<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.com.sg/blogs/industrial-service/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services Singapore - Blog , Singapore IT Support</title><description>Managed IT Services Singapore - Blog , Singapore IT Support</description><link>https://www.brocent.com.sg/blogs/industrial-service</link><lastBuildDate>Sat, 13 Sep 2025 23:44:13 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[7 Transformative Technology Trends Changing the Way We Work]]></title><link>https://www.brocent.com.sg/blogs/post/7_transformative_technology_trends_changing_the_way_we_work</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-7-Transformative-Technology-V1.png"/>Technology is reshaping the world of work at an unprecedented pace.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4N1D6vzeTjKgrZM8-vLzYw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LrQG_RPtR22SMtuv8gofDw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Cj3k50SrSV2S-NuBpCxA6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_Cj3k50SrSV2S-NuBpCxA6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VRczP7uPT6G4FBK-ibqYHg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VRczP7uPT6G4FBK-ibqYHg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">7 Transformative Technology Trends Changing the Way We Work</span></h2></div>
<div data-element-id="elm_HWWVkPgvj6pRvugix19gjw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-7-Transformative-Technology-V1.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N9YDKoUIRoOu0iDazFELzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N9YDKoUIRoOu0iDazFELzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Technology is reshaping the world of work at an unprecedented pace. From artificial intelligence to web3, from the metaverse to the hybrid work model. We are witnessing a series of technological revolutions. They are transforming how we communicate, collaborate, create, and innovate. </p><p style="text-align:justify;">Let’s explore some of the most impactful technology trends that are changing the way we work in 2024 and beyond.&nbsp;</p></div></div>
</div><div data-element-id="elm_wZc7MSlip-ljmPYgu-sPyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wZc7MSlip-ljmPYgu-sPyw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Artificial Intelligence</span><br></h3></div>
<div data-element-id="elm_mRv9L8J4cYY9VsZ0FoLZRQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mRv9L8J4cYY9VsZ0FoLZRQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>AI and Generative AI are not just buzzwords. They are transforming the workplace. These technologies enable automation, allowing teams to handle mundane tasks more efficiently. They free up human resources for more creative and strategic endeavors. </p><p>AI is not a new concept, but it has become more powerful and accessible in recent years. This is thanks to advances in computing power, data availability, and algorithm development. </p><p>Artificial intelligence is now augmenting and automating various aspects of work. This includes data analysis, customer service, image creation, product design, and more. </p><p>But AI also poses significant challenges and risks. This includes ethical dilemmas, social implications, and workforce displacement. Thus, it's essential to adopt responsible and human-centric approaches to AI. As well as ensure that workers have the skills and support to adapt to the changing nature of work.</p></div></div>
</div><div data-element-id="elm_MZ2p018zMrpNF8_EbPJn_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MZ2p018zMrpNF8_EbPJn_A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Remote Collaboration Tools</span><br></h3></div>
<div data-element-id="elm_WfZ2uQOY7tbF3YOfV4BCZg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WfZ2uQOY7tbF3YOfV4BCZg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Advanced collaboration tools have facilitated the rise of remote work. These include video conferencing, project management software, and cloud-based document sharing platforms. </p><p>This technology empowers teams to collaborate seamlessly from different corners of the globe. These tools break down geographical barriers, allowing for efficient teamwork and real-time communication.</p></div></div>
</div><div data-element-id="elm_vY4e7qpFm4b5VevT4AiGBg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vY4e7qpFm4b5VevT4AiGBg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Hybrid Work Model</span><br></h3></div>
<div data-element-id="elm_XA6nIMNEZ3cjmZpyJ1LzUg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XA6nIMNEZ3cjmZpyJ1LzUg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>The hybrid work model is a term that describes the combination of remote and in-office work. This is not a new concept, but it has become more prevalent in the wake of the Covid-19 pandemic. </p><p>The hybrid work model offers many benefits, such as:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Increased productivity</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Reduced costs</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Improved work-life balance</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Enhanced employee satisfaction</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Improved employee retention</p><p>The hybrid work model is transforming the way we work. It requires workers to have new skills, tools, and strategies. For example, hybrid work requires workers to have several capabilities to work effectively. These include strong digital literacy, communication, collaboration, and self-management skills.</p></div></div>
</div><div data-element-id="elm_PVC5nMeXWzqeId5CBvHq-A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PVC5nMeXWzqeId5CBvHq-A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">4. Web3: The Decentralized Internet</font></font></span><br></h3></div>
<div data-element-id="elm_YNn9jExkSmxgmYYrcfk-HQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YNn9jExkSmxgmYYrcfk-HQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Web3 is a term that refers to the next generation of the internet. An internet based on decentralized technologies, such as:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Blockchain</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Cryptocurrencies</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Smart contracts</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Peer-to-peer networks</p><p>Web3 aims to create a more open, transparent, secure, and democratic internet. One where users have more control over their own data, identity, and digital assets.&nbsp; </p><p>Web3 also enables new forms of collaboration and value creation. This includes:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Decentralized autonomous organizations (DAOs)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Non-fungible tokens (NFTs)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Decentralized finance (DeFi)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Social tokens</p><div style="color:inherit;"><p>Web3 is transforming the way we work. It's creating new business models, platforms, and communities. These are designed to be more inclusive, participatory, and innovative.</p><p><b><i>Web3 has the potential to generate </i></b><a href="https://finance.yahoo.com/news/3-0-market-hit-49-085000627.html"><b><i>$49.10 billion</i></b></a><b><i> in economic value by 2030.&nbsp;</i></b></p></div></div></div>
</div><div data-element-id="elm_-MPkGts_DKY2SJ6uJr6D2w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-MPkGts_DKY2SJ6uJr6D2w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">5. Internet of Things (IoT) in the Workplace</font></font></span><br></h3></div>
<div data-element-id="elm_VQXi6vRfPLTnPB_s3yc3KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VQXi6vRfPLTnPB_s3yc3KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>IoT devices are creating smart and optimized workplaces. This includes smart thermostats that adjust office temperatures based on occupancy. As well as wearable devices that track employees' health and productivity. This connectivity enhances efficiency and reduces energy consumption. It also provides valuable data for informed decision-making.</p></div></div>
</div><div data-element-id="elm_PkGLfMkaL1f1oaeljQAtSw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PkGLfMkaL1f1oaeljQAtSw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">6. Augmented Reality (AR) and Virtual Reality (VR)</font></font></span><br></h3></div>
<div data-element-id="elm_OjJus8IbVsEvfrdznf4jOw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OjJus8IbVsEvfrdznf4jOw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>AR and VR technologies are revolutionizing training, design, and customer interactions. In the workplace, AR and VR offer immersive training experiences. These allow employees to learn complex tasks in a simulated environment. These technologies are also used in product design. This enables professionals to visualize and modify prototypes in real time. This drives faster innovation cycles.</p></div></div>
</div><div data-element-id="elm_VNBkBkpDkd0pJC1wLKAF5A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VNBkBkpDkd0pJC1wLKAF5A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Cybersecurity Advancements</span><br></h3></div>
<div data-element-id="elm_2pa7ONPgOaBICYMhk2LOUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pa7ONPgOaBICYMhk2LOUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>As digital technologies advance so do cybersecurity threats. Businesses are investing in advanced cybersecurity measures to protect sensitive data. As well as ensuring the privacy of employees and customers. </p><p>These innovations include biometric authentication and AI-driven threat detection. Cybersecurity advancements are crucial. They help companies safeguard digital assets and maintain trust in the online workspace.</p></div></div>
