<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.com.sg/blogs/tag/transition-service/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services Singapore - Blog #Transition Service</title><description>Managed IT Services Singapore - Blog #Transition Service</description><link>https://www.brocent.com.sg/blogs/tag/transition-service</link><lastBuildDate>Sat, 13 Sep 2025 23:56:17 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[5 Cybersecurity Predictions for 2024 You Should Plan For]]></title><link>https://www.brocent.com.sg/blogs/post/5_cybersecurity_predictions_for_2024_you_should_plan_for</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Image-5-Cybersecurity-Predictions-for-2024-V1.png"/>Cybersecurity is a constantly evolving field. There are new threats, technologies, and opportunities emerging every year.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2DdJyMcmRuOGR-u-1_onMQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_bTSirQI0Ri2skLdwzMkhvQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_slijottQRJ6mbYGC_c0wzg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_8bvzMCB7SG6RaFQMBJ1DzQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_8bvzMCB7SG6RaFQMBJ1DzQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">5 Cybersecurity Predictions for 2024 You Should Plan For</span><br></p></div></h2></div>
<div data-element-id="elm_xDr7VjCIakR6mh3LeOTi-g" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_xDr7VjCIakR6mh3LeOTi-g"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_xDr7VjCIakR6mh3LeOTi-g"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_xDr7VjCIakR6mh3LeOTi-g"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_xDr7VjCIakR6mh3LeOTi-g"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Image-5-Cybersecurity-Predictions-for-2024-V1.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_IIeiiRi6RoGQWRO81G-gTg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IIeiiRi6RoGQWRO81G-gTg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Cybersecurity is a constantly evolving field. There are new threats, technologies, and opportunities emerging every year. As we enter 2024, organizations need to be aware of current and future cyber threats. Businesses of all sizes and sectors should plan accordingly. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Staying ahead of the curve is paramount to safeguarding digital assets. Significant changes are coming to the cybersecurity landscape. Driving these changes are emerging technologies and evolving threats. As well as shifting global dynamics.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Next, we'll explore key cybersecurity predictions for 2024 that you should consider.</span></p></div></div>
</div><div data-element-id="elm_AvvJkwR2PFA6GC6Aj5YN3A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AvvJkwR2PFA6GC6Aj5YN3A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. AI Will Be a Double-edged Sword</span></h3></div>
<div data-element-id="elm_Q0ZBwQd4Q3fC2jcMHWFa7A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Q0ZBwQd4Q3fC2jcMHWFa7A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Artificial intelligence (AI) has been a game-changer for cybersecurity. It has enabled faster and more accurate threat detection, response, and prevention. But AI also poses new risks such as adversarial AI, exploited vulnerabilities, and misinformation. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">For example, malicious actors use chatbots and other large language models to generate:</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Convincing phishing emails</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Fake news articles</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Deepfake videos </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">This malicious content can deceive or manipulate users. Organizations will need to put in place robust security protocols. This includes embracing a human-in-the-loop approach as well as regularly tracking and reviewing their AI systems. These steps will help them mitigate these risks and harness the power of AI for a more secure future.</span></p></div></div>
</div><div data-element-id="elm_qQ0avsmYvDPpyiQIZUDt0g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qQ0avsmYvDPpyiQIZUDt0g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Quantum Computing Will Become a Looming Threat</span></h3></div>
<div data-element-id="elm_CObOriFrD5Y0EGtC70eZ8Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CObOriFrD5Y0EGtC70eZ8Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Quantum computing is still a few years away from reaching its full potential. But it is already a serious threat to the security of current encryption standards. </span></p><p><span style="font-size:11pt;">Quantum computers can potentially break asymmetric encryption algorithms. These algorithms are widely used to protect data in transit and at rest. This means that quantum</span><span style="font-size:11pt;color:inherit;">enabled hackers could compromise sensitive data, like financial transactions.</span></p><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Organizations will need to start preparing for this scenario. They can do this by assessing their potential risks first. Then, adopting quantum-resistant technologies and deploying quantum-safe architectures.</span></p></div></div></div>
</div><div data-element-id="elm_Kyua03oceQQRhWCz3dp4yA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Kyua03oceQQRhWCz3dp4yA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Hacktivism Will Rise in Prominence</span></h3></div>
<div data-element-id="elm_VCI_we2cBGnAFMLrmV9QVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VCI_we2cBGnAFMLrmV9QVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Hacktivism is the use of hacking techniques to promote a political or social cause. Such as exposing corruption, protesting injustice, or supporting a movement. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Hacktivism has been around for decades. But it's expected to increase in 2024. Particularly during major global events. These may include the Paris Olympics and the U.S. Presidential Election as well as specific geopolitical conflicts. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Hacktivists may target organizations that they perceive as adversaries or opponents. This can include governments, corporations, or media outlets. These attacks can disrupt their operations as well as leak their data or deface their websites. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Organizations will need to be vigilant against potential hacktivist attacks. This includes being proactive in defending their networks, systems, and reputation.</span></p></div></div>
</div><div data-element-id="elm_AqmjgrrPYmyf0lP1AbYXBw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_AqmjgrrPYmyf0lP1AbYXBw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Ransomware Will Remain a Persistent Threat</span></h3></div>
<div data-element-id="elm_1meA0tq81oCa33qCOjuSKQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1meA0tq81oCa33qCOjuSKQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Ransomware is a type of malware that encrypts the victim's data. The attacker then demands a ransom for its decryption. Ransomware has been one of the most damaging types of cyberattacks in recent years.</span></p><p style="margin-bottom:12pt;"><b><i><span style="font-size:11pt;">In 2023, </span></i></b><a href="https://www.darkreading.com/cyberattacks-data-breaches/2023-ransomware-attacks-up-more-than-95-over-2022-according-to-corvus-insurance-q3-report"><b><i><u>ransomware attacks increased by more than 95%</u></i></b></a><b><i><span style="font-size:11pt;">&nbsp;over the prior year.</span></i></b><b><i></i></b></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Ransomware attacks are likely to continue increasing in 2024. Due to new variants, tactics, and targets emerging. For example, ransomware attackers may leverage AI to enhance their encryption algorithms. &nbsp;As well as evade detection and customize their ransom demands.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Hackers may also target cloud services, IoT devices, or industrial control systems. This could cause more disruption and damage. Organizations will need to put in place comprehensive ransomware prevention and response strategies. Including:</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Backing up their data regularly</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Patching their systems promptly</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Using reliable email and DNS filtering solutions</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Educating their users on how to avoid phishing emails</span></p></div></div>
</div><div data-element-id="elm_glyFfjMl6n8xOdxUc3kl1w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_glyFfjMl6n8xOdxUc3kl1w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Cyber Insurance Will Become More Influential</span></h3></div>
<div data-element-id="elm_QPc8_AVQ6vdGbqPs7Nml_Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_QPc8_AVQ6vdGbqPs7Nml_Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Cyber insurance covers the losses and liabilities resulting from cyberattacks. It has become more popular and important in recent years. This is due to cyberattacks becoming more frequent and costly. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Cyber insurance can help organizations recover from cyber incidents faster and more effectively. It provides financial compensation, legal help, or technical support. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">But cyber insurance can also influence the security practices of organizations. More cyber insurers may impose certain requirements or standards on their customers such as implementing specific security controls or frameworks. Organizations will need to balance the benefits and costs of cyber insurance as well as ensure that they are in compliance with their cyber insurers' expectations.</span></p></div></div>
</div><div data-element-id="elm_Xy0o_RWwocdqWxUVTcRdsQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Xy0o_RWwocdqWxUVTcRdsQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Be Proactive About Cybersecurity – Schedule an Assessment</span></h2></div>
<div data-element-id="elm_3pAp4oe2WIe3QwyUrEHdtg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3pAp4oe2WIe3QwyUrEHdtg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">It's clear that the cybersecurity landscape will continue to evolve rapidly. Organizations and individuals must proactively prepare for emerging threats. This includes adopting advanced technologies and prioritizing workforce development as well as staying abreast of regulatory changes. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Put a comprehensive cybersecurity strategy in place. One that encompasses these predictions. This will help you navigate the digital frontier with resilience and vigilance.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Need help ensuring a secure and trustworthy digital environment for years to come? Contact us today to schedule a cybersecurity assessment.</span></p><p><b><span style="font-size:11pt;">Article used with permission from </span></b><a href="https://thetechnologypress.com/5-cybersecurity-predictions-for-2024-you-should-plan-for/"><b><u>The Technology Press.</u></b></a><b><span style="font-size:11pt;">&nbsp;</span></b></p></div></div>
</div><div data-element-id="elm_6iBWv9VISRmDR_fAnA0tQA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_6iBWv9VISRmDR_fAnA0tQA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 20 Mar 2024 10:49:24 +0000</pubDate></item><item><title><![CDATA[How Brocent helps telecom customers deploy Aruba security devices globally]]></title><link>https://www.brocent.com.sg/blogs/post/How_Brocent_helps_telecom_customers_deploy_Aruba_security_devices_globally</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/IMG_2810.jpeg"/>We have extensive experience and expertise in deploying Aruba security devices, which are designed to provide edge-to-cloud security for any network environment.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Snph6tDKTtSLt9DPE5Cxxw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_6_ZhodxNTUKLRkRMFPGDTQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_qiMKzVYBT8ucYOwYC-lIUg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Ry2qcrcBRzGtDfMG5FBNlw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ry2qcrcBRzGtDfMG5FBNlw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How Brocent helps telecom customers deploy Aruba security devices globally</span></h2></div>
