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_l0cyMMItTfeUwWst2u8d_Q"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_FKPOYFaCQwGVkLqYcqCfmg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FKPOYFaCQwGVkLqYcqCfmg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;">Consideration of Year-end Technology Infrastructure Review</h1></div></h2></div>
<div data-element-id="elm_RAX5ICzWxUWILtFp5Nr5fw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_RAX5ICzWxUWILtFp5Nr5fw"] .zpimage-container figure img { width: 1110px ; height: 580.90px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_RAX5ICzWxUWILtFp5Nr5fw"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_RAX5ICzWxUWILtFp5Nr5fw"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_RAX5ICzWxUWILtFp5Nr5fw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Post202301/TTT_Blog-Post-Social-Media-Image-What-to-Include-i1673281816319.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_aFgZSgHeQwOPvsi37Cgi_A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_aFgZSgHeQwOPvsi37Cgi_A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">A year-end technology review provides an opportunity to look at several areas of your IT. The goal is to take time to focus on improvements you can make to boost your bottom line. As well as what tactics to take to reduce the risk of a costly cyberattack.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">A recent <a href="https://www2.deloitte.com/us/en/pages/technology-media-and-telecommunications/articles/connected-small-businesses.html">study</a> by Deloitte looked at digitally advanced small businesses. Small businesses that make smart use of technology are well ahead of their peers. Here are some of the ways they excel:</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><ul><li style="text-align:left;"><span style="color:rgb(0, 0, 0);">Earn 2x more revenue per employee</span></li><li style="text-align:left;"><span style="color:rgb(0, 0, 0);">Experience year-over-year revenue growth nearly 4x as high&nbsp; </span></li><li style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:7pt;">&nbsp;</span>Had an average employee growth rate over 6x as high</span></li></ul><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><br></span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">The bottom line is that companies that use technology well, do better. They are also more secure. According to IBM, businesses that have an incident response plan reduce the costs of a data breach <a href="https://www.upguard.com/blog/cost-of-data-breach">by 61%</a>. Using security AI and automation can lower costs by 70%.</span></p><p style="text-align:left;"><span style="color:rgb(0, 0, 0);">This year-end, take some time to do a technology review with your IT team or managed IT provider. This will set you up for success and security in the coming year.</span></p><p style="color:inherit;text-align:left;"><br></p></div></div>
</div><div data-element-id="elm_kc3cvQJ1Gq17dJn43ysBAA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kc3cvQJ1Gq17dJn43ysBAA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Considerations When Reviewing Your Technology at Year-End</span></h2></div>
<div data-element-id="elm_suCBnSfV2zq9IQQ1j-cYdA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_suCBnSfV2zq9IQQ1j-cYdA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">The goal of a year-end technology review is to look at all areas of your IT infrastructure. Security, efficiency, and bottom-line considerations will be the key drivers for future initiatives.<br></span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_YUT7l3-FLgs_3GdB2eyi2A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YUT7l3-FLgs_3GdB2eyi2A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Technology Policies</span></h3></div>
<div data-element-id="elm_DhokONeZnp_sh4MGqOodtg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_DhokONeZnp_sh4MGqOodtg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">When technology policies get outdated, people stop following them. Review all your policies to see if any of them need updating to reflect new conditions. For example, if you now have some staff working from home, make sure your device use policy reflects this.<br></span></p><p><span style="color:rgb(0, 0, 0);">When you update policies, let your employees know. This gives them a refresher on important information. They may have forgotten certain things since onboarding.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_m6FoRNsMLps6YJJ3w056Xw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_m6FoRNsMLps6YJJ3w056Xw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Disaster Recovery Planning</span></h3></div>
<div data-element-id="elm_-BrMgGlYf5O7YiBRbg7beA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_-BrMgGlYf5O7YiBRbg7beA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(11, 25, 45);">When is the last time your company did an incident response drill? Is there a list of steps for employees to follow in the case of a natural disaster or cyberattack?<br></span></p><p><span style="color:rgb(11, 25, 45);">Take time to look at disaster recovery planning for the new year. You should also put dates in place for preparedness drills and training in the coming months.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_zxhf9s3s3ScgbsCMFRk_SA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zxhf9s3s3ScgbsCMFRk_SA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">IT Issues &amp; Pain Points</span></h3></div>