</div><div data-element-id="elm_5Ia-fZrHUqjTz3r4uQllcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5Ia-fZrHUqjTz3r4uQllcg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">The Impact on the Future of Work</span><br></h2></div>
<div data-element-id="elm_d6Imma_zsKyjeIzAibXBAQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_d6Imma_zsKyjeIzAibXBAQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>These transformative technology trends are not just fleeting novelties. They are shaping the future of work. Businesses that adapt and embrace these technologies gain a competitive edge. </p><p>Remote collaboration tools foster flexibility and work-life balance, appealing to the modern workforce. AI and automation enhance efficiency, reducing errors and operational costs. </p><p>IoT creates intelligent workspaces, enhancing employee well-being and environmental sustainability. AR and VR drive innovation, offering new ways to engage both employees and customers.</p></div></div>
</div><div data-element-id="elm_ti1c09PEnP4ZkGVMr48dpw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ti1c09PEnP4ZkGVMr48dpw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Challenges and Considerations</span><br></h2></div>
<div data-element-id="elm_6_3hPXGjRDzQvWJB9NEtBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6_3hPXGjRDzQvWJB9NEtBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">While these technologies bring immense benefits, they also pose challenges. Workforce training is essential to ensure employees can leverage these tools effectively. Additionally,&nbsp;</span></span><span style="color:inherit;">there are ethical considerations about data privacy and security. As well as the impact of automation on employment. Striking a balance between technological advancement and human welfare is crucial. Especially in this transformative era.</span></p></div>
</div><div data-element-id="elm_frDruPifXcfGnLlUKcRsew" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_frDruPifXcfGnLlUKcRsew"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Let Us Guide You Successfully Through Digital Transformation</span><br></h2></div>
<div data-element-id="elm_3JsngajbRr_JMkC330H1-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3JsngajbRr_JMkC330H1-w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Navigating new technologies can be complex. There are pitfalls that can waste time and money. Avoid this by working with our team of experts. We can help you customize your transformation to fit your business goals.</p><p>Give us a call today to schedule a chat.</p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/7-transformative-technology-trends-changing-the-way-we-work/" target="_blank"><b>The Technology Press.</b></a></span><b></b></div></div>
</div><div data-element-id="elm_HcMJ-WHVRUG2NqKcv33C0g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HcMJ-WHVRUG2NqKcv33C0g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 24 Jan 2024 06:12:32 +0000</pubDate></item><item><title><![CDATA[Have You Had Data Exposed in One of These Recent Data Breachese]]></title><link>https://www.brocent.com.sg/blogs/post/have_you_had_data_exposed_in_one_of_these_recent_data_breachese</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-Have-You-Had-Data1682644288428.png"/>Data breaches are an unfortunate part of life.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_nKiqxpQOSemVsmMesdZlUg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_OxpDs1V4ToKl5nCTH76sqA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_GrCmoRU4RO22pktpUICyLA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_H0LwtSGXTfO469unV0hxbQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_H0LwtSGXTfO469unV0hxbQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Have You Had Data Exposed in One of These Recent Data Breaches</span></h2></div>
<div data-element-id="elm_41sDHis3r60-bNpYHBk7pw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_41sDHis3r60-bNpYHBk7pw"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_41sDHis3r60-bNpYHBk7pw"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_41sDHis3r60-bNpYHBk7pw"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_41sDHis3r60-bNpYHBk7pw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-Have-You-Had-Data1682644288428.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_lxtFAUii6HCIN4ziT1_l5Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lxtFAUii6HCIN4ziT1_l5Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Make Sure Your Router is Secure</span></h3></div>
<div data-element-id="elm_2IulKcxJRLKgOa9fEnsXTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2IulKcxJRLKgOa9fEnsXTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life. And can have costly consequences for individuals. Hackers can steal identities and compromise bank accounts, just to name a couple.</p><p style="text-align:justify;">Cybercriminals breach about <a href="https://www.varonis.com/blog/data-breach-statistics">4,800 websites</a> every month with form jacking code. It has become all too common to hear of a large hotel chain or social media company exposing customer data. </p><p style="text-align:justify;">Hackers can breach your personal information and passwords without you knowing it. And the time from breach to notification of the breach can be lengthy. One example is the data breach of CafePress. This is a popular online retailer that prints personalized items. </p><p style="text-align:justify;">CafePress suffered a data breach in February 2019. That breach exposed millions of names and addresses, security questions, and more. Hackers also breached social security numbers that weren’t encrypted.</p><p style="text-align:justify;">As mentioned, the breach happened in February. But many consumers weren’t notified until late summer. The FTC recently <a href="https://www.ftc.gov/news-events/news/press-releases/2022/03/ftc-takes-action-against-cafepress-data-breach-cover">took action</a> against the company. This was due to its careless security practices. </p><p style="text-align:justify;">The point is that months or years can go by without you knowing about compromised data. Unless you happen to look at the right website, you may not even realize it. Those breached password features in browsers are helpful. But what if you have other information beyond a password compromised? </p><p style="text-align:justify;">It’s best to protect yourself with some knowledge. We’ll help by listing several recent breaches. If you’ve interacted with any of these companies, you’ll want to take steps to protect yourself from the fallout.</p></div></div>
</div><div data-element-id="elm_tLwxVquEXPYiIBpYntaHMw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_tLwxVquEXPYiIBpYntaHMw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Recent Breaches of Personal Information That May Impact You</span></h2></div>
<div data-element-id="elm_-YY_2XRzYfgnjme0mx6hXw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-YY_2XRzYfgnjme0mx6hXw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Microsoft Customer Data Breach</span></h3></div>
<div data-element-id="elm_jzv-iEwq-upyzlXuLKUVaA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jzv-iEwq-upyzlXuLKUVaA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">On October 19, 2022, <a href="https://www.bleepingcomputer.com/news/security/microsoft-data-breach-exposes-customers-contact-info-emails/">Microsoft announced</a> a breach that exposed customer data. A misconfigured server was to blame. The breach exposed certain business transaction data. It’s thought that this breach could have affected more than 65,000 entities worldwide.</p></div></div>
</div><div data-element-id="elm_j5QUw0HM9XxC7jUidgyRgQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_j5QUw0HM9XxC7jUidgyRgQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2.5 Million Records Exposed in a Student Loan Breach</span></h3></div>
<div data-element-id="elm_eb2gfR7jRXbEYqcELwJLsw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eb2gfR7jRXbEYqcELwJLsw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Did you get a student loan from EdFinancial and the Oklahoma Student Loan Authority (OSLA)? If so, you could be in trouble. The organizations notified impacted individuals by letter in July 2022. </p><p>The personal information at risk included:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Social security numbers:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Email addresses</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Home addresses</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Phone numbers. </p><p>The breach compromised the data of over <a href="https://threatpost.com/student-loan-breach-exposes-2-5m-records/180492/">2.5 million</a> loan recipients.</p></div></div>
</div><div data-element-id="elm_yy22sdmvd4GxEBfEHCQrAA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_yy22sdmvd4GxEBfEHCQrAA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">U-Haul Data Breach of 2.2 Million Individuals’ Data</span></h3></div>
<div data-element-id="elm_jUlYbjXhpL_YVmV2H3c9AQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jUlYbjXhpL_YVmV2H3c9AQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Large rental firm <a href="https://www.prnewswire.com/news-releases/arnold-law-firm-u-haul-data-breach-leaves-customers-exposed-301631639.html">U-Haul</a> is a household name. It also just had a major data breach. It notified clients in August of 2022 of a compromise of some rental contracts. The contacts in question were between November 5, 2021, and April 5, 2022.</p><p style="text-align:justify;">The breach exposed names, driver’s license numbers, and state identification numbers. It affected over 2.2 million individuals that rented vehicles from the company.</p></div></div>