<div data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width: 700px !important ; height: 466px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width:700px ; height:466px ; } } @media (max-width: 767px) { [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"] .zpimage-container figure img { width:700px ; height:466px ; } } [data-element-id="elm_sacZpp3xaJqtZnEYJB-VFQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/IMG_2810.jpeg" width="700" height="466" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__P5aNkYORzGvEneAALlE3A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__P5aNkYORzGvEneAALlE3A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Brocent is a leading provider of IT infrastructure and security solutions for telecom customers worldwide. We have extensive experience and expertise in deploying Aruba security devices, which are designed to provide edge-to-cloud security for any network environment.</p><p>In this post, we will share some of the key success factors that enable us to support our telecom customers in more than 30 countries and cities with Aruba security device deployment, including:</p><ul><li>Staging: We perform pre-configuration, testing, and validation of Aruba security devices at our staging facilities before shipping them to the customer sites. This ensures that the devices are ready to be installed and integrated with the existing network infrastructure, reducing the risk of errors and delays.</li><li>Logistic: We manage the end-to-end logistic process of delivering Aruba security devices to the customer sites, including customs clearance, transportation, and tracking. We also handle the reverse logistic of returning or disposing of the old devices, ensuring compliance with environmental and security standards.</li><li>Onsite installation: We deploy our certified and experienced engineers to perform onsite installation of Aruba security devices, following the best practices and guidelines from Aruba. We also provide onsite training and documentation for the customer staff, enabling them to operate and manage the devices effectively.</li><li>Technical configuration: We configure Aruba security devices according to the customer’s specific requirements and preferences, using the latest software and firmware updates from Aruba. We also leverage Aruba’s advanced features and capabilities, such as Zero Trust, SASE, and AI, to optimize the performance and security of the network.</li><li>Post-deployment 24x7 maintenance services: We offer post-deployment 24x7 maintenance services for Aruba security devices, including remote monitoring, troubleshooting, and support. We also provide periodic reports and recommendations for network improvement and optimization, ensuring that the customer’s network is always secure, reliable, and efficient.</li></ul><p>By providing these comprehensive and customized services, we help our telecom customers deploy Aruba security devices with ease and confidence, enhancing their network security and customer experience. If you are interested in learning more about our Aruba security device deployment services, please contact us today. We would love to hear from you and discuss how we can help you achieve your network security goals.</p></div></div>
</div><div data-element-id="elm_T-ylNR3ySBKBHu5HLSnwOg" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_T-ylNR3ySBKBHu5HLSnwOg"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 04 Feb 2024 01:02:26 +0000</pubDate></item><item><title><![CDATA[How Brocent Controls the Cost and Rewards a High Quality IT Managed Service to Customer]]></title><link>https://www.brocent.com.sg/blogs/post/How_Brocent_Controls_the_Cost_and_Rewards_a_High_Quality_IT_Managed_Service_to_Customer</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/2-1.jpg"/>Brocent is a leading IT managed service provider in Asia, with over 15 years of experience in delivering professional, reliable, and cost-effective IT solutions to various industries.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4N_8fq0kRMuVWRLeVyJG_g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_qa9qSaXFTJ2kUJS--h06ZA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_cZFN_AEtQ72HmHs9QqJJRw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_9F0xAiv9TPSxgXLvQhzXdQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9F0xAiv9TPSxgXLvQhzXdQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">How Brocent Controls the Cost and Rewards a High Quality IT Managed Service to Customer</span></h2></div>
<div data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width: 648px !important ; height: 430px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width:648px ; height:430px ; } } @media (max-width: 767px) { [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"] .zpimage-container figure img { width:648px ; height:430px ; } } [data-element-id="elm_om-YJxeEo2Vn2ee7gjgnWg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/2-1.jpg" width="648" height="430" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm__38ze_5ZRWiR5YDYwnDk2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__38ze_5ZRWiR5YDYwnDk2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p>Brocent is a leading IT managed service provider in Asia, with over 15 years of experience in delivering professional, reliable, and cost-effective IT solutions to various industries. Brocent’s mission is to help its customers transform their IT infrastructure, discover IT value, and achieve business success. In this post, we will share some of the strategies that Brocent uses to control the cost and reward a high quality IT managed service to customer.</p></div></div>
</div><div data-element-id="elm_ubUIJCLbl2mQeF74KumSdA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ubUIJCLbl2mQeF74KumSdA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 1: Define and monitor service level agreements (SLAs)</span></h2></div>
<div data-element-id="elm_s69pmXFbabvQ7sUKstCiHQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_s69pmXFbabvQ7sUKstCiHQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent understands the importance of setting clear and realistic expectations with its customers, and ensuring that they are met or exceeded. That is why Brocent defines and monitors service level agreements (SLAs) with its customers, which specify the scope, quality, and metrics of the service provided, as well as the penalties for non-compliance.to track and optimize its IT service management metrics, and to provide transparent and timely reports to its customers. Brocent also conducts regular reviews and audits of its SLAs, and adjusts them as needed to reflect changing customer needs and market conditions.</p></div></div>
</div><div data-element-id="elm_4raAZuW7Ub1384kIMh6Pgw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_4raAZuW7Ub1384kIMh6Pgw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 2: Use the right tools and automation</span></h2></div>
<div data-element-id="elm_CHtgkFHIVfxIU6qWUKZ3vQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_CHtgkFHIVfxIU6qWUKZ3vQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent leverages the power of tools and automation to streamline its processes, reduce errors, increase efficiency, and enhance customer satisfaction. Brocent uses tools such as Manage Engine MSP to manage its customer service,&nbsp; to learn best practices and tips for selling managed services, and various cloud platforms to provide flexible and scalable IT solutions. Brocent also uses automation to perform routine tasks, such as backups, updates, patches, and security checks, and to alert its staff of any issues or anomalies. By using the right tools and automation, Brocent can control its operational costs, improve its service quality, and deliver faster and better results to its customers.</p></div></div>
</div><div data-element-id="elm_IHO3AbNdguTSGbtnQHizXA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IHO3AbNdguTSGbtnQHizXA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 3: Train and empower its staff</span></h2></div>
<div data-element-id="elm_BJsfU8sh0hOZXhOwnPriDg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_BJsfU8sh0hOZXhOwnPriDg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">Brocent recognizes that its staff are the backbone of its IT managed service, and that they play a vital role in delivering high quality service to its customers. Therefore, Brocent invests in training and empowering its staff with the skills, knowledge, and resources they need to perform their tasks effectively and efficiently. Brocent provides its staff with regular feedback, recognition, and rewards, and creates a culture of continuous learning and improvement. Brocent also empowers its staff to make decisions and take actions that are in the best interest of the customer, and to communicate openly and honestly with the customer. By training and empowering its staff, Brocent can boost their morale, motivation, and productivity, and reduce turnover and attrition.</span></span><br></p></div>
</div><div data-element-id="elm_PUXkEhmLLbWe-ZFixxpR4Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PUXkEhmLLbWe-ZFixxpR4Q"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Strategy 4: Collect and act on customer feedback</span></h2></div>
<div data-element-id="elm_aBou9NT-NhHoVen6dBg-9g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_aBou9NT-NhHoVen6dBg-9g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Brocent values customer feedback as a key source of information and insight to understand its customer’s needs, expectations, and satisfaction, and to identify any gaps or issues in its service. Brocent collects customer feedback through various channels, such as surveys, reviews, testimonials, referrals, and social media. Brocent also analyzes and acts on the feedback it receives, and uses it to improve its service quality, customer loyalty, and retention. Brocent strives to exceed its customer’s expectations, and to provide them with a positive and memorable experience.</p><div style="color:inherit;"><p>We hope this post helps you to understand how Brocent controls the cost and rewards a high quality IT managed service to customer.<a href="https://www.brocentasia.com/" id="3585231a-622d-c394-49c8-ee8e64441300-21-group">If you are interested in learning more about Brocent’s IT managed service offerings, please visit our website</a><span style="font-size:12.5px;">&nbsp;</span>or contact us. Thank you for reading. 😊.</p></div></div></div>
</div><div data-element-id="elm_cAga-kOqQRmr7SZkXWR0_w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_cAga-kOqQRmr7SZkXWR0_w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Jan 2024 01:29:37 +0000</pubDate></item><item><title><![CDATA[How Global Labor Cost Increase Impacts IT Managed Services]]></title><link>https://www.brocent.com.sg/blogs/post/how_global_labor_cost_increase_impacts_it_managed_services</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/1.jpeg"/>IT managed services are the practice of outsourcing the responsibility for maintaining, and anticipating the need for, a range of processes and functions in order to improve operations and cut expenses.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_civ7QMYSQQSDmf56DeHVlA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_FQ5t94F4S5mohgG6Ek9qPA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_9pf5q-QWREqWFCij75rtiQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_Y1iEEvEfQsKjCRV95t6TyA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Y1iEEvEfQsKjCRV95t6TyA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1>How Global Labor Cost Increase Impacts IT Managed Services</h1></div></h2></div>