<div data-element-id="elm_KMY5ujHMm7xU4Jt0hyjiAQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_KMY5ujHMm7xU4Jt0hyjiAQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(1, 58, 81);">You don’t want to go through a big IT upgrade without considering employee pain points. Otherwise, you might miss some golden opportunities to improve staff productivity and wellbeing.<br></span></p><p><span style="color:rgb(1, 58, 81);">Survey your employees on how they use technology. Ask questions about their favorite and least favorite apps. Ask what struggles they face. Let them tell you how they feel technology could improve to make their jobs better. This, in turn, benefits your business. It can also help you target the most impactful improvements.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_G1BQ8APZgEJA4ELNBZLWfw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_G1BQ8APZgEJA4ELNBZLWfw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Privileged Access &amp; Orphaned Accounts</span></h3></div>
<div data-element-id="elm_jbjfSsruyKBqfrkWli8cBg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jbjfSsruyKBqfrkWli8cBg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Do an audit of your privileged accounts as part of your year-end review. Over time, permissions can be misappropriated. This leaves your network at a higher risk of a major attack.<br></span></p><p><span style="color:rgb(0, 0, 0);">You should ensure that only those that need them have admin-level permissions. The fewer privileged accounts you have in your business tools, the lower your risk. Compromised privileged accounts password open the door to major damage.</span></p><p><span style="color:rgb(0, 0, 0);">While going through your accounts, also look for orphaned accounts. You need to close these because they’re no longer used. Leaving them active poses a security risk.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_MCw6MDgChcbH0EawmDtY1Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MCw6MDgChcbH0EawmDtY1Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">IT Upgrade &amp; Transformation Plans for the New Year</span></h3></div>
<div data-element-id="elm_Vmq3dX5c-5HOiXi2KqsWDw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Vmq3dX5c-5HOiXi2KqsWDw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">If you make IT upgrades and decisions “on the fly” it can come back to bite you. It’s best to plan out a strategy ahead of time, so you can upgrade in an organized way.<br></span></p><p><span style="color:rgb(0, 0, 0);">Have a vulnerability assessment performed. This gives you a list of potential problems your company should address. Eliminating vulnerabilities improves your cybersecurity. Planning ahead allows you to budget for your upgrades and avoid unplanned expenses.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_HYWhi8aHbswj7a3tBlw4jg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HYWhi8aHbswj7a3tBlw4jg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Cloud Use &amp; Shadow IT</span></h3></div>
<div data-element-id="elm_I8WV7xVPPz-LjLQ5XVYT8g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_I8WV7xVPPz-LjLQ5XVYT8g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Review your use of cloud applications. Are certain apps hardly used? Do you have redundancies in your cloud environment? A review can help you cut waste and save money.<br></span></p><p><span style="color:rgb(0, 0, 0);">Also, look for uses of shadow IT by employees. These are cloud applications that are being used for work but did not go through approval. Management may not even be aware of them. Remove this security risk by either closing the accounts or officially approving them.</span></p><p style="color:inherit;"><br></p></div></div>
</div><div data-element-id="elm_rAVwNwlUwq04W_udL2TzMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rAVwNwlUwq04W_udL2TzMw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Customer-Facing Technology</span></h3></div>
<div data-element-id="elm_bUgEMTY6yjCAfOoEUTrihA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bUgEMTY6yjCAfOoEUTrihA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);">Don’t forget to look at the customer experience of your technology infrastructure. Go through your website and contact process as a customer would.<br></span></p><p><span style="color:rgb(0, 0, 0);">If you get frustrated by things like site navigation, then your customers and leads may be too. Include optimizations to your customer-facing technology in your new year plans.</span></p></div></div>
</div><div data-element-id="elm_W4WHsNrDlaSfxk2-QPCPQg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_W4WHsNrDlaSfxk2-QPCPQg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><b><span style="font-size:14pt;">Schedule a Technology &amp; Security Assessment Today!</span></b></span></h2></div>
<div data-element-id="elm_G25eS3QWLbzoJ-Jfdn3j-g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_G25eS3QWLbzoJ-Jfdn3j-g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">We can help you with a thorough review of your technology environment to give you a roadmap for tomorrow. Contact us today for a free consultation.</span></p></div></div>