</div><div data-element-id="elm_DYd62mhjrCTELI43pUM-eg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DYd62mhjrCTELI43pUM-eg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Neopets Breach May Have Compromised 69 Million Accounts</span></h3></div>
<div data-element-id="elm_zjxm1-aGF26By8zMPc9RHA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zjxm1-aGF26By8zMPc9RHA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">You wouldn’t suspect a cute site like Neopets to be a cybersecurity risk. But users of the platform got a rude awakening due to a breach of the service. An estimated <a href="https://www.gamesindustry.biz/neopets-breach-allegedly-compromises-69m-accounts">69 million</a> accounts may have had emails and passwords leaked.</p><p style="text-align:justify;">The full stolen Neopet database and copy of the source code were being offered for sale for about $94,500.</p></div></div>
</div><div data-element-id="elm_nKPbKC90MGnafGg6-jtx6Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_nKPbKC90MGnafGg6-jtx6Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">One Employee Computer Causes a Marriott Breach</span></h3></div>
<div data-element-id="elm_srh10imZFgnHCyd_2v0ARw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_srh10imZFgnHCyd_2v0ARw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Hotel giant Marriott suffered <a href="https://www.databreaches.net/exclusive-marriott-hacked-again-yes-heres-what-we-know/">another breach</a> in July 2022. It blamed a single unsecured employee computer. About 300-400 individuals had data leaked. This data included credit card numbers and other confidential information.</p><p style="text-align:justify;">Unfortunately, the company shows a pattern of <a href="https://www.theregister.com/2022/07/06/marriott_hotels_suffer_yet_another/">poor cybersecurity</a>. Within the last four years, it has suffered three separate breaches. That’s enough to want to pay in cash or use a pre-paid card if you stay there.&nbsp;</p></div></div>
</div><div data-element-id="elm_u5M9Mt5OIePTf86f2Wg_Kw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_u5M9Mt5OIePTf86f2Wg_Kw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Shield Health Care Group Exposes Up to 2 Million Records</span></h3></div>
<div data-element-id="elm_kGqnG7HTg_aycL0uEZX2kg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_kGqnG7HTg_aycL0uEZX2kg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">In March of 2022, Shield Health Care Group detected a breach. This Massachusetts-based company found that hackers breached up to <a href="https://shields.com/notice-of-data-security-incident/">2 million</a> customer records. This includes medical records, social security numbers, and other sensitive personal data.&nbsp;</p></div></div>
</div><div data-element-id="elm_CF7zq8is8wEI4VzUe-zV-g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CF7zq8is8wEI4VzUe-zV-g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Flagstar Bank Takes 6 Months to Identify Individuals Affected in a Breach</span></h3></div>
<div data-element-id="elm_y4kwxe5gy1qxP4ApYzpu9A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_y4kwxe5gy1qxP4ApYzpu9A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">In December of 2021, Flagstar Bank suffered a breach. It wasn’t until <a href="https://www.housingwire.com/articles/flagstar-reports-data-breach-affecting-1-5-million-clients/">6 months later</a> that it identified the individuals affected. And the impact was large. It included exposed social security numbers. The hack impacted about 1.5 million customers.</p></div></div>
</div><div data-element-id="elm_J72WGgj1Jqn64I-9gtm4Nw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_J72WGgj1Jqn64I-9gtm4Nw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">8.2 million Current and Former Customers of Block Compromised</span></h3></div>
<div data-element-id="elm_LZQvfeVJo-Zsme9UOlohTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LZQvfeVJo-Zsme9UOlohTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Block was formerly known as Square, a popular payment processing platform. It announced in April of 2022 that it <a href="https://www.yahoo.com/video/block-notifies-8-2m-customers-134451130.html">was breached</a> the previous December. A former employee accessed customer names and brokerage account numbers. Some accounts also had other stock trading information accessed.&nbsp; </p><p style="text-align:justify;">About 8.2 million current and former customers had their data exposed.</p></div></div>
</div><div data-element-id="elm_kSjQFcabI9-qwI-7MOlC3A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_kSjQFcabI9-qwI-7MOlC3A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Crypto.com Breach Nets Hackers Over $30 Million</span></h3></div>
<div data-element-id="elm_LqdIDgx_Q6ZT-17smmNHYA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LqdIDgx_Q6ZT-17smmNHYA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Cryptocurrency may be hot at the moment, but it’s very susceptible to cyberattacks. In January 2022, over <a href="https://www.vice.com/en/article/g5qj9j/cryptocom-says-incident-was-actually-dollar30-million-hack">483 users</a> had their Crypto.com wallets breached. </p><p style="text-align:justify;">The criminals made it past two-factor authentication, which is usually quite effective. They stole about $18 million in bitcoin and $15 million in Ethereum and other cryptocurrencies.</p></div></div>
</div><div data-element-id="elm_LUqqWY2dp0jXNtn6PCpO2A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LUqqWY2dp0jXNtn6PCpO2A"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">How Secure Are Your Passwords?</span></h2></div>
<div data-element-id="elm_CGPn_f42Jt40oWXhMHaWyA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CGPn_f42Jt40oWXhMHaWyA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>There are many solutions that can help you better manage and secure your passwords. Give us a call to learn more about protecting your personal data from a breach. </p><p><span style="font-size:12pt;">&nbsp;</span></p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/have-you-had-data-exposed-in-one-of-these-recent-data-breaches/" target="_blank"><b>The Technology Press.</b></a></span><b></b></div></div>
</div><div data-element-id="elm_BkvRwoj_QLuaSha77vaH5A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BkvRwoj_QLuaSha77vaH5A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 28 Apr 2023 01:24:47 +0000</pubDate></item><item><title><![CDATA[Have You Had Data Exposed in One of These Recent Data Breaches]]></title><link>https://www.brocent.com.sg/blogs/post/have_you_had_data_exposed_in_one_of_these_recent_data_breaches</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-Have-You-Had-Data1680228629884.png"/>There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_7VwS6j9rR1uQM3DAr91qyg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_CnWsz2ObSrSWnCqszrt9bQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_LdFQeKSMRB6AfTGXcGRkmw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_sbnT8OYpRD2IhMzXsLVteQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_sbnT8OYpRD2IhMzXsLVteQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Have You Had Data Exposed in One of These Recent Data Breaches</span></h2></div>
<div data-element-id="elm_3o5D19rxhdy9hgOqr5nnlA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_3o5D19rxhdy9hgOqr5nnlA"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_3o5D19rxhdy9hgOqr5nnlA"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_3o5D19rxhdy9hgOqr5nnlA"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_3o5D19rxhdy9hgOqr5nnlA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-Have-You-Had-Data1680228629884.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_ypP3OrYDaGZ2mWRpBw2_sg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ypP3OrYDaGZ2mWRpBw2_sg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Make Sure Your Router is Secure</span></h3></div>
<div data-element-id="elm_Zk8vtn12Si2CKCKFJ4NXQA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Zk8vtn12Si2CKCKFJ4NXQA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">There’s a reason that browsers like Edge have added breached password notifications. Data breaches are an unfortunate part of life. And can have costly consequences for individuals. Hackers can steal identities and compromise bank accounts, just to name a couple.</p><p style="text-align:justify;">Cybercriminals breach about <a href="https://www.varonis.com/blog/data-breach-statistics">4,800 websites</a> every month with form jacking code. It has become all too common to hear of a large hotel chain or social media company exposing customer data. </p><p style="text-align:justify;">Hackers can breach your personal information and passwords without you knowing it. And the time from breach to notification of the breach can be lengthy. One example is the data breach of CafePress. This is a popular online retailer that prints personalized items. </p><p style="text-align:justify;">CafePress suffered a data breach in February 2019. That breach exposed millions of names and addresses, security questions, and more. Hackers also breached social security numbers that weren’t encrypted.</p><p style="text-align:justify;">As mentioned, the breach happened in February. But many consumers weren’t notified until late summer. The FTC recently <a href="https://www.ftc.gov/news-events/news/press-releases/2022/03/ftc-takes-action-against-cafepress-data-breach-cover">took action</a> against the company. This was due to its careless security practices. </p><p style="text-align:justify;">The point is that months or years can go by without you knowing about compromised data. Unless you happen to look at the right website, you may not even realize it. Those breached password features in browsers are helpful. But what if you have other information beyond a password compromised? </p><p style="text-align:justify;">It’s best to protect yourself with some knowledge. We’ll help by listing several recent breaches. If you’ve interacted with any of these companies, you’ll want to take steps to protect yourself from the fallout.</p></div></div>