<div data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width: 648px !important ; height: 364px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width:648px ; height:364px ; } } @media (max-width: 767px) { [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"] .zpimage-container figure img { width:648px ; height:364px ; } } [data-element-id="elm_OT7YVIIt2-9UHtxcsPHLKQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/1.jpeg" width="648" height="364" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_I-gykFQTT4KPW2QyEK2tjg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_I-gykFQTT4KPW2QyEK2tjg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><div style="color:inherit;"><p>IT managed services are the practice of outsourcing the responsibility for maintaining, and anticipating the need for, a range of processes and functions in order to improve operations and cut expenses. IT managed services can include network management, security, cloud computing, data analytics, software development, and more.</p><p>The global labor market has undergone significant changes in the past few years, due to the combined effects of the COVID-19 pandemic, the Fourth Industrial Revolution, the green and energy transition, and the geopolitical volatility. These changes have resulted in diverging labor-market outcomes between low-, middle- and high-income countries, as well as among workers within the same country. One of the key trends that has emerged is the increase in labor costs, especially in the IT sector.</p><p>Labor costs are the total amount of money paid to employees, including wages, salaries, benefits, taxes, and other expenses. Labor costs affect the demand for labor, as well as the profitability and competitiveness of businesses. Higher labor costs can make workers better off, but they can also reduce companies’ profits, the number of jobs, and the hours each person works.</p><p>The increase in labor costs in the IT sector can be attributed to several factors, such as:</p><ul><li>The rising demand for IT skills and talent, driven by the digital transformation of various industries and sectors, as well as the emergence of new technologies such as generative AI, IoT, blockchain, and others.</li><li>The shortage of IT workers, especially in high-income countries, due to the mismatch between the supply and demand of IT skills, the aging of the workforce, the immigration restrictions, and the low participation of women and minorities in STEM fields.</li><li>The increasing bargaining power of IT workers, due to their high mobility, flexibility, and productivity, as well as their ability to work remotely and across borders.</li><li>The growing pressure from workers, consumers, and regulators for better working conditions, higher wages, and more social and environmental responsibility from IT companies.</li></ul><p>The increase in labor costs in the IT sector has significant implications for IT managed services, both for the providers and the clients. Some of the possible impacts are:</p><ul><li>IT managed service providers may face higher operational costs, lower profit margins, and reduced competitiveness in the global market. They may also struggle to attract and retain qualified IT workers, as well as to meet the quality and service standards of their clients.</li><li>IT managed service clients may benefit from lower capital expenditures, higher operational efficiency, and access to specialized IT skills and solutions. However, they may also face higher service fees, lower service quality, and increased dependency and vulnerability to their providers.</li><li>IT managed service providers and clients may need to adopt new strategies and practices to cope with the rising labor costs, such as:</li><ul><li>Investing in automation, digitalization, and innovation to reduce the reliance on human labor and increase the productivity and quality of IT services.</li><li>Leveraging cloud computing, data analytics, and AI to optimize the allocation and utilization of IT resources and capabilities.</li><li>Outsourcing more IT functions and processes to low- and lower-middle-income countries, where labor costs are relatively lower and IT talent is abundant and growing.</li><li>Developing new business models and partnerships to share the risks and rewards of IT managed services, such as outcome-based contracts, co-creation, and co-innovation.</li><li>Enhancing the skills and competencies of IT workers, both in-house and outsourced, to adapt to the changing IT landscape and the evolving needs of IT managed services.</li><li>Improving the working conditions, wages, and benefits of IT workers, both in-house and outsourced, to attract and retain them, as well as to meet the social and environmental expectations of workers, consumers, and regulators.</li></ul></ul><p>The global labor cost increase is a complex and dynamic phenomenon that affects the IT managed services in various ways. IT managed service providers and clients need to understand the causes and consequences of this trend, and to adopt appropriate strategies and practices to leverage the opportunities and overcome the challenges that it poses.</p></div></div></div>
</div><div data-element-id="elm_GIAdybvBSkGmwC6qOBbURQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_GIAdybvBSkGmwC6qOBbURQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 29 Jan 2024 01:20:13 +0000</pubDate></item><item><title><![CDATA[7 Transformative Technology Trends Changing the Way We Work]]></title><link>https://www.brocent.com.sg/blogs/post/7_transformative_technology_trends_changing_the_way_we_work</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-7-Transformative-Technology-V1.png"/>Technology is reshaping the world of work at an unprecedented pace.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_4N1D6vzeTjKgrZM8-vLzYw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LrQG_RPtR22SMtuv8gofDw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Cj3k50SrSV2S-NuBpCxA6A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_Cj3k50SrSV2S-NuBpCxA6A"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_VRczP7uPT6G4FBK-ibqYHg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VRczP7uPT6G4FBK-ibqYHg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">7 Transformative Technology Trends Changing the Way We Work</span></h2></div>
<div data-element-id="elm_HWWVkPgvj6pRvugix19gjw" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_HWWVkPgvj6pRvugix19gjw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-7-Transformative-Technology-V1.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_N9YDKoUIRoOu0iDazFELzw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N9YDKoUIRoOu0iDazFELzw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Technology is reshaping the world of work at an unprecedented pace. From artificial intelligence to web3, from the metaverse to the hybrid work model. We are witnessing a series of technological revolutions. They are transforming how we communicate, collaborate, create, and innovate. </p><p style="text-align:justify;">Let’s explore some of the most impactful technology trends that are changing the way we work in 2024 and beyond.&nbsp;</p></div></div>
</div><div data-element-id="elm_wZc7MSlip-ljmPYgu-sPyw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_wZc7MSlip-ljmPYgu-sPyw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Artificial Intelligence</span><br></h3></div>
<div data-element-id="elm_mRv9L8J4cYY9VsZ0FoLZRQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mRv9L8J4cYY9VsZ0FoLZRQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>AI and Generative AI are not just buzzwords. They are transforming the workplace. These technologies enable automation, allowing teams to handle mundane tasks more efficiently. They free up human resources for more creative and strategic endeavors. </p><p>AI is not a new concept, but it has become more powerful and accessible in recent years. This is thanks to advances in computing power, data availability, and algorithm development. </p><p>Artificial intelligence is now augmenting and automating various aspects of work. This includes data analysis, customer service, image creation, product design, and more. </p><p>But AI also poses significant challenges and risks. This includes ethical dilemmas, social implications, and workforce displacement. Thus, it's essential to adopt responsible and human-centric approaches to AI. As well as ensure that workers have the skills and support to adapt to the changing nature of work.</p></div></div>
</div><div data-element-id="elm_MZ2p018zMrpNF8_EbPJn_A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_MZ2p018zMrpNF8_EbPJn_A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Remote Collaboration Tools</span><br></h3></div>
<div data-element-id="elm_WfZ2uQOY7tbF3YOfV4BCZg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WfZ2uQOY7tbF3YOfV4BCZg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Advanced collaboration tools have facilitated the rise of remote work. These include video conferencing, project management software, and cloud-based document sharing platforms. </p><p>This technology empowers teams to collaborate seamlessly from different corners of the globe. These tools break down geographical barriers, allowing for efficient teamwork and real-time communication.</p></div></div>
</div><div data-element-id="elm_vY4e7qpFm4b5VevT4AiGBg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_vY4e7qpFm4b5VevT4AiGBg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Hybrid Work Model</span><br></h3></div>
<div data-element-id="elm_XA6nIMNEZ3cjmZpyJ1LzUg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_XA6nIMNEZ3cjmZpyJ1LzUg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>The hybrid work model is a term that describes the combination of remote and in-office work. This is not a new concept, but it has become more prevalent in the wake of the Covid-19 pandemic. </p><p>The hybrid work model offers many benefits, such as:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Increased productivity</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Reduced costs</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Improved work-life balance</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Enhanced employee satisfaction</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Improved employee retention</p><p>The hybrid work model is transforming the way we work. It requires workers to have new skills, tools, and strategies. For example, hybrid work requires workers to have several capabilities to work effectively. These include strong digital literacy, communication, collaboration, and self-management skills.</p></div></div>
</div><div data-element-id="elm_PVC5nMeXWzqeId5CBvHq-A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PVC5nMeXWzqeId5CBvHq-A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">4. Web3: The Decentralized Internet</font></font></span><br></h3></div>
<div data-element-id="elm_YNn9jExkSmxgmYYrcfk-HQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_YNn9jExkSmxgmYYrcfk-HQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Web3 is a term that refers to the next generation of the internet. An internet based on decentralized technologies, such as:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Blockchain</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Cryptocurrencies</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Smart contracts</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Peer-to-peer networks</p><p>Web3 aims to create a more open, transparent, secure, and democratic internet. One where users have more control over their own data, identity, and digital assets.&nbsp; </p><p>Web3 also enables new forms of collaboration and value creation. This includes:</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Decentralized autonomous organizations (DAOs)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Non-fungible tokens (NFTs)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Decentralized finance (DeFi)</p><p style="margin-left:36pt;">·<span style="font-size:7pt;">&nbsp; </span>Social tokens</p><div style="color:inherit;"><p>Web3 is transforming the way we work. It's creating new business models, platforms, and communities. These are designed to be more inclusive, participatory, and innovative.</p><p><b><i>Web3 has the potential to generate </i></b><a href="https://finance.yahoo.com/news/3-0-market-hit-49-085000627.html"><b><i>$49.10 billion</i></b></a><b><i> in economic value by 2030.&nbsp;</i></b></p></div></div></div>
</div><div data-element-id="elm_-MPkGts_DKY2SJ6uJr6D2w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_-MPkGts_DKY2SJ6uJr6D2w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">5. Internet of Things (IoT) in the Workplace</font></font></span><br></h3></div>