</div><div data-element-id="elm_7Fhyc5qFT5CG2XXH0aJTVA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_7Fhyc5qFT5CG2XXH0aJTVA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20-%20IT%20Managed%20Service%20Pricing&amp;body=I%20would%20like%20to%20study%20how%20we%20can%20work%20together%20to%20prepare%20the%20annual%20infrastructure%20review%20and%20plan.%0ARegards"><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 09 Jan 2023 16:30:51 +0000</pubDate></item><item><title><![CDATA[Wi-Fi Site Surveys: Passive, Active, Survey-on-A-Stick]]></title><link>https://www.brocent.com.sg/blogs/post/wifi_survey_type</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Network/AP_ON_STICK.jpg"/>The lifecycle of a wireless network is the process of designing, validating, optimizing, and troubleshooting that network. We’ve discussed Wi-Fi site surveys in a couple of Webinar. However, not all site surveys are equal. There’s three common types of on-site surveys that can be performed.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_-YdTriwzQpaSJdgELObXyA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm__GDAY0mCQN6mI5tNvXCd1w" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lHrG1yEOQduhnWH3ZhHSlQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_lHrG1yEOQduhnWH3ZhHSlQ"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_6rQfkG0oQKOQt-eVUJHB4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_6rQfkG0oQKOQt-eVUJHB4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Wi-Fi Site Surveys: Passive, Active, Survey-on-A-Stick</span></span></h2></div>
<div data-element-id="elm_1hniPIlHQwG0_RWk-4ZOPA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1hniPIlHQwG0_RWk-4ZOPA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;font-size:16px;">The&nbsp;</span>lifecycle of a wireless network<span style="color:inherit;font-size:16px;">&nbsp;is the process of designing, validating, optimizing, and troubleshooting that network. Whether upgrading an existing wireless network or designing a greenfield network, you have to account for capacity requirements or potential interferences in the environment. Before you deploy your new or upgraded network infrastructure, you need to ensure you have real-world data to provide insight and insurance for your wireless project.&nbsp;</span><span style="color:inherit;"><span style="font-size:16px;">We’ve discussed Wi-Fi site surveys in a couple of Webinar.&nbsp;</span><span style="font-size:16px;">However, not all site surveys are equal. There’s three common types of on-site surveys that can be performed.</span></span><br></p></div>
</div><div data-element-id="elm_y0I7yOKdQDEu4lsB2Bpq4g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y0I7yOKdQDEu4lsB2Bpq4g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:24px;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Passive site surveys</span></span></p><p>Performed to get an understanding of the RF characteristics on-site. By RF characteristics I mean Wi-Fi signal strengths, noise levels, SNR (signal-to-noise ratio), and the like. &nbsp;The reason the site surveys are called “passive” is that your Wi-Fi network adapter is pretty much just listening to packets when performing passive site surveys. OK, the NIC might send some probes out, but that’s about it.</p><p><span style="color:inherit;"><span style="font-size:24px;"></span></span></p><h3 style="font-weight:700;"><br></h3></div>
</div><div data-element-id="elm_qDNJRKcLf0-H1aD13VlVXA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qDNJRKcLf0-H1aD13VlVXA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:24px;"><span style="font-weight:bold;color:rgb(0, 0, 0);">Active Site Surveys</span></span></p><p>Provide more insight on the network connectivity and/or performance. Things like packet loss, packet delay, and access points you’ve associated with, can be measured during active site surveys. As the name suggests, with active surveys the Wi-Fi adapter is receiving AND sending packets to figure out what’s truly going on with the network.</p></div>
</div><div data-element-id="elm_TExE4KZYSlC63aq2Vbkz5A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TExE4KZYSlC63aq2Vbkz5A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:30px;color:rgb(0, 0, 0);">What is an AP on a Stick survey?</span></p><p>An AP on a Stick (APoS) survey is a method of temporarily staging APs at deployment height utilizing a tripod or other mounting options in order to validate your predictive design before a full site deployment. APoS surveys identify the RF signal propagation characteristics of the environment while providing additional confidence your proposed design will work as planned, reducing the need for costly AP location changes, and validating you have the correct number of APs in your design.</p></div>
</div><div data-element-id="elm_Q2ZRYtMg3wtmP1TeLL5TSg" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Q2ZRYtMg3wtmP1TeLL5TSg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Network/c93e298ed532977a77f6ffb3f6fa905.jpg" size="fit" data-lightbox="true" style="width:100%;padding:0px;margin:0px;"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 Mar 2021 12:17:30 +0000</pubDate></item><item><title><![CDATA[Brocent Won IT Relocation Project | Shanghai China]]></title><link>https://www.brocent.com.sg/blogs/post/Brocent-Won-IT-Relocation-Project-Shanghai-China</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/files/348209230.jpg"/>BROCENT wins the IT Relocation Project, that supports clients to survey, contingency plan, move, stack &amp;rack and finally resume all IT infrastruct ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm__wDhTJUtSfG5ozN5oh9TVQ==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_as2_zVhKQ0mDQKwzDzsb_A==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_AWDeS6lZQx6F0CLXb-wjSg==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Xl1LPaqpRPCc_gcKnB_Z1g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><font face="Arial, Helvetica, sans-serif">BROCENT wins the IT Relocation Project, that supports clients to survey, contingency plan, move, stack &amp;rack and finally resume all IT infrastructure in the new office. 9 Hours with&nbsp;12 experienced IT engineers' effort completes the delivery of the whole relocation service,&nbsp;17:30 till 2:30 A.M in the second day.</font></span></p></div></div>