</div><div data-element-id="elm_XJrqr8eFGbqGKH59SCc88w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XJrqr8eFGbqGKH59SCc88w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Recent Breaches of Personal Information That May Impact You</span></h2></div>
<div data-element-id="elm_Nm0mUu5i7KRvwUQaKulXrw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Nm0mUu5i7KRvwUQaKulXrw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Microsoft Customer Data Breach</span></h3></div>
<div data-element-id="elm_X-97ivNvCk8H7j3QCaQPxg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_X-97ivNvCk8H7j3QCaQPxg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">On October 19, 2022, <a href="https://www.bleepingcomputer.com/news/security/microsoft-data-breach-exposes-customers-contact-info-emails/">Microsoft announced</a> a breach that exposed customer data. A misconfigured server was to blame. The breach exposed certain business transaction data. It’s thought that this breach could have affected more than 65,000 entities worldwide.</p></div></div>
</div><div data-element-id="elm_XSF_StlhsUyCKmjH59aDkQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_XSF_StlhsUyCKmjH59aDkQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2.5 Million Records Exposed in a Student Loan Breach</span></h3></div>
<div data-element-id="elm_dWNGDE92Hd_JEvDlEv5bew" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dWNGDE92Hd_JEvDlEv5bew"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Did you get a student loan from EdFinancial and the Oklahoma Student Loan Authority (OSLA)? If so, you could be in trouble. The organizations notified impacted individuals by letter in July 2022. </p><p>The personal information at risk included:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Social security numbers:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Email addresses</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Home addresses</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Phone numbers. </p><p>The breach compromised the data of over <a href="https://threatpost.com/student-loan-breach-exposes-2-5m-records/180492/">2.5 million</a> loan recipients.</p></div></div>
</div><div data-element-id="elm_FLlGGC68yQJqkm4_TNje8w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FLlGGC68yQJqkm4_TNje8w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">U-Haul Data Breach of 2.2 Million Individuals’ Data</span></h3></div>
<div data-element-id="elm_MyGJQSyk3Q0KszPLNvoYwA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MyGJQSyk3Q0KszPLNvoYwA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Large rental firm <a href="https://www.prnewswire.com/news-releases/arnold-law-firm-u-haul-data-breach-leaves-customers-exposed-301631639.html">U-Haul</a> is a household name. It also just had a major data breach. It notified clients in August of 2022 of a compromise of some rental contracts. The contacts in question were between November 5, 2021, and April 5, 2022.</p><p style="text-align:justify;">The breach exposed names, driver’s license numbers, and state identification numbers. It affected over 2.2 million individuals that rented vehicles from the company.</p></div></div>
</div><div data-element-id="elm_EZPAr7z38DSD5qH9ZdPQjg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EZPAr7z38DSD5qH9ZdPQjg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Neopets Breach May Have Compromised 69 Million Accounts</span></h3></div>
<div data-element-id="elm_5B-agHadn8bR13DCLUVCGQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5B-agHadn8bR13DCLUVCGQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">You wouldn’t suspect a cute site like Neopets to be a cybersecurity risk. But users of the platform got a rude awakening due to a breach of the service. An estimated <a href="https://www.gamesindustry.biz/neopets-breach-allegedly-compromises-69m-accounts">69 million</a> accounts may have had emails and passwords leaked.</p><p style="text-align:justify;">The full stolen Neopet database and copy of the source code were being offered for sale for about $94,500.</p></div></div>
</div><div data-element-id="elm_VMDPYQI8DJJDP2mdzY5g5A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VMDPYQI8DJJDP2mdzY5g5A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">One Employee Computer Causes a Marriott Breach</span></h3></div>
<div data-element-id="elm_zA-hBcjYJC6j9MJNHNvztw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zA-hBcjYJC6j9MJNHNvztw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Hotel giant Marriott suffered <a href="https://www.databreaches.net/exclusive-marriott-hacked-again-yes-heres-what-we-know/">another breach</a> in July 2022. It blamed a single unsecured employee computer. About 300-400 individuals had data leaked. This data included credit card numbers and other confidential information.</p><p style="text-align:justify;">Unfortunately, the company shows a pattern of <a href="https://www.theregister.com/2022/07/06/marriott_hotels_suffer_yet_another/">poor cybersecurity</a>. Within the last four years, it has suffered three separate breaches. That’s enough to want to pay in cash or use a pre-paid card if you stay there.&nbsp;</p></div></div>
</div><div data-element-id="elm_L9shUg_PK9zelWJtnLTtzw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_L9shUg_PK9zelWJtnLTtzw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Shield Health Care Group Exposes Up to 2 Million Records</span></h3></div>
<div data-element-id="elm_LckL7GrOos9sIWzjpN7ivA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LckL7GrOos9sIWzjpN7ivA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">In March of 2022, Shield Health Care Group detected a breach. This Massachusetts-based company found that hackers breached up to <a href="https://shields.com/notice-of-data-security-incident/">2 million</a> customer records. This includes medical records, social security numbers, and other sensitive personal data.&nbsp;</p></div></div>
</div><div data-element-id="elm_TWauehEieaYk2LWEdscoRA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_TWauehEieaYk2LWEdscoRA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Flagstar Bank Takes 6 Months to Identify Individuals Affected in a Breach</span></h3></div>
<div data-element-id="elm_qUz0fHQmsJeI5H-mJ4f9zw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qUz0fHQmsJeI5H-mJ4f9zw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">In December of 2021, Flagstar Bank suffered a breach. It wasn’t until <a href="https://www.housingwire.com/articles/flagstar-reports-data-breach-affecting-1-5-million-clients/">6 months later</a> that it identified the individuals affected. And the impact was large. It included exposed social security numbers. The hack impacted about 1.5 million customers.</p></div></div>
</div><div data-element-id="elm_MQx1um2wPJTOx_JyfQY4Lg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MQx1um2wPJTOx_JyfQY4Lg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">8.2 million Current and Former Customers of Block Compromised</span></h3></div>
<div data-element-id="elm_Z7g6j8fpjmzrw5AF0cIOjQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Z7g6j8fpjmzrw5AF0cIOjQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Block was formerly known as Square, a popular payment processing platform. It announced in April of 2022 that it <a href="https://www.yahoo.com/video/block-notifies-8-2m-customers-134451130.html">was breached</a> the previous December. A former employee accessed customer names and brokerage account numbers. Some accounts also had other stock trading information accessed.&nbsp; </p><p style="text-align:justify;">About 8.2 million current and former customers had their data exposed.</p></div></div>
</div><div data-element-id="elm_DsLVffQlX7bn-QAnQYj8yA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DsLVffQlX7bn-QAnQYj8yA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Crypto.com Breach Nets Hackers Over $30 Million</span></h3></div>
<div data-element-id="elm_TQBRwL4IpTrFAsKUsxApwA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_TQBRwL4IpTrFAsKUsxApwA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Cryptocurrency may be hot at the moment, but it’s very susceptible to cyberattacks. In January 2022, over <a href="https://www.vice.com/en/article/g5qj9j/cryptocom-says-incident-was-actually-dollar30-million-hack">483 users</a> had their Crypto.com wallets breached. </p><p style="text-align:justify;">The criminals made it past two-factor authentication, which is usually quite effective. They stole about $18 million in bitcoin and $15 million in Ethereum and other cryptocurrencies.</p></div></div>
</div><div data-element-id="elm_0lNrH3G83085PwFsnM9hYg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_0lNrH3G83085PwFsnM9hYg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">How Secure Are Your Passwords?</span></h2></div>
<div data-element-id="elm_3WUWJEFvI86rDOcQmWT86g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3WUWJEFvI86rDOcQmWT86g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>There are many solutions that can help you better manage and secure your passwords. Give us a call to learn more about protecting your personal data from a breach. </p><p><span style="font-size:12pt;">&nbsp;</span></p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/have-you-had-data-exposed-in-one-of-these-recent-data-breaches/" target="_blank"><b>The Technology Press.</b></a></span><b></b></div></div>