<div data-element-id="elm_VQXi6vRfPLTnPB_s3yc3KQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VQXi6vRfPLTnPB_s3yc3KQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>IoT devices are creating smart and optimized workplaces. This includes smart thermostats that adjust office temperatures based on occupancy. As well as wearable devices that track employees' health and productivity. This connectivity enhances efficiency and reduces energy consumption. It also provides valuable data for informed decision-making.</p></div></div>
</div><div data-element-id="elm_PkGLfMkaL1f1oaeljQAtSw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_PkGLfMkaL1f1oaeljQAtSw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><font style="vertical-align:inherit;"><font style="vertical-align:inherit;">6. Augmented Reality (AR) and Virtual Reality (VR)</font></font></span><br></h3></div>
<div data-element-id="elm_OjJus8IbVsEvfrdznf4jOw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_OjJus8IbVsEvfrdznf4jOw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>AR and VR technologies are revolutionizing training, design, and customer interactions. In the workplace, AR and VR offer immersive training experiences. These allow employees to learn complex tasks in a simulated environment. These technologies are also used in product design. This enables professionals to visualize and modify prototypes in real time. This drives faster innovation cycles.</p></div></div>
</div><div data-element-id="elm_VNBkBkpDkd0pJC1wLKAF5A" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_VNBkBkpDkd0pJC1wLKAF5A"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Cybersecurity Advancements</span><br></h3></div>
<div data-element-id="elm_2pa7ONPgOaBICYMhk2LOUw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2pa7ONPgOaBICYMhk2LOUw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>As digital technologies advance so do cybersecurity threats. Businesses are investing in advanced cybersecurity measures to protect sensitive data. As well as ensuring the privacy of employees and customers. </p><p>These innovations include biometric authentication and AI-driven threat detection. Cybersecurity advancements are crucial. They help companies safeguard digital assets and maintain trust in the online workspace.</p></div></div>
</div><div data-element-id="elm_5Ia-fZrHUqjTz3r4uQllcg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5Ia-fZrHUqjTz3r4uQllcg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">The Impact on the Future of Work</span><br></h2></div>
<div data-element-id="elm_d6Imma_zsKyjeIzAibXBAQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_d6Imma_zsKyjeIzAibXBAQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>These transformative technology trends are not just fleeting novelties. They are shaping the future of work. Businesses that adapt and embrace these technologies gain a competitive edge. </p><p>Remote collaboration tools foster flexibility and work-life balance, appealing to the modern workforce. AI and automation enhance efficiency, reducing errors and operational costs. </p><p>IoT creates intelligent workspaces, enhancing employee well-being and environmental sustainability. AR and VR drive innovation, offering new ways to engage both employees and customers.</p></div></div>
</div><div data-element-id="elm_ti1c09PEnP4ZkGVMr48dpw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ti1c09PEnP4ZkGVMr48dpw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Challenges and Considerations</span><br></h2></div>
<div data-element-id="elm_6_3hPXGjRDzQvWJB9NEtBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6_3hPXGjRDzQvWJB9NEtBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:11pt;">While these technologies bring immense benefits, they also pose challenges. Workforce training is essential to ensure employees can leverage these tools effectively. Additionally,&nbsp;</span></span><span style="color:inherit;">there are ethical considerations about data privacy and security. As well as the impact of automation on employment. Striking a balance between technological advancement and human welfare is crucial. Especially in this transformative era.</span></p></div>
</div><div data-element-id="elm_frDruPifXcfGnLlUKcRsew" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_frDruPifXcfGnLlUKcRsew"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Let Us Guide You Successfully Through Digital Transformation</span><br></h2></div>
<div data-element-id="elm_3JsngajbRr_JMkC330H1-w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_3JsngajbRr_JMkC330H1-w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Navigating new technologies can be complex. There are pitfalls that can waste time and money. Avoid this by working with our team of experts. We can help you customize your transformation to fit your business goals.</p><p>Give us a call today to schedule a chat.</p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/7-transformative-technology-trends-changing-the-way-we-work/" target="_blank"><b>The Technology Press.</b></a></span><b></b></div></div>
</div><div data-element-id="elm_HcMJ-WHVRUG2NqKcv33C0g" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_HcMJ-WHVRUG2NqKcv33C0g"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 24 Jan 2024 06:12:32 +0000</pubDate></item><item><title><![CDATA[Why You Need to Understand "Secure by Design" Cybersecurity Practices]]></title><link>https://www.brocent.com.sg/blogs/post/why_you_need_to_understand_secure_by_design_cybersecurity_practices1</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Understand-Secure-by-Design-Cybersecurity-Prac.png"/>Cybersecurity has become a critical foundation upon which many aspects of business rely.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zIkrcqwmSkG5ouotkmgSvA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_2QTxpUWdTsmEhIAZdN4kDQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_PhGTXzT3Q1O5p0RHuZ2Chw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_PhGTXzT3Q1O5p0RHuZ2Chw"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_x-uvDh9aRKSJWBm9KGKmcw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x-uvDh9aRKSJWBm9KGKmcw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Why You Need to Understand &quot;Secure by Design&quot; Cybersecurity Practices</span></h2></div>
<div data-element-id="elm_H245wnW4L-uv5lXi6pg10A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_H245wnW4L-uv5lXi6pg10A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-Why-You-Need-to-Understand-Secure-by-Design-Cybersecurity-Prac.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_g3l81FkBTDqosCbcg7ddIw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_g3l81FkBTDqosCbcg7ddIw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Cybersecurity has become a critical foundation upon which many aspects of business rely. Whether you’re a large enterprise or small business, network security is a must. Cyberattacks can have long-term consequences. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">The frequency and sophistication of cyberattacks continue to increase. In 2022, IoT malware attacks saw a sobering </span><a href="https://www.techopedia.com/cybersecurity-statistics"><u><span style="font-size:11pt;">87% increase</span></u></a><span style="font-size:11pt;">. Attack volume is also ramping up due to the use of AI.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">It’s essential to shift from a reactive to a proactive cybersecurity approach. One such approach that has gained prominence is &quot;Secure by Design&quot; practices. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">International partners have taken steps to address commonly exploited vulnerabilities. A </span><a href="https://executivegov.com/2023/08/us-international-partners-release-advisory-on-addressing-common-exploited-vulnerabilities/"><u><span style="font-size:11pt;">recent advisory</span></u></a><span style="font-size:11pt;">&nbsp;highlights Secure by Design principles. This collaborative effort underscores the global nature of the cybersecurity threat landscape. As well as the need for coordinated action to protect critical infrastructure. </span></p><p style="text-align:justify;"><span style="font-size:11pt;">In this article, we'll explore what it takes to put in place Secure by Design principles. And explain why they are paramount in today's cybersecurity landscape.</span></p></div></div>
</div><div data-element-id="elm_2ya6o1g7xPlcn0Hr10in5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_2ya6o1g7xPlcn0Hr10in5w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Today’s Modern Cyberthreats</span><br></p></div></h2></div>
<div data-element-id="elm_jZUuAVLqkkzYKDNlnjZ38g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_jZUuAVLqkkzYKDNlnjZ38g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Cybersecurity threats have evolved significantly over the years. Gone are the days when just installing an antivirus could protect your computer. Today, cybercriminals use highly sophisticated tactics. The potential impact of an attack goes far beyond the inconvenience of a virus.&nbsp;</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Modern cyber threats encompass a wide range of attacks, including:</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><b><span style="font-size:11pt;">Ransomware:</span></b><span style="font-size:11pt;">&nbsp;Malware that encrypts your data and demands a ransom for decryption. One of the costliest attacks for businesses.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><b><span style="font-size:11pt;">Phishing:</span></b><span style="font-size:11pt;">&nbsp;Deceptive emails or messages that trick you into revealing sensitive information. </span><a href="https://www.techopedia.com/phishing-statistics"><u><span style="font-size:11pt;">Eighty-three</span></u></a><span style="font-size:11pt;">&nbsp;percent of companies experience a phishing attack each year.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">3.&nbsp;</span><b><span style="font-size:11pt;">Advanced Persistent Threats (APTs):</span></b><span style="font-size:11pt;">&nbsp;Long-term cyberattacks aimed at stealing sensitive data.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">4.&nbsp;</span><b><span style="font-size:11pt;">Zero-Day Exploits:</span></b><span style="font-size:11pt;">&nbsp;Attacks that target vulnerabilities not yet known to software developers.</span></p><p style="text-align:justify;"><span style="font-weight:bold;font-size:11pt;">5.&nbsp;</span><b><span style="font-size:11pt;">IoT Vulnerabilities:</span></b><span style="font-size:11pt;">&nbsp;Hackers exploit vulnerabilities in Internet of Things (IoT) devices to compromise networks.</span></p><p style="text-align:justify;"><span style="font-size:11pt;">These evolving threats underscore the need for a proactive approach to cybersecurity. Instead of reacting to attacks after they occur, you want to prevent them from happening.</span></p></div></div>
</div><div data-element-id="elm_Z8fqQypqr3RaN-PO5ul2Vw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Z8fqQypqr3RaN-PO5ul2Vw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">What Is Secure by Design?</span></h2></div>