</div><div data-element-id="elm_eFNiczyJSUqU14Je9dABMQ" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/348209230.jpg" size="original" alt="IT Relocation Service Shanghai China" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_YXc_UlgNScaurtJMbsL1yA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><font face="Arial, Helvetica, sans-serif">In such reloaction project, usually it involves multiple suppliers to take care of different&nbsp;scope of work, i.e., Furniture, Cabling, Office Security, IT Infra &amp;Application and so on.&nbsp;Perform a thorough survey becomes the utmost crucial, that makes clear of Roles&nbsp;&amp;Responsibility for the whole team to follow till the completion of task execution, which&nbsp;covers the fundamental IT inventory, system &amp;network diagram, and the co-relationship to the&nbsp;applications with its unique maintenance window.</font></span></p></div></div>
</div><div data-element-id="elm_hzaHVLesTDSN91UieyHIDA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><font face="Arial, Helvetica, sans-serif">A short but precise execution plan simplifies the process of disconnection, packing,&nbsp;protection and moving, that right person is monitoring and validating the accuracy and&nbsp;integrity of all IT assets. A particular attention shall be on the coordination with BMO,&nbsp;that makes sure packed devices &amp;materials can be moved down and up within the expected&nbsp;timeframe.</font></span></p><p><span><font face="Arial, Helvetica, sans-serif"><br></font></span></p><p><span><font face="Arial, Helvetica, sans-serif"><span>We value those effort by all interest parties likely cabling, security and furniture etc,&nbsp;because everyone is working in the same space and time windows, as-of-it, more important&nbsp;things for Brocent PM is to keep earlier and proactive communication with client's project&nbsp;managers that the relocation team can move all devices &amp;facilities into the new computer&nbsp;room and/or workspace punctually on time, with that, the network &amp;system engineer can&nbsp;efficiently work to resume the network and system.</span><br></font></span></p></div></div>
</div><div data-element-id="elm_pbbtOZG-QCmAd1_PhipIdg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><font face="Arial, Helvetica, sans-serif">Yet, the network connectivity and system functional test is the last but not the final step&nbsp;to examine and prove that end users can properly use the IT infrastructure in this nice &amp;new&nbsp;office.</font></span></p></div></div>
</div><div data-element-id="elm_4-VdIkXgThOmY2OpYKc3WA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><font face="Arial, Helvetica, sans-serif">Congratulation to the team. Awesome work done.</font></span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sat, 18 Nov 2017 07:18:33 +0000</pubDate></item><item><title><![CDATA[Perks of Microsoft Open Value Subscription Licensing]]></title><link>https://www.brocent.com.sg/blogs/post/Perks-of-Microsoft-Open-Value-Subscription-Licensing</link><description><![CDATA[Technology is changing at an incredible pace and staying up to date is becoming more and more important in our competitive business world. Considering ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OFkrcvW6QvCnAevawiq8MA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6Xkz5uP6TgSbQC2aHOqNvA==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_3ZE_7JwETmqlPL7zuV6pXA==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_J9quYs5vR3uUazvw_B0c4Q" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span><span style="font-size:16px;">Technology is changing at an incredible pace and staying up to date is becoming more and more important in our competitive business world. Considering this, does it make sense for a business to spend a huge outlay of time and money every few years just to keep up? And once the upgrade is installed, how to you make sure the staff understand how to take full advantage of the new features? Would it make more sense to approach software as a subscription – spreading payments over the life of the software’s useful life – with rights to upgrade as new versions come out? Subscription licensing has become the primary choice for the large majority of our clients. It takes the responsibility of staying on top of software updates off the plate of upper management and makes it a recurring task of the IT department – an operational item, rather than a capital item that is usually tied to hardware upgrades or replacements. There are many benefits to this software model and it the interest of time, I have provided bullets outlining the advantages as listed by Microsoft below: ” Low Cost Option As a rental agreement OVS is a cost effective licensing agreement for small and medium sized companies. Access to Latest Versions of Microsoft Products OVS customers can automatically use the latest software available from Microsoft, ensuring they get the benefits of the best Microsoft has to offer. Pay According to Use Customers only pay for software actually installed. Each year, customers can increase and decrease the number of desktops as need be to support their business requirements...</span></span></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 01 Nov 2015 04:43:48 +0000</pubDate></item></channel></rss>