</div><div data-element-id="elm_B30QALXkSoCBALU_ijWvuQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_B30QALXkSoCBALU_ijWvuQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 31 Mar 2023 02:20:48 +0000</pubDate></item><item><title><![CDATA[Why You Need to Think Twice Before Using Lensa AI & Other Self-Portrait Apps]]></title><link>https://www.brocent.com.sg/blogs/post/why_you_need_to_think_twice_before_using_lensa_ai_other_self_portrait_apps</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Think-Twice-Before-Using-Lensa-AI-V2.png"/>It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_o2RWm9vhTcmL-MimLlvGeQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_esBxPcX8RraLcOU1SffQUQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_p4uI8EANQC2G7MuHpwcoPg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_rDJYWccLTIa8dwqY3rDuYw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_rDJYWccLTIa8dwqY3rDuYw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Why You Need to Think Twice Before Using Lensa AI &amp; Other Self-Portrait Apps</span></h2></div>
<div data-element-id="elm_govAKfaJCb2kiPlEFxMPOw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_govAKfaJCb2kiPlEFxMPOw"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_govAKfaJCb2kiPlEFxMPOw"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_govAKfaJCb2kiPlEFxMPOw"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_govAKfaJCb2kiPlEFxMPOw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Think-Twice-Before-Using-Lensa-AI-V2.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_oxhz2AKmRJSJqIiu4F23Ow" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_oxhz2AKmRJSJqIiu4F23Ow"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>It’s a common theme. You begin seeing these amazing CGI images of your friends on Facebook or Instagram. You think, “How can I make one?”</p><p>Filters and self-portrait apps have come a long way. You can now make yourself look like Hollywood’s version of a character in the next hit animated film. It still kind of looks like you, only a dream version with “perfect” hair, skin, and facial features.</p><p>The latest of these modern vanity marvels to make the rounds is Lensa AI. You upload about 10 photos so the app can feed that data into its AI algorithm. Then, once it maps your facial features, it generates several fantasy selfies of you.</p><p>These magical avatars don’t come for free though. While you can download the app for free and use it in a limited fashion, you need to pay to do more. To get unlimited access for one week, it’s $2.99. There are <a href="https://apps.apple.com/us/app/lensa-ai-photo-video-editor/id1436732536">several pricing tiers</a> for its avatar packs and membership access. These range from $3.99 for Avatars Pack 1 to $35.99 for full membership. </p><p>It sounds like a little harmless digital fun, right? That’s what many companies making apps like this like you to think. Vanity is an easy sell, and who doesn’t want to have a fabulous profile pic?</p><p>But for Lensa AI and several similar self-portrait apps, you’re paying more than you know. The cost comes from the data privacy rights you’re giving up. And these can go far beyond the app itself.</p></div></div>
</div><div data-element-id="elm_F1oUUkpsfkAAkiBz2M3YUw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_F1oUUkpsfkAAkiBz2M3YUw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why Worry About Data Privacy with Lensa AI &amp; Similar Apps?</span></h2></div>
<div data-element-id="elm_LZDIjNuxML-opXBTq0mDvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_LZDIjNuxML-opXBTq0mDvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Thanks to laws like GDPR, software and app developers need to tell you what they do with your data. Looking at the app at the Mac App Store, a few alarming things jump out.</p></div></div>
</div><div data-element-id="elm_FmPeS55elbCMSGvc-gTiDQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_FmPeS55elbCMSGvc-gTiDQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Data Used to Track You</span></h3></div>
<div data-element-id="elm_xXSzsjFrQRisPq3pVuQ0Jg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_xXSzsjFrQRisPq3pVuQ0Jg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Once you download the Lensa AI app, it can track your phone activity. The app store states that the app may use purchases and unique identifiers to track you. And this doesn’t mean only tracking you while in Lensa AI. It can track you across websites and apps owned by other companies.&nbsp;</p></div></div>
</div><div data-element-id="elm_19ujkDODekX9PAHUwQDXFQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_19ujkDODekX9PAHUwQDXFQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Data Collected</span></h3></div>
<div data-element-id="elm_IPuIMBtFJhdn5nT1BEQY4A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IPuIMBtFJhdn5nT1BEQY4A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Lensa AI scours your device for a lot of different data points. By downloading it, you permit it to do this. Some of the tracking links to you personally (such as linked to your name, IP address, or phone number). It collects a lot of other data, but not with your name or another identifier on it.&nbsp; </p><p>Data collected and linked to you:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>User content (such as the images you upload)</p><p>Data collected, but not linked to you: </p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Purchases you make on websites or apps</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Usage data for apps, etc.</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Identifiers (this isn’t specified, but could mean things like city or gender)</p><p style="margin-left:36pt;"><span style="font-weight:bold;">·<span style="font-size:7pt;">&nbsp; </span></span>Diagnostics from your device</p></div></div>
</div><div data-element-id="elm_zFjQcz4yHihaxrh7LXY9iA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_zFjQcz4yHihaxrh7LXY9iA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Loss of Rights to Your Uploaded Images</span></h3></div>
<div data-element-id="elm_tBBhopz-gqZa1Fgz1-sF1w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_tBBhopz-gqZa1Fgz1-sF1w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>What apps like Lensa AI do with your data is a grey area. Many tech companies, such as Facebook, have been known to act irresponsibly with user data. Many are purposely vague in their terms and conditions, leaving the door open.</p><p>One section from the <a href="https://lensa-ai.com/terms">Lensa AI Terms</a> that users agree to states the following:</p><p>“…solely for the purposes of operating or improving Lensa, you grant us a time-limited, revocable, non-exclusive, royalty-free, worldwide, fully-paid, transferable, sub-licensable license to use, reproduce, modify, distribute, create derivative works of your User Content, without any additional compensation to you…”</p><p>For the sole purpose of “operating” Lensa, could mean anything. It could mean that to make more money to operate the business, the company needs to use your images. Note that it also states it can modify, distribute, etc. YOUR user content.</p></div></div>
</div><div data-element-id="elm_3qvkjfmPdlhssaGQvRk77g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3qvkjfmPdlhssaGQvRk77g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Things You Can Do to Protect Your Data Privacy</span><br></h2></div>
<div data-element-id="elm_oVEj8XbkHIFpfg2Jdpx6TA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_oVEj8XbkHIFpfg2Jdpx6TA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Don’t Immediately Jump on Every Fad</span></h3></div>
<div data-element-id="elm_b2RUPN0CeJIzFISOsUI_ng" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b2RUPN0CeJIzFISOsUI_ng"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">This one may be hard when you see all your friends using a new app. It’s natural to want to be a part of that. But try waiting a week. Most likely those avatar images from the latest selfie app won’t be blowing up your feed anymore.</span></span><br></p></div>
</div><div data-element-id="elm_DooVt09bLoKpuakicf56ag" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DooVt09bLoKpuakicf56ag"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Read App Terms &amp; Conditions</span></h3></div>
<div data-element-id="elm_YjcZajVJ8rfoNi3Sc97Liw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YjcZajVJ8rfoNi3Sc97Liw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Take the time to read an app’s terms. You are often giving up more data privacy rights than you realize. This includes giving an app the ability to track just about everything you do on your device. Be aware of what’s at risk before you download a new app.</p></div></div>
</div><div data-element-id="elm_7lex6CsvfbuFmrzYgCAmwQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7lex6CsvfbuFmrzYgCAmwQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Restrict Data Collection</span></h3></div>
<div data-element-id="elm_RrAz_W6ZDYtc0ADOT5NL2Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RrAz_W6ZDYtc0ADOT5NL2Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>If you can’t resist an app’s charms, at least make it as secure as possible. This includes taking the time to restrict its data collection features, where possible.</p><p>Use your phone’s privacy and security settings to turn off data sharing. For the Lensa AI app, you can also contact the company to request that it delete your data from its servers. Its <a href="https://lensa-ai.com/privacy">privacy policy</a> states to email privacy@lensa-ai.com for questions and concerns.</p></div></div>
</div><div data-element-id="elm_K7mYQYu8CHoo_tuug_Ch5Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_K7mYQYu8CHoo_tuug_Ch5Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Get a Device Privacy Checkup</span></h2></div>