<div data-element-id="elm_N4LIVefmQl-a_AbvBlG3yQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_N4LIVefmQl-a_AbvBlG3yQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Secure by Design is a modern cybersecurity approach. It integrates security measures into the very foundation of a system, app, or device. It does this from the start. </span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">It's about considering security as a fundamental aspect of the development process. Rather than including it as a feature later.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">How can businesses of all types translate this into their cybersecurity strategies? There are two key ways:</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><span style="font-size:11pt;">When purchasing hardware or software, ask about Secure by Design. Does the supplier use these practices? If not, you may want to consider a different vendor.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><span style="font-size:11pt;">Incorporate Secure by Design principles into your own business. Such as when planning an infrastructure upgrade or customer service enhancement. Put cybersecurity at the center. Instead of adding it as an afterthought.</span></p><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Key principles of Secure by Design include:</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">1.&nbsp;</span><b><span style="font-size:11pt;">Risk Assessment:</span></b><span style="font-size:11pt;">&nbsp;Identifying potential security risks and vulnerabilities early in the design phase.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">2.&nbsp;</span><b><span style="font-size:11pt;">Standard Framework:</span></b><span style="font-size:11pt;">&nbsp;Maintain consistency when applying security standards by following a framework. Such as </span><a href="https://www.cisecurity.org/controls"><u><span style="font-size:11pt;">CIS</span></u></a><span style="font-size:11pt;">&nbsp;Critical Security Controls, </span><a href="https://www.hhs.gov/hipaa/index.html"><u><span style="font-size:11pt;">HIPAA</span></u></a><span style="font-size:11pt;">, or </span><a href="https://gdpr.eu/"><u><span style="font-size:11pt;">G</span></u><u><span style="font-size:11pt;">DPR</span></u></a><span style="font-size:11pt;">.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">3.&nbsp;</span><b><span style="font-size:11pt;">Least Privilege:</span></b><span style="font-size:11pt;">&nbsp;Limiting access to resources to only those who need it for their roles.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">4.&nbsp;</span><b><span style="font-size:11pt;">Defense in Depth:</span></b><span style="font-size:11pt;">&nbsp;Implementing many layers of security to protect against various threats.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">5.&nbsp;</span><b><span style="font-size:11pt;">Regular Updates:</span></b><span style="font-size:11pt;">&nbsp;Ensuring that security measures are continuously updated to address new threats.</span></p><p style="text-align:justify;margin-left:72pt;"><span style="font-weight:bold;font-size:11pt;">6.&nbsp;</span><b><span style="font-size:11pt;">User Education:</span></b><span style="font-size:11pt;">&nbsp;Educating users about security best practices and potential risks.</span></p></div></div>
</div><div data-element-id="elm_695RfFEpJF7BZ_EJbTvSkg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_695RfFEpJF7BZ_EJbTvSkg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why Secure-by-Design Matters</span></h2></div>
<div data-element-id="elm_9tL5Q-_UPVqe13z76Vy1cw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_9tL5Q-_UPVqe13z76Vy1cw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:12pt;"><span style="font-size:11pt;">Understanding and implementing Secure by Design practices is crucial for several reasons:</span></p></div></div>
</div><div data-element-id="elm_uKbgtJ39qXtsDJG9XvweWA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uKbgtJ39qXtsDJG9XvweWA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Proactive Security</span><br></p></div></h3></div>
<div data-element-id="elm__iQPhnbY2L8ftWc5FlPM2g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm__iQPhnbY2L8ftWc5FlPM2g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;margin-bottom:8pt;"><span style="font-size:11pt;">Traditional cybersecurity approaches are often reactive. This means they address security issues after they've occurred. Secure by Design builds security measures into the very foundation of a system. This minimizes vulnerabilities from the start.</span></p></div></div>
</div><div data-element-id="elm_JnVpTC-FBPpL0TEHACI12w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_JnVpTC-FBPpL0TEHACI12w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Cost Savings</span></h3></div>
<div data-element-id="elm_iGq93TWMpUkx2nT40VfQsw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_iGq93TWMpUkx2nT40VfQsw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:11pt;">Addressing security issues after a system is in production can be costly. The same is true for trying to address them near the end of a project. By integrating security from the&nbsp;</span><span style="font-size:11pt;color:inherit;">beginning, you can avoid these extra expenses.</span></p></div></div>
</div><div data-element-id="elm_Ql1tUXU9p0TN9wKdr6nneA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ql1tUXU9p0TN9wKdr6nneA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Regulatory Compliance</span><br></p></div></h3></div>
<div data-element-id="elm_qTrYfoG-AG15pZMVWKe0dQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qTrYfoG-AG15pZMVWKe0dQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="font-size:11pt;color:inherit;">Many industries are subject to strict regulatory requirements for data protection and cybersecurity. Secure by Design practices can help you meet these compliance standards more effectively. It reduces the risk of unknowns that end up costing you in fines and penalties.</span></p></div>
</div><div data-element-id="elm_EhYhxU71KJJYFVdZ6V_W6w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EhYhxU71KJJYFVdZ6V_W6w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Reputation Management</span></h3></div>
<div data-element-id="elm_0vV6uRNmRYclxC2lPryJAg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_0vV6uRNmRYclxC2lPryJAg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><span style="font-size:11pt;">A security breach can severely damage your organization's reputation. Implementing Secure by Design practices demonstrates your commitment to protecting user data. It can also enhance trust among customers and stakeholders.</span></p></div></div>
</div><div data-element-id="elm_1RN_xmTbv46JzfG-FkqHmQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_1RN_xmTbv46JzfG-FkqHmQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Future-Proofing</span></h3></div>
<div data-element-id="elm_FJG_q3AqqLM5DAFz50PgRA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_FJG_q3AqqLM5DAFz50PgRA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Cyber threats continue to evolve. Secure by Design practices help ensure that your systems and applications remain resilient. Especially against emerging threats.</span></p></div></div>
</div><div data-element-id="elm_QxG4ihXcYtpAa7IYh_aFiw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QxG4ihXcYtpAa7IYh_aFiw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Minimizing Attack Surfaces</span></h3></div>
<div data-element-id="elm_gXuSVegu2MwSsfG4FAx3OQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_gXuSVegu2MwSsfG4FAx3OQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Secure by Design focuses on reducing the attack surface of your systems. Using it helps in identifying and mitigating potential vulnerabilities. You mitigate threats before a hacker exploits them.</span></p></div></div>
</div><div data-element-id="elm_DEkgLevCaOHO5-u7wEIcQw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DEkgLevCaOHO5-u7wEIcQw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Need to Modernize Your Cybersecurity Strategy?</span></h2></div>
<div data-element-id="elm_yhu1rya743cQgWCH9Nuh5w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_yhu1rya743cQgWCH9Nuh5w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">A cybersecurity strategy put in place five years ago can easily be outdated today. Need some help modernizing your company’s cybersecurity?</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Give us a call today to schedule a chat.</span></p><p><b><span style="font-size:11pt;">Article used with permission from </span></b><a href="https://thetechnologypress.com/why-you-need-to-understand-secure-by-design-cybersecurity-practices/"><b><u>The Technology Press.</u></b></a><b><span style="font-size:11pt;">&nbsp;</span></b></p></div></div>
</div><div data-element-id="elm_UQjhnsqIQBmR70nOvSqSIA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_UQjhnsqIQBmR70nOvSqSIA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 22 Jan 2024 07:03:25 +0000</pubDate></item><item><title><![CDATA[A Letter to Brocent Client]]></title><link>https://www.brocent.com.sg/blogs/post/A_Letter_to_Brocent_Client</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/2.jpg"/>We are writing to inform you about an important security vulnerability that has recently been identified.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_OJoxhkXnQaWYYuZodqjo3w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_PuboVTwhSYiTsgCKLj-YqQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_rsrOSSrXSKiIdn2XPgaYgw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_7nCxevkdT9uR5r-vLtDiGQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_7nCxevkdT9uR5r-vLtDiGQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true">A Letter to Brocent Client</h2></div>
<div data-element-id="elm_lc4XffAkIBHr8u1lK5SCNg" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_lc4XffAkIBHr8u1lK5SCNg"] .zpimage-container figure img { width: 612px !important ; height: 344px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_lc4XffAkIBHr8u1lK5SCNg"] .zpimage-container figure img { width:612px ; height:344px ; } } @media (max-width: 767px) { [data-element-id="elm_lc4XffAkIBHr8u1lK5SCNg"] .zpimage-container figure img { width:612px ; height:344px ; } } [data-element-id="elm_lc4XffAkIBHr8u1lK5SCNg"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/2.jpg" width="612" height="344" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_vb8I54YVRbGpK6FfazrIaQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_vb8I54YVRbGpK6FfazrIaQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Dear Brocent Client,</span></p><p style="text-align:justify;"><span style="font-size:12pt;">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:12pt;">We are writing to inform you about an important security vulnerability that has recently been identified. This vulnerability concerns the Cisco Adaptive Security Appliance (ASA) Software and Firepower Threat Defense (FTD) Software, specifically related to Remote Access VPN.</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">This vulnerability allows an unauthenticated, remote attacker to establish a VPN session with an affected device, potentially leading to unauthorized access and further exploitation. If you are running Cisco ASA or FTD Software, you may be at risk.</span></p></div></div>
</div><div data-element-id="elm_IbJRrYChMknBFr3G4n_Hrw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IbJRrYChMknBFr3G4n_Hrw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Why is this important?</span><br></h2></div>
<div data-element-id="elm_eI1F2f3l8Y6PyhteP66N4A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_eI1F2f3l8Y6PyhteP66N4A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">IT security is an essential aspect of our daily operations. Regular checks and updates can protect your systems from threats and avoid potential business disruption. This vulnerability highlights the need to maintain an active and ongoing IT security posture.</span></p></div></div>
</div><div data-element-id="elm_CeWDEpCjDPcYhOHQ38ohIA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CeWDEpCjDPcYhOHQ38ohIA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">What can you do to workaround around this?</span></h2></div>
<div data-element-id="elm_fY5rfiQe9NsxkQBkswFf9g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_fY5rfiQe9NsxkQBkswFf9g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Brute Force Attack Against the LOCAL User Database:&nbsp;</span></h3></div>
<div data-element-id="elm_VWMY4-cuvRWfbQ8aaFU7EQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VWMY4-cuvRWfbQ8aaFU7EQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p class="MsoNormal" style="text-align:justify;"><span lang="EN-US" style="font-size:12pt;font-family:Aptos, sans-serif;color:black;">To counter brute force attacks against the LOCAL user database, limit the number of consecutive failed login attempts that the ASA allows for a given user in the LOCAL user database using the aaa local authentication attempts max-fail number command in global configuration mode.</span><span lang="EN-US"></span></p></div>
</div><div data-element-id="elm_YIeXreM6Cr_9cKx8JFm0yQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YIeXreM6Cr_9cKx8JFm0yQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Brute Force Attacks Against an External User Database:</span></h3></div>