<div data-element-id="elm_XZhYIHm4Nef1zuRb9QooLg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XZhYIHm4Nef1zuRb9QooLg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>The more apps you use, the more complicated data privacy can get. Don’t leave it to chance. We’ll be happy to help. Give us a call today to schedule a device privacy checkup. </p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/why-you-need-to-think-twice-before-using-lensa-ai-other-self-portrait-apps/" target="_blank"><b>The Technology Press.</b></a></span></div></div>
</div><div data-element-id="elm_h1sBga5cQEmSUZ7MxiS-Mw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_h1sBga5cQEmSUZ7MxiS-Mw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 24 Mar 2023 05:41:33 +0000</pubDate></item><item><title><![CDATA[Field Support Service - Code of Conduct II]]></title><link>https://www.brocent.com.sg/blogs/post/COC_NotDo</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/images/pexels-photo-313691.jpeg"/>BROCENT FSS (Field Service &Support) team manages all resources in the APAC region. The whole teams delivers the onsite Ad-hoc support, Project based IMAC activities, and Full time Deskside customer support. Important for all team members to know What shall Not Do.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eUa4D_qzSP-3IjO8LeCBdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uFMSIZreQha7eXb2ky0onw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_08dofoH7RrWD4SwyC7FVog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pO3xVc4wQ7SpBIAUTsbtvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pO3xVc4wQ7SpBIAUTsbtvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><ul><div><ol><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not share or print passwords.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not include passwords in emails.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not publish password lists on third party public website.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not leave your computer unlocked when you step away.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not use personal email or employer email domains to contact End User.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not discuss information about your employer or employment conditions, inc. salary.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not discuss disagreement with BROCENT/Customer/End Customer processes.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not publish Customer processes and documents on third party public website.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Except where expressly permitted in writing, do not use portable media to access, transfer or maintain customer data.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not hire Staff without proper background checks.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not use Staff that are not employed or contracted by you.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not interfere in conversations amongst End Users.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not share your opinion about BROCENT/Customer/End Customer's organisation.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not discuss political issues, religious issues or beliefs.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not discuss any challenges you encounter in the service with the End Customer/End Users.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not ask Customer how to carry out tasks. Contact your BROCENT representative.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not be too sociable with End Customer/End User.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not carry firearms, weapons, arms and ammunitions to Customer/End Customer premises or while attending Tickets.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not listen to music, play games while working at Customer/End Customer premises/attending the Ticket.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not sit in the customer area when the Service Desk is unable to take your call. Find a quieter area, if possible.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not come to End Customer premises/attend a Ticket under the influence of alcohol/drugs.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not eat at the desk, or while attending Tickets.</span></li><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Do not use personal laptop to connect to Customer/End Customer’s network unless specifically asked to do so in writing by the BROCENT service desk, Customer or End Customer. If using your own computer, ensure it has up to date anti-virus and firewall with the most recent version and interim releases of virus definition files.</span></li></ol></div></ul></div>
</div><div data-element-id="elm_0UV0hSkaQaGA9iS14TcRTw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 26 Dec 2022 07:41:14 +0000</pubDate></item><item><title><![CDATA[What Shall I Do - Code of Conduct]]></title><link>https://www.brocent.com.sg/blogs/post/COC_ToDo</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/images/pexels-photo-7693246.jpeg"/>BROCENT FSS (Field Service &Support) team manages all resources in the APAC region. The whole teams delivers the onsite Ad-hoc support, Project based IMAC activities, and Full time Deskside customer support. Important for all team members to know What shall Do]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_eUa4D_qzSP-3IjO8LeCBdQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uFMSIZreQha7eXb2ky0onw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_08dofoH7RrWD4SwyC7FVog" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_pO3xVc4wQ7SpBIAUTsbtvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pO3xVc4wQ7SpBIAUTsbtvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div><div><ol><li style="text-align:justify;"><span style="font-size:17px;color:rgb(0, 0, 0);">Be respectful, polite and professional.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Use agreed method of communication (telephone/email/chat) to contact End User.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">For email communications with End User, use only End Customer’s domain.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Identify and represent yourself as an BROCENT employee.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Take care of personal hygiene and appearance.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Adhere to End Customer dress code policy.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Adhere to BROCENT’s and Customer/End Customer’s information security policies and processes. </span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Engineer computers must have latest security patches installed.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Ensure your computers have password and screen saver controls and automatic lock when idle.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">When accessing, transmitting or maintaining End User data, the engineer should adhere to BROCENT, Customer and/or End Customer’s policies. Security breaches must be reported using secured and encrypted file transfer.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Be and active participant of the service desk, sharing innovative ideas to improve business.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">If meeting a VIP, be sure to schedule an appointment, be on time and dress smart.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">When completing an IMACD Ticket, ensure that you follow the process detailed within the Ticket. Keep the area tidy and organized.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Always update Tickets upon completion within ITSM Tool and ensure BROCENT SPOC are aware of your time of leaving the premises.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Inform BROCENT if End User or Customer ask you to carry out additional tasks whilst on site.</span></li><li style="text-align:justify;"><span style="color:rgb(0, 0, 0);">Use your tool kits and refrain from asking the End User for tools.</span></li></ol><ul></ul></div></div></div></div>
</div><div data-element-id="elm_0UV0hSkaQaGA9iS14TcRTw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 26 Dec 2022 06:57:22 +0000</pubDate></item><item><title><![CDATA[Bulk Hours -Financial IT Support]]></title><link>https://www.brocent.com.sg/blogs/post/Token_Support_Finance_Sector</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/images/g7dbf7bf5b7fef5001ad010944efa814b5e2fa0a2200b3dba2eb3591b49da90116b2d2ad745c0ef66f8ce457c11d80f5afb077a784de8ac2a67db5868585df1b8_1280.jpg"/>BROCENT brings you an integrated IT-managed service provider who will be the virtual IT department in APAC regions to design, implement, and support all of the technologies. BROCENT offers the preventive IT support plan to keep the servers running 24 hours a day]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Jku25G2PRmmeLPwH_jyubg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_QPUJRr6hQXOcTs2wT6GWjQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_F-x4FAXGSrCUHYiOwIg2wA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Uad8Q2RIRHiNYGQH09_Kow" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Uad8Q2RIRHiNYGQH09_Kow"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div><div style="text-align:justify;"><span style="color:rgb(0, 0, 0);">People in the financial sector know that their technology&nbsp;infrastructure is the foundation for the evolution of the core business&nbsp;offering and the customer experience.&nbsp;Financial institutions depend on streamlined and dependableIT-managed services to receive the responsive and high-quality IT solutions like BROCENT to maintain an affordable IT operation and a highly secured IT infrastructure to serve and safeguard the customer's digital assets from cyberattacks.&nbsp;</span></div><div style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><br></span></div><div style="text-align:justify;"><span style="color:rgb(0, 0, 0);">BROCENT brings you an integrated IT-managed service provider&nbsp;who will be the virtual IT department in APAC regions to design, implement, and&nbsp;support all of the technologies. BROCENT offers the preventive IT support plan&nbsp;to keep the servers running 24 hours a day, plans software upgrades, security&nbsp;patches management, penetration &amp;vulnerabilities control, user access control,&nbsp;system change management, data backup, and cloud edge security and so on.</span></div><div style="text-align:justify;"><span style="color:rgb(0, 0, 0);"><br></span></div><div style="text-align:justify;"><div><div><span style="color:rgb(0, 0, 0);">No matter where the users are working in, and how small the&nbsp;local business unit is, the bulk hours support package covers24x7 IT help desk,&nbsp;that client may request the IT service by emailing our 24x7 help desk, or call&nbsp;the hotline, or logging a ticket via an online portal.&nbsp;We respond to the service request within 15 minutes,&nbsp;initiate the remote IT setup, or assign a certified IT engineer onsite&nbsp;troubleshooting. Once the satisfied&nbsp;service is delivered and accepted by the client, we’ll get the incident mark as resolved&nbsp;and closed.</span></div><div><span style="color:rgb(0, 0, 0);"><br></span></div><div><div><div><span style="color:rgb(0, 0, 0);">We Service Delivery Manager prepares the Token Balance&nbsp;Report and Monthly Service Governance Meeting to improve the service quality&nbsp;jointly with customer.</span></div><div><span style="color:rgb(0, 0, 0);"><br></span></div><div><span style="color:rgb(0, 0, 0);">That's how BROCENT works</span><span style="color:inherit;"><br></span></div></div></div></div></div></div></div>
</div><div data-element-id="elm_dZaV3AHCIDTFO3YmqMBglQ" data-element-type="video" class="zpelement zpelem-video "><style type="text/css"> [data-element-id="elm_dZaV3AHCIDTFO3YmqMBglQ"].zpelem-video{ border-radius:1px; } </style><div class="zpvideo-container zpiframe-align-left zpiframe-mobile-align- zpiframe-tablet-align-"><iframe class="zpvideo " width="560" height="315" src="//www.youtube.com/embed/4vqLKvo0WKk" frameborder="0" allowfullscreen></iframe></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 20 Dec 2022 15:36:05 +0000</pubDate></item><item><title><![CDATA[IC Insights agency: the global chip market will recover in Q2 next year]]></title><link>https://www.brocent.com.sg/blogs/post/Chip-Market</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/NEWs/12ddsd.png"/>House of T November 13, analyst firm IC Insights predicted in a report that the global chip market is expected to recover in the second quarter of nex ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_p7z7Cx8RT-O8a92TV5ZIaA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_pbfQl0ZHQG2wuC1cDoD1hw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Un0A2ygpRhSkYwbtB0hB5g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_LrsGL-3UQ9u5W6N4SmNyWw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_LrsGL-3UQ9u5W6N4SmNyWw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">IC Insights agency: the global chip market will recover in Q2 next year</span></h2></div>
<div data-element-id="elm_Qs3fXJlTS7-sE0BlhPNzzg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Qs3fXJlTS7-sE0BlhPNzzg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><div style="text-align:left;">House of T November 13, analyst firm IC Insights predicted in a report that the global chip market is expected to recover in the second quarter of next year.</div><div style="text-align:left;">The agency said the chip market will contract 9 percent in the third quarter of this year and will contract a further 8 percent in the fourth quarter before contracting another 3 percent in the first quarter of 2023.</div><div style="text-align:left;"><div><span style="font-weight:700;">After bottoming out in the first quarter, the chip market is expected to start recovering in the next quarter of next year, IC Insights said.</span></div></div></div></div>
</div><div data-element-id="elm_lZgSe9w02w6avqm-zem1Bw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_lZgSe9w02w6avqm-zem1Bw"] .zpimage-container figure img { width: 602px !important ; height: 458px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lZgSe9w02w6avqm-zem1Bw"] .zpimage-container figure img { width:602px ; height:458px ; } } @media (max-width: 767px) { [data-element-id="elm_lZgSe9w02w6avqm-zem1Bw"] .zpimage-container figure img { width:602px ; height:458px ; } } [data-element-id="elm_lZgSe9w02w6avqm-zem1Bw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/12ddsd.png" width="602" height="458" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_buWLDsb95qZnoxCsXirMoQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_buWLDsb95qZnoxCsXirMoQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>The analyst said the global chip market has had only six contractions of three consecutive quarters in its history since the 1970s. it House has learned that these periods were 1981, 1985, 1996, 1997 to 1998, and 2001.</div><br><div>On all of these occasions, the market rebounded after three consecutive quarters of contraction.</div><br><div>The sixth period was between 2018 and 2019. In the fourth quarter of 2018, the chip market contracted by 9%, followed by a sharp contraction of 17% in the following quarter. After another 1% decline in the second quarter of 2019, the market recovered in the third quarter.</div><br><div>However, there are still uncertainties, such as some international trade wars.</div><br><div>In addition, while the chip market is expected to grow again in the second quarter of next year, on an annual basis, the global chip market is expected to contract by 3% in 2023 compared to a year ago</div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 13 Nov 2022 14:01:22 +0000</pubDate></item><item><title><![CDATA[Intel released "Thunderbolt 5"]]></title><link>https://www.brocent.com.sg/blogs/post/Thunderbolt-5</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/NEWs/da9c0d67-eac2-4e71-a070-0c328503e0af.jpg"/>Brocent Oct. 20 - Intel today previewed the next-generation Thunderbolt standard (tentatively called Thunderbolt 5), which will enable ultra-fast data ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_IJzctzW7Rui2jWDPMkw83g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_1IQsYmxWSUKFrwUm9tFtSQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_5AObnvE0T_iToWML2dA-tg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_DeLnOu2RQSuJAMBnXFSZNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DeLnOu2RQSuJAMBnXFSZNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Intel released &quot;T</span>hunderbolt 5&quot; initial standard: bandwidth up to 80Gbps, data transfer speed 2 times faster, support dual 8K external displays<br></h2></div>
<div data-element-id="elm_eCGQ5YloTN2JX4l6j-snZA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eCGQ5YloTN2JX4l6j-snZA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Brocent Oct. 20 - Intel today previewed the next-generation Thunderbolt standard (tentatively called Thunderbolt 5), which will enable ultra-fast data transfer speeds for future Mac and Windows devices, among others, as well as improved external display support in standards to be introduced in 2023 or later.</span><br></p></div>
</div><div data-element-id="elm_rrLnisoX34frr0VxrimLlA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_rrLnisoX34frr0VxrimLlA"] .zpimage-container figure img { width: 800px !important ; height: 450px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_rrLnisoX34frr0VxrimLlA"] .zpimage-container figure img { width:800px ; height:450px ; } } @media (max-width: 767px) { [data-element-id="elm_rrLnisoX34frr0VxrimLlA"] .zpimage-container figure img { width:800px ; height:450px ; } } [data-element-id="elm_rrLnisoX34frr0VxrimLlA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/da9c0d67-eac2-4e71-a070-0c328503e0af.jpg" width="800" height="450" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_zPLapGkKTMzJVfZaOG-H2w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zPLapGkKTMzJVfZaOG-H2w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:center;"><span style="color:inherit;">Next-generation Thunderbolt will provide up to 80Gbps of bi-directional bandwidth, enabling future data transfers between computer devices and external storage drives that support the standard to be up to two times faster than today's speeds. Next-generation Thunderbolt will also add a new mode that provides up to 120Gbps bandwidth for external displays, which will enable computer devices to support dual 8K displays at 60Hz</span><br></p></div>