<div data-element-id="elm_PSQnUM1MwjyMJjrIvW0e7w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PSQnUM1MwjyMJjrIvW0e7w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">To counter brute force attacks against an external user database, limit the number of consecutive failed login attempts per user in the external user database.</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">If the external user database is Cisco Identity Services Engine (ISE), this can be configured under Administration &gt; Identity Management &gt; Settings &gt; User Authentication Settings &gt; Lock/Suspend Account with Incorrect Login Attempts.</span></p></div></div>
</div><div data-element-id="elm_3-eOJdkMAu_jLTN2mLn6Qw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_3-eOJdkMAu_jLTN2mLn6Qw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Dynamic Access Policies:</span><br></h3></div>
<div data-element-id="elm_63CopxIbfyuUVzDqJ53lvA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_63CopxIbfyuUVzDqJ53lvA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Administrators can configure a dynamic access policy (DAP) to terminate VPN tunnel establishment when the DefaultADMINGroup or DefaultL2LGroup connection profile/tunnel group is used. For more information on how to configure DAP, see the Configure Dynamic Access Policies section of the Cisco ASA Series VPN ASDM Configuration Guide.</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">Deny Remote Access VPN Using the Default Group Policy (DfltGrpPolicy)</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">When the DfltGrpPolicy is not expected to be used for remote access VPN policy assignment, administrators can prevent remote access VPN session establishment using the DefaultADMINGroup or DefaultL2LGroup connection profiles/tunnel groups by setting the VPN-simultaneous-logins option for the DfltGrpPolicy to zero</span></p></div></div>
</div><div data-element-id="elm_QtKbUuGPQuECWJaeB9_ceg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QtKbUuGPQuECWJaeB9_ceg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Regular checks:</span></h3></div>
<div data-element-id="elm_mPBOCW6npakHmQNUXGvmCg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mPBOCW6npakHmQNUXGvmCg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Carry out regular security audits on your systems. This can help you identify any unusual activity or potential vulnerabilities before they can be exploited.</span></p></div></div>
</div><div data-element-id="elm_I-aWR-JjcXoqhp6288_0Xw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_I-aWR-JjcXoqhp6288_0Xw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">Education:</span></h3></div>
<div data-element-id="elm_bzDeS67YAxsJ3lq-YH6WTQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bzDeS67YAxsJ3lq-YH6WTQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;"><span style="font-size:12pt;">Make sure that you and your staff are aware of the potential threats and how to handle them. Regular training and updates on the latest threats can significantly reduce the risk of security breaches.</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">We urge you to take immediate action to mitigate the risk associated with this vulnerability. If you need any assistance in dealing with this issue or if you have any further questions, please feel free to reach out to our support team.</span></p><p style="text-align:justify;">&nbsp;</p><p style="text-align:justify;"><span style="font-size:12pt;">Thank you for your attention to this critical matter.</span></p></div></div>
</div><div data-element-id="elm_FL6F1oEZS_GCEe3hIozvYQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FL6F1oEZS_GCEe3hIozvYQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 20 Oct 2023 09:08:12 +0000</pubDate></item><item><title><![CDATA[Have You Tried Microsoft Universal Print Learn What It Can Do for You？]]></title><link>https://www.brocent.com.sg/blogs/post/have-you-tried-microsoft-universal-print-learn-what-it-can-do-for-you？</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/TTT_Blog-Post-Social-Media-Image-Have-You-Tried-Microsoft-Universal-Print-V1.png"/>Looking to improve how you handle document printing? Do you wish you could avoid printer problems? Below, we’ll explore the benefits and features of Microsoft Universal Print. We’ll also help you discover how it can enhance your printing environment.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_XJAo_uA_QAyaUJQZe1PMzA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_a0LF8qc9SBa29RiWgQOsEA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_U0Il2p-bST66EVbBEFg-tg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_x8hl0vHXRbKtABPPo4Sx_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_x8hl0vHXRbKtABPPo4Sx_g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><div style="color:inherit;"><p>Have You Tried Microsoft Universal Print Learn What It Can Do for You？</p></div></h2></div>
<div data-element-id="elm_R7GX4SrGHUnqt_6qYfJs4w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_R7GX4SrGHUnqt_6qYfJs4w"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_R7GX4SrGHUnqt_6qYfJs4w"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_R7GX4SrGHUnqt_6qYfJs4w"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_R7GX4SrGHUnqt_6qYfJs4w"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Post202301/TTT_Blog-Post-Social-Media-Image-Have-You-Tried-Microsoft-Universal-Print-V1.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_t8uc6M0WRAuhd6iHS6Mpnw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_t8uc6M0WRAuhd6iHS6Mpnw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>In today's digital workplace, printing remains an essential function. This is true for just about all businesses. But keeping up with your print infrastructure can be a time-consuming task. One printer down can mean work comes to a standstill.</p><p>Another issue is keeping up with all those printer drivers. If firmware updates aren’t done, vulnerabilities exist. One unprotected printer can cause an entire network malware infection.</p><p>Microsoft has come up with an answer to streamline print management. This solution is called <a href="https://www.microsoft.com/en-us/microsoft-365/windows/universal-print">Microsoft Universal Print</a> It offers a modern answer to age-old print problems.</p><p><span style="color:inherit;">Looking to improve how you handle document printing? Do you wish you could avoid printer problems? Below, we’ll explore the benefits and features of Microsoft Universal Print. We’ll also help you discover how it can enhance your printing environment.</span></p></div></div>
</div><div data-element-id="elm_p8g_bSaAxOecL4YkvCxr_g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_p8g_bSaAxOecL4YkvCxr_g"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>What Can Microsoft Universal Print Do for You?</p></div></h2></div>
<div data-element-id="elm_HtPRjkFSqo2BgwK3ZriTPg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_HtPRjkFSqo2BgwK3ZriTPg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:justify;">Microsoft Universal Print leverages the power of Microsoft 365 and Azure. It eliminates the need for complex on-premises print infrastructure. Here are some of the ways that it can improve your document handling.</p></div></div>
</div><div data-element-id="elm_icXYPnw4hcAFXeJqaJkLJg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_icXYPnw4hcAFXeJqaJkLJg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Simplifying Print Management</p></div></h3></div>
<div data-element-id="elm_ddOJ9CBmeeUXR62-s8UXBQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ddOJ9CBmeeUXR62-s8UXBQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Microsoft Universal Print eliminates the need for on-premises print servers. Print management becomes more simplified and all in one place. Organizations can centrally manage their printing needs from the cloud. </p><p style="text-align:justify;">This ease of use removes the need for complex print server configurations. As well as driver installations and print queue management. This results in significant time and cost savings.</p></div></div>
</div><div data-element-id="elm_YUsTWv5G6oCx0IQ2rXq4CQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_YUsTWv5G6oCx0IQ2rXq4CQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Seamless Integration with Microsoft 365</p></div></h3></div>
<div data-element-id="elm_mKIABT2JSn1XSHtDLtTxpA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_mKIABT2JSn1XSHtDLtTxpA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>A key advantage of Universal Print is its seamless integration with Microsoft 365. It works in tandem with Azure Active Directory. This ensures a secure and authenticated printing experience for users. </p><p style="text-align:justify;">This integration allows users to print from any device, whether it's a Windows PC, Mac, or mobile device. There’s no need for complex setup or driver installations. It simplifies the printing process. It also enhances productivity for employees working across different platforms.</p></div></div>
</div><div data-element-id="elm_qKHuX_IAbqU9BwlZUmjwOA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qKHuX_IAbqU9BwlZUmjwOA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Flexibility and Scalability</p></div></h3></div>
<div data-element-id="elm_V_VN4o59uRchkJudzuiADg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_V_VN4o59uRchkJudzuiADg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>With Microsoft Universal Print, organizations gain flexibility and scalability in their print activities. It supports both modern and legacy printers. This allows businesses to leverage their existing printer fleet. </p><p style="text-align:justify;">Universal Print enables easy connectivity. This is true whether it's a local printer or a network printer. As well as management through the cloud. Additionally, it offers centralized control and monitoring of printers. This makes it effortless to scale up or down based on business needs.</p></div></div>
</div><div data-element-id="elm_Zv0P4ClhSt8eJueFf7wcNQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Zv0P4ClhSt8eJueFf7wcNQ"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Streamlined Printer Deployment</p></div></h3></div>
<div data-element-id="elm_IUtm0Bu4MQcjwRXSdWwldg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_IUtm0Bu4MQcjwRXSdWwldg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Deploying printers across an organization can be a time-consuming task. Microsoft Universal Print simplifies this process. It does this by providing a centralized portal for printer management.&nbsp; </p><p style="text-align:justify;">Administrators can easily add and configure printers. They can assign them to specific users or groups. As well as manage printer settings from a single interface. This eliminates the need for manual configuration on individual devices. Which can be very time-consuming and fraught with issues. It also ensures a consistent printing experience across the organization.</p></div></div>
</div><div data-element-id="elm_ftGFw3nJ9cEO16zFMpHm1w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ftGFw3nJ9cEO16zFMpHm1w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Enhanced Security and Compliance</p></div></h3></div>
<div data-element-id="elm_MIxk203jeCvzSi7CGgX2TQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MIxk203jeCvzSi7CGgX2TQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>A big benefit of using Microsoft Universal Print is its security capabilities. Print security is a critical concern for businesses, especially in today's threat landscape. Microsoft Universal Print enhances security by leveraging Azure Active Directory. It’s used for authentication and access control. </p><p>It also supports secure print release. This means that sensitive documents are only printed under certain circumstances. Namely, when the authorized user is physically present at the printer.&nbsp; </p><p>Moreover, Universal Print integrates with Microsoft Endpoint Manager. This gives organizations even more capabilities. They can enforce security policies and manage print-related settings from a centralized location.</p></div></div>
</div><div data-element-id="elm_eQq2xuGxHCSgdeQG1FVZhA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eQq2xuGxHCSgdeQG1FVZhA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Insights and Analytics</p></div></h3></div>