</div><div data-element-id="elm_TEhGXsIQLlL2BXwnggI-Fw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_TEhGXsIQLlL2BXwnggI-Fw"] .zpimage-container figure img { width: 800px !important ; height: 450px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_TEhGXsIQLlL2BXwnggI-Fw"] .zpimage-container figure img { width:800px ; height:450px ; } } @media (max-width: 767px) { [data-element-id="elm_TEhGXsIQLlL2BXwnggI-Fw"] .zpimage-container figure img { width:800px ; height:450px ; } } [data-element-id="elm_TEhGXsIQLlL2BXwnggI-Fw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/daf15a04-e540-4411-8a33-752d64185fce.jpg" width="800" height="450" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_S6IwIVgmnA7vkr4jnaQGlw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_S6IwIVgmnA7vkr4jnaQGlw"] .zpimage-container figure img { width: 799.52px !important ; height: 450px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_S6IwIVgmnA7vkr4jnaQGlw"] .zpimage-container figure img { width:799.52px ; height:450px ; } } @media (max-width: 767px) { [data-element-id="elm_S6IwIVgmnA7vkr4jnaQGlw"] .zpimage-container figure img { width:799.52px ; height:450px ; } } [data-element-id="elm_S6IwIVgmnA7vkr4jnaQGlw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/2ea6248e-a844-484b-975e-b184395c5bc3.jpg" width="799.52" height="450" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VhkvSQZTotbARJi59eRp-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VhkvSQZTotbARJi59eRp-w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div><div>This prototype demonstration marks an important milestone in the journey to deliver the next generation of Thunderbolt to the industry. The bandwidth demands of content creators and gamers for high-resolution displays, low-latency visuals, and backing up or transferring huge video and data files are increasing dramatically. <span style="font-weight:700;">Next-generation Thunderbolt will deliver</span><span style="font-weight:700;">up to three times the power of Thunderbolt 4 </span>and make creation and gaming more efficient and immersive. In addition to supporting the latest version of USB4, next-generation Thunderbolt will support improvements in a variety of areas, including</div></div><br><div>Two times the total bandwidth of Thunderbolt 4 at 80Gbps, while providing up to three times the bandwidth for video-intensive use at 120Gbps.</div><div><br></div><div><ul><li>Support for the newly released DisplayPort 2.1 for the best display experience.</li><li>Twice the PCI Express data throughput for faster storage and external graphics</li><li>Up to 1 meter with new signaling technology for use with existing passive cables</li><li>Compatible with previous versions of Thunderbolt, USB and DisplayPort</li><li>Supported by Intel's licensing and certification program.</li></ul></div><div><br></div><div>That is, next-generation Thunderbolt is based on the newly released USB4 version 2.0 and DisplayPort 2.1 specifications, and is backward compatible with previous versions of Thunderbolt, USB, and DisplayPort. Intel plans to share more details on the official name, features and functionality of next-generation Thunderbolt in 2023.</div></div></div>
</div><div data-element-id="elm_QELM_MW3a74_-16xNbnvvA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_QELM_MW3a74_-16xNbnvvA"] .zpimage-container figure img { width: 1095px ; height: 615.94px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_QELM_MW3a74_-16xNbnvvA"] .zpimage-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_QELM_MW3a74_-16xNbnvvA"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_QELM_MW3a74_-16xNbnvvA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/4bda8297-bd0f-4650-beee-0383c06e6cc9.jpg" width="415" height="233.44" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_dfZK--cPPxfDgf50PCMzpA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_dfZK--cPPxfDgf50PCMzpA"] .zpimage-container figure img { width: 1095px ; height: 615.94px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_dfZK--cPPxfDgf50PCMzpA"] .zpimage-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_dfZK--cPPxfDgf50PCMzpA"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_dfZK--cPPxfDgf50PCMzpA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/b1b4978d-4f6a-46a7-88a9-1eecf1f0a13b.jpg" width="415" height="233.44" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_1uffSajC7YSdNJvtZMCMEw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_1uffSajC7YSdNJvtZMCMEw"] .zpimage-container figure img { width: 1095px ; height: 615.94px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_1uffSajC7YSdNJvtZMCMEw"] .zpimage-container figure img { width:723px ; height:406.69px ; } } @media (max-width: 767px) { [data-element-id="elm_1uffSajC7YSdNJvtZMCMEw"] .zpimage-container figure img { width:415px ; height:233.44px ; } } [data-element-id="elm_1uffSajC7YSdNJvtZMCMEw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/8ecb69ee-a54d-4898-ba7f-c3ae8a20a60c.jpg" width="415" height="233.44" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_MwR2HOmQWmNDnZmeTTxs1A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MwR2HOmQWmNDnZmeTTxs1A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>Intel contributed its Thunderbolt protocol specification to the USB Promoter Group in 2019 as the foundation for USB4. As a leader in this industry group, Intel has been working to extend the performance of USB4 to new levels.</div><div><br></div><div>Intel has a long history of leading I/O innovation. Intel works closely with PC, accessory and cable partners to deliver the most advanced and complete wired connectivity solutions through dedicated enablement and testing programs. All Thunderbolt products are subject to rigorous certification testing, which allows the Thunderbolt name and logo to be used free of charge on devices or in marketing. the Thunderbolt logo provides a simple, easily identifiable indicator of the best wired connectivity solutions for PCs and accessories.</div><div><br></div><div>Brocent&nbsp; has learned that Apple's 2021 models of the 14-inch and 16-inch MacBook Pro are equipped with Thunderbolt 4 / USB 4 ports with up to 40Gbps bandwidth.</div><br><div>No Mac currently supports plug-and-play 8K displays. 2021 14-inch and 16-inch MacBook Pro models support up to two or three external displays at up to 6K@60Hz, depending on whether the laptop is configured with an M1 Pro or M1 Max chip.</div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 24 Oct 2022 13:11:55 +0000</pubDate></item><item><title><![CDATA[FAANG is out of fashion?]]></title><link>https://www.brocent.com.sg/blogs/post/FAANG</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/NEWs/055fb9c4-bae4-4621-bf36-b82dbb7f34a7.png"/>Beijing, September 6 morning news, according to reports, investment firm Constellation Research chief analyst and founder Ray Wang said in a media int ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_bQ1mDK5ZR5i3jfBy1SK0BA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kOXDJ1RfRpGziFd4eDyIqQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_J7k_NGcdS2y8gg6wjE82oQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_cgCyg_GVQIu7-pgH1ry1CQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_cgCyg_GVQIu7-pgH1ry1CQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">FAANG is out of fashion? Analyst: Now it's MATANA, with Microsoft, Tesla and Nvidia</span></h2></div>
<div data-element-id="elm_HMFPUwNcRP6-DM2VQo4ArA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HMFPUwNcRP6-DM2VQo4ArA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Beijing, September 6 morning news, according to reports, investment firm Constellation Research chief analyst and founder Ray Wang said in a media interview that it is time to redefine the top of the technology giant food chain.</span><br></p></div>
</div><div data-element-id="elm_07_KBE_y2O_cl2EAtMOz3Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_07_KBE_y2O_cl2EAtMOz3Q"] .zpimage-container figure img { width: 630px !important ; height: 309px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_07_KBE_y2O_cl2EAtMOz3Q"] .zpimage-container figure img { width:630px ; height:309px ; } } @media (max-width: 767px) { [data-element-id="elm_07_KBE_y2O_cl2EAtMOz3Q"] .zpimage-container figure img { width:630px ; height:309px ; } } [data-element-id="elm_07_KBE_y2O_cl2EAtMOz3Q"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/NEWs/055fb9c4-bae4-4621-bf36-b82dbb7f34a7.png" width="630" height="309" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_H81PCkOOcKH0xOg9RXQKpg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_H81PCkOOcKH0xOg9RXQKpg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><div>According to the analyst, the previous FAANG should be replaced by MATANA, an acronym for Microsoft, Apple, Tesla, Alphabet, Nvidia and Amazon. The change removes Meta and Netflix and adds Microsoft, Tesla and Nvidia.</div><br><div>When U.S. financial commentator Jim Cramer coined the term FAANG in 2013, many of the companies selected were seen as rising stars in the industry, representing the acronyms of the five most popular and best-performing technology stocks in the U.S. market and expected to take their respective markets by storm. But analysts believe it's time to reassess both companies, and Meta in particular needs to develop a new plan.</div><br><div>&quot;Facebook has to find a new model outside of advertising,&quot; he says. Once again, they're taking a hit because of it,&quot; he said. So, will the new business be eyewear? Will it be metaverse? It's not certain yet, and that's exactly where the challenge is.&quot;</div><br><div>The problem for Nifty is the growth prospects and the resources it has and lacks. Because the company uses a subscription model, analysts have questions about their future growth potential.</div><br><div>&quot;The reason they're out is, how many more subscribers are there? How many more subscriptions can you handle?&quot; He said, &quot;They should be doing embedded advertising and also IP licensing. Look at how Disney makes money.&quot;</div><br><div>Ray Wang emphasized that Microsoft is often seen as the best of the old tech companies, but he should also be classified as one of the top tech leaders. In fact, FAANG was also often written FAAMNG, where the M is Microsoft.</div><br><div>&quot;Microsoft doesn't just do B2B business and consumer business, they're able to be successful in both.&quot; He says, &quot;They're well positioned in the metaverse and well positioned in the cloud. And, of course, they have the gaming business.&quot;</div><div><br></div><div>Tesla and Nvidia, on the other hand, are two new entrants. Tesla has been widely known today as a pioneer in electric cars.</div><br><div>&quot;Nvidia is not just chips, and it's not just data centers or gaming.&quot; , &quot;They are also on the edge of artificial intelligence, metaverse, future computing and its convergence model, and they are developing in a way that will dominate for quite some time.&quot;</div></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 06 Sep 2022 12:57:49 +0000</pubDate></item></channel></rss>