<div data-element-id="elm_Ddlr34NLD1jRwNrJJBwEoA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Ddlr34NLD1jRwNrJJBwEoA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Understanding print usage and optimizing print infrastructure is essential for efficient cost management. Microsoft Universal Print provides insights and analytics that help organizations gain visibility. They’re able to see print usage patterns. As well as track printing costs and identify opportunities for optimization.&nbsp; </p><p>With detailed reporting and analytics, businesses can make informed decisions. Reporting enables better print resource allocation. As well as the implementation of strategies to reduce printing costs.</p></div></div>
</div><div data-element-id="elm_9JYbPPrwsGRkiU7obfzUyA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9JYbPPrwsGRkiU7obfzUyA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Is Microsoft Universal Print for You?</p></div></h2></div>
<div data-element-id="elm_18ufcWp7Nu6CwezUl9ecVA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_18ufcWp7Nu6CwezUl9ecVA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>Microsoft Universal Print offers a modern and efficient approach to print management. It streamlines the printing experience for organizations. It also eliminates the need for complex on-premises print infrastructure. There are also important benefits from the boost in security.</p><p>But is it for you?</p><p>We can help you understand the full capabilities of Microsoft Universal Print. Including the costs versus the benefits. Whether the solution is for you will depend on your printing needs. Extra factors to consider will be how often you print and your number of endpoints.</p></div></div>
</div><div data-element-id="elm_qSrtFKnetJlRMJHH7Xwajg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_qSrtFKnetJlRMJHH7Xwajg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p>Get Cost-Efficient Technology Answers</p></div></h2></div>
<div data-element-id="elm_WH1TOuGApDQ_tKB1Wsic_g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_WH1TOuGApDQ_tKB1Wsic_g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p>It’s not easy to make software decisions on your own. That’s why we’re here to help! We can sit down with you to discuss your current infrastructure. We’ll help you evaluate solutions, like Microsoft Universal Print. Then, we’ll tell you straight up what makes the most sense for you.</p><p>Give us a call today to chat about your technology needs.</p><b><span style="font-size:11pt;">Article used with permission from </span></b><span style="font-size:11pt;"><a href="https://thetechnologypress.com/have-you-tried-microsoft-universal-print-learn-what-it-can-do-for-you/" target="_blank"><b>The Technology Press.</b></a></span><b></b></div></div>
</div><div data-element-id="elm_BDbgWWdDRZiHM5XSRTay-Q" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BDbgWWdDRZiHM5XSRTay-Q"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Security%20Service&amp;body=Hi%2C%20%0AI'm%20very%20interesting%20in%20your%20IT%20service.%20%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%20%0ARegards.%20%0A"><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 22 Sep 2023 06:18:11 +0000</pubDate></item><item><title><![CDATA[AD-HOC POBS Token Service Billing Rule]]></title><link>https://www.brocent.com.sg/blogs/post/Adhoc_Billing_Rule</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/BLOG_PHOTO/billing rule-1.png"/>ADHOC POBS Token Service Refers to the service billing model "Bill client Per Occurrence”, in short, it is the type of POBS Service. This document presents the general terms &conditions for the POBS services.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_c87uWgvmT0OHaJxM_f_IZA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_UFseyJDyQkiScnJlrYRMGA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_vX3VTLr3R2KvBzYRZLAaWA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_vX3VTLr3R2KvBzYRZLAaWA"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_k-SmBpfrQHyVDRZCDK4E5w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_k-SmBpfrQHyVDRZCDK4E5w"].zpelem-heading { border-radius:1px; } </style><h1
 class="zpheading zpheading-style-type1 zpheading-align-center " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;"><span style="font-weight:700;">AD-HOC TOKEN BILLING RULES</span></h1></div></h1></div>
<div data-element-id="elm_g8y4V1FO28PDcdrJWu9cfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_g8y4V1FO28PDcdrJWu9cfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;text-align:center;"><span style="font-weight:700;"><span style="font-size:18px;">Revision 0.1 on 06/24/2023</span></span></h1></div></div>
</div><div data-element-id="elm_DJSCe-CWRrxrVGqUhWMEeA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_DJSCe-CWRrxrVGqUhWMEeA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">General Terms</span></h2></div>
<div data-element-id="elm_43u1TIdYLNFOlMuVuvhLMg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_43u1TIdYLNFOlMuVuvhLMg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(0, 0, 0);"><span style="font-weight:700;">ADHOC POBS Token Service</span> Refers to the service billing model &quot;Bill&nbsp;client Per Occurrence”, in short, it is the type of POBS Service.</span></p><span style="font-size:15px;"></span><p><span style="color:rgb(0, 0, 0);font-size:15px;">&nbsp;</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.1.<span style="font-weight:normal;">&nbsp; </span></b>The client will pay the Service Provider the fees set out in this billing rule:</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">a.&nbsp; Service Provider shall advise the service rate per service request;</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">b.&nbsp; Client shall approve the rate by issuing the Purchase Order. Purchase order is bonded to the term &amp;conditions set forth in Master IT Service Agreement.</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">c.&nbsp; Service Provider shall provide the “Per Occurrence” service report and bill calculation.</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">d.&nbsp; Client shall review and acknowledge the report and bill calculation.</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">e.&nbsp; The client shall validate and confirm the Bill Calculation within 1 business day and shall provide the updated PO within 1 business day.</span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">f.&nbsp; The client shall pay for the rendered service within the agreed financial credit term.</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.2.<span style="font-weight:normal;">&nbsp; </span></b>If the client provides the updated PO, service provider will issue a matching invoice to the Client within 5 days, which will be paid30 days. 30 days payment term means BROCENT shall receive the fund within 30 calendar days upon the BROCENT invoice date. BROCENT does not accept delayed payment, though client may have their own monthly accounting payment schedule.</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.3.<span style="font-weight:normal;">&nbsp; </span></b>If there be any dispute of some specific service report and its bill calculation in the commercial invoice, Client shall still arrange the payment. The corrected amount of invoice will be credited in the next invoice cycle. </span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.4.<span style="font-weight:normal;">&nbsp; </span></b>If the client agrees the service schedule by email confirmation to the service provider and cancels the service 24 hours prior to the Appointment Date/time, the client shall pay 2 hours service charge and the travel charge (if it is applicable) to the service provider.</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.5.<span style="font-weight:normal;">&nbsp; </span></b>The service provider provides the onsite engineer support service, that is Minimum 2 hours charge per visit, and substantial 1-hour increments. </span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.6.<span style="font-weight:normal;">&nbsp; </span></b>If the Service Provider supplies the Client with a Billing Schedule:</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);">a.&nbsp; It must include the incident reference numbers, which relate to the preceding period, and the associated charge by Service type, in the English language.</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="font-size:15px;color:rgb(0, 0, 0);"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.7.<span style="font-weight:normal;">&nbsp; </span></b>All Fee sand other sums payable by the Primary to the Service Provider are (unless otherwise specified) inclusive of all taxes, including sales tax.</span></p><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><br></span></p><span style="font-size:15px;"></span><p style="margin-right:4.75pt;text-align:justify;"><span style="color:rgb(0, 0, 0);font-size:15px;"><b>1.8.<span style="font-weight:normal;">&nbsp; </span></b>If the client delays the payment, it subjects 25% of total overdue invoice amount per calendar day.</span></p></div>
</div><div data-element-id="elm_blVDrbp-S90QdYQUeutlIw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_blVDrbp-S90QdYQUeutlIw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Over Time Approval</span></h2></div>
<div data-element-id="elm_L2GVuRdMHet1oCA4SMVzTA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_L2GVuRdMHet1oCA4SMVzTA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><span style="font-weight:700;">Approval and Evidence:</span> Business email is the only agreed and authorized way of giving the approval from Client to BROCENT specially on Ticket operation level. Any verbal or approval on WECHAT and/or Line, and/or SKYPE, and/or WHATSAPP is not being considered as “APPROVAL”.</span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><span style="font-weight:700;">Repeal or Rescind or amend Approval:</span> neither form of change is accepted. Exception is accepted for some emergent situation.</span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);">&nbsp;</span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><span style="font-weight:700;">Over-Time</span>: Partner will not allow its engineers to do over time job, unless CLIENT issues the official email approval to BROCENT Service Desk and its help desk specialist. Failure in receiving the official email approval from client will subject to an agreed term that BROCENT onsite technician shall end the assigned job on and before 18:00 in any working day. No over time service will be paid if BROCENT works without receiving client email approval.</span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><span style="font-weight:700;">SCR: Service Call Report</span> to be submitted by BROCENT within two working hours or the earliest second business day upon the completion of activity. Date, Time and SPOC signature must be mentioned clearly and should be readable. Correctly filled and signed SCR is mandatory for billing</span><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><br></span></p><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);">&nbsp;</span></p></div></div>
</div><div data-element-id="elm_5kKSeqpo6XW8rvb9XpmDDA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_5kKSeqpo6XW8rvb9XpmDDA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Example of Bill Calculation</span></h2></div>
<div data-element-id="elm_b4QVOMJYh9FoY3qC23-UtA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_b4QVOMJYh9FoY3qC23-UtA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:justify;"><span style="font-size:10.5pt;color:rgb(0, 0, 0);"><span style="font-weight:700;">Calculation of Service Charge:</span></span></p><div><span style="font-size:10.5pt;color:rgb(0, 0, 0);">1. If the service start time in the first hour falls to 17:00 – 17:30, the first hour charge is agreed as “office hourly rate”.</span></div>
<div><span style="font-size:10.5pt;color:rgb(0, 0, 0);">2. If the service start time in the first hour falls to 17:30 – 18:00, the first hour charge is agreed as “non office hourly rate”;</span></div><div>3.&nbsp;<span style="color:rgb(0, 0, 0);font-size:10.5pt;">If the extra time on task after the initial two hours is less than 15 mins, the total extra time is agreed as “Non-billable”;</span></div>
<div><span style="font-size:10.5pt;color:rgb(0, 0, 0);">4.&nbsp; If the extra time on task after the initial two hours is more than 15 mins and less than 60 mins, the total extra time is agreed as “substantial 1 billable hour” </span></div>
<div><span style="font-size:10.5pt;color:rgb(0, 0, 0);">5. If actual time on task is less than the enforced TOT, it will be billed based on the actual time on task</span></div>
</div></div></div><div data-element-id="elm_v-G6knCFzrCkjnUIJ9VlQg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_v-G6knCFzrCkjnUIJ9VlQg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Appendix - Bill Rule for Prepaid Token Services</span></h2></div>
<div data-element-id="elm_5tnElOGvcDxi0bvP6ZZRwA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_5tnElOGvcDxi0bvP6ZZRwA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><table border="0" cellpadding="0" cellspacing="0" width="878"><colgroup><col width="43" style="width:32pt;"><col width="499" style="width:374pt;"><col width="204" style="width:153pt;"><col width="132" style="width:99pt;"></colgroup><tbody><tr height="47"><td style="width:32pt;" class="zp-selected-cell"><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">#</span></p></td><td><p style="text-align:justify;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">Billing Condition</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">Minimum Charge, First 2 Hours</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">Bill Increments</span></p></td></tr><tr height="32"><td style="width:32pt;"><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">1</span></p></td><td><p style="text-align:justify;"><span style="font-size:10pt;color:rgb(0, 0, 0);">09:00 -18:00, Working Hour</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">2 token</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">1 Token</span></p></td></tr><tr height="32"><td style="width:32pt;"><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">2</span></p></td><td><p style="text-align:justify;"><span style="font-size:10pt;color:rgb(0, 0, 0);">18:00-22:00, Monday-Friday</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">3 token</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">1.5 token </span></p></td></tr><tr height="43"><td style="width:32pt;"><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">3</span></p></td><td><p style="text-align:justify;"><span style="font-size:10pt;color:rgb(0, 0, 0);">22:00 or later, Monday-Friday, or </span></p><p style="text-align:justify;"><span style="font-size:10pt;color:rgb(0, 0, 0);">Any time in the weekend</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">4 token</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">2 token</span></p></td></tr><tr height="43"><td style="width:32pt;"><p style="text-align:center;"><span style="font-size:10pt;font-weight:bold;color:rgb(0, 0, 0);">4</span></p></td><td><p style="text-align:justify;"><span style="font-size:10pt;color:rgb(0, 0, 0);">Any time in Public Holiday</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">6 token</span></p></td><td><p style="text-align:center;"><span style="font-size:10pt;color:rgb(0, 0, 0);">3 token </span></p></td></tr></tbody></table></div></div>
</div><div data-element-id="elm_wFoss2YvLvMEx4ztfZ8QfA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_wFoss2YvLvMEx4ztfZ8QfA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div><p style="text-align:left;"><span style="color:rgb(0, 0, 0);"><span style="font-size:10pt;font-weight:bold;">Additional Token charge for travel, parts delivery and logistic.</span><span style="font-size:10pt;font-weight:bold;">Additional Token charge for travel, parts delivery and logistic.</span></span></p></div></div>
</div><div data-element-id="elm_r96z9CMi4aQ6l8PgmAiF3Q" data-element-type="table" class="zpelement zpelem-table "><style type="text/css"> [data-element-id="elm_r96z9CMi4aQ6l8PgmAiF3Q"].zpelem-table{ border-radius:1px; } [data-element-id="elm_r96z9CMi4aQ6l8PgmAiF3Q"] .zptable{ width:100% !important; } </style><div class="zptable zptable-align-center zptable-header- zptable-header-none zptable-cell-outline-on zptable-outline-on zptable-style- " data-width="100" data-editor="true"><table style="width:100%;"><tbody><tr><td style="text-align:center;width:4.6625%;" class="zp-selected-cell"> 1</td><td style="width:60.7581%;"><span style="color:rgb(0, 0, 0);"> 1.&nbsp;Extra Charge for Heavy Part Travel: Engineer may need to bring a complete set of spare machine (i.e., a server, a cisco network device) or any heavy spare part to a service premise that will be 1 token charged.</span><div><div><span style="font-size:10pt;color:rgb(0, 0, 0);"><br></span></div><div><span style="font-size:10pt;color:rgb(0, 0, 0);">2.&nbsp;Extra Charge for Night Travel: Engineer may need to handle the request with higher priority or severity during the night (18:00-21:00), later than that, it will be Max. 2 tokens charged in total.</span></div><div><span style="font-size:10pt;color:rgb(0, 0, 0);"><br></span></div><div><span style="color:rgb(0, 0, 0);"><span style="font-size:10pt;">3.&nbsp;</span><span style="font-size:10pt;font-weight:bold;"><span style="font-weight:400;">Extra Charge for Remote Site:&nbsp; Engineer may need to handle request for a site that is not within the SOW or a site with 1+ hour travel time. 1 Token is charged if single trip is less than 30KM; 2 tokens are charged if single trip is 30KM – 50KM.</span></span></span></div></div></td><td style="width:33.3333%;"><span style="color:rgb(0, 0, 0);"> <span style="font-size:13.3333px;font-weight:700;">Max. 2 token per site visit</span></span></td></tr><tr><td style="text-align:center;width:4.6625%;"><span style="color:rgb(0, 0, 0);"> 2</span></td><td style="width:60.7581%;"><span style="color:rgb(0, 0, 0);"> 1. Logistic Cost: this rule is applicable for the customer(s) using BROCENT zone IT Warehouse Service.</span><div><div><span style="font-size:10pt;color:rgb(0, 0, 0);">2. This happens when it is requested to courier Parts from one warehouse to another one, except the big part or mass warehouse relocation, it is to charge 1 Token for domestic shipment.</span></div></div></td><td style="width:33.3333%;"><span style="color:rgb(0, 0, 0);"> <span style="font-size:13.3333px;">1 token per shipment</span></span></td></tr><tr><td style="text-align:center;width:4.6625%;"><span style="color:rgb(0, 0, 0);"> 3</span></td><td style="width:60.7581%;"><span style="color:rgb(0, 0, 0);"> <span style="font-size:13.3333px;">Warehouse Cost: this rule is applicable for customer(s) using BROCENT zone IT warehouse (Std. 1 Cubic Meter) service to store IT parts.</span></span></td><td style="width:33.3333%;"><span style="color:rgb(0, 0, 0);"> ·Short term (&lt;1 month): Free for 1 month.</span><div><div><span style="font-size:10pt;color:rgb(0, 0, 0);">·Long term(&gt;1 month): TBD</span></div></div></td></tr></tbody></table></div>
</div><div data-element-id="elm_HO8EuDfcaootyKooL8H4Sw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_HO8EuDfcaootyKooL8H4Sw"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">General Service Flow</span></h2></div>
<div data-element-id="elm_8MU43Hmbs9rd7UKUxiNZmw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8MU43Hmbs9rd7UKUxiNZmw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(52, 73, 94);">This section presents the general IT Services Flow, and the mechanism how the service is being governed and escalated so as to ensure the service quality and consistency. You may find the general steps and contact information where the client may reach out BROCENT for any assistance.</span></p></div>
</div><div data-element-id="elm_hgC0JujOGecATFSLJcsXnA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_hgC0JujOGecATFSLJcsXnA"] .zpimage-container figure img { width: 1000px !important ; height: 622px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_hgC0JujOGecATFSLJcsXnA"] .zpimage-container figure img { width:1000px ; height:622px ; } } @media (max-width: 767px) { [data-element-id="elm_hgC0JujOGecATFSLJcsXnA"] .zpimage-container figure img { width:1000px ; height:622px ; } } [data-element-id="elm_hgC0JujOGecATFSLJcsXnA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-roundcorner zpimage-space-none " src="/BLOG_PHOTO/Service%20Flow.png" width="1000" height="622" loading="lazy" size="original" alt="BROCENT SERVICE FLOW" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">BROCENT SERVICE FLOW</span></figcaption></figure></div>
</div><div data-element-id="elm_dbz1XDABw_WOTBX2YRC2KA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_dbz1XDABw_WOTBX2YRC2KA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="font-weight:700;">Contact BROCENT</span></h2></div>
<div data-element-id="elm_Dhh0mzgiCaMkj0V8kxlBeg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_Dhh0mzgiCaMkj0V8kxlBeg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(0, 0, 0);">1. For any commercial related topics, client may contact accounts@brocent.com for responsive support.</span></p><p><span style="color:rgb(0, 0, 0);">2. For any service and solution related topics, client may directly contact the SPOC in Service Desk Team, or reach out the agent's escalation point.</span></p></div>
</div><div data-element-id="elm_Em3vB240w00cXVz2Oimw4w" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_Em3vB240w00cXVz2Oimw4w"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-left "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="/contact" target="_blank"><span class="zpbutton-content">Contact</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 23 Jun 2023 08:56:03 +0000</pubDate></item><item><title><![CDATA[10 Tips to Help Small Businesses Get Ready for the Unexpected]]></title><link>https://www.brocent.com.sg/blogs/post/10_tips_to_help_small_businesses_get_ready_for_the_unexpected</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/TTT_Blog-Post-Social-Media-Image-10-Tips-to-Help-S1686273769260.png"/>What would you do if your business suffered a ransomware attack tomorrow?]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Y6cS-D6fT7yL3MGvsjkwaA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kbcJMQa_QlWuXkdpzpd4aw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_d3yzay86R-2FDtHxXCghxg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_n1F-1PD4SJ2lilBCX388HQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_n1F-1PD4SJ2lilBCX388HQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">10 Tips to Help Small Businesses Get Ready for the Unexpected</span></h2></div>
<div data-element-id="elm_qwHIcjrOszazFCAvCM4wHQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_qwHIcjrOszazFCAvCM4wHQ"] .zpimage-container figure img { width: 1070px ; height: 559.97px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_qwHIcjrOszazFCAvCM4wHQ"] .zpimage-container figure img { width:723px ; height:378.37px ; } } @media (max-width: 767px) { [data-element-id="elm_qwHIcjrOszazFCAvCM4wHQ"] .zpimage-container figure img { width:415px ; height:217.18px ; } } [data-element-id="elm_qwHIcjrOszazFCAvCM4wHQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/TTT_Blog-Post-Social-Media-Image-10-Tips-to-Help-S1686273769260.png" width="415" height="217.18" loading="lazy" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_GmUJau86QWitOvNKn3BxxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GmUJau86QWitOvNKn3BxxQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">What would you do if your business suffered a ransomware attack tomorrow? Do you have a contingency plan in case of a tornado, hurricane, or earthquake? The unexpected can happen anytime, and small businesses can get hit particularly hard.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses are the backbone of many economies. They are critical for job creation, innovation, and community development. But running a small business comes with significant risks. This includes financial uncertainty, market volatility, and natural disasters. </span></p><p style="margin-bottom:12pt;"><a href="https://cybersecurityventures.com/60-percent-of-small-companies-close-within-6-months-of-being-hacked/"><b><i><u><span style="font-size:11pt;">60% of</span></u></i></b></a><b><i><span style="font-size:11pt;">&nbsp;small businesses fail within 6 months of falling victim to a cyber-attack.</span></i></b><b><i></i></b></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Thus, small business owners must prepare for the unexpected. This is to ensure their longevity and success. In this article, we will discuss some tips to help small businesses get ready for anything.</span></p></div></div>
</div><div data-element-id="elm_EW8z63Ni-gHcaJNu9jzv6w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EW8z63Ni-gHcaJNu9jzv6w"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">1. Create a Contingency Plan</span></h3></div>
<div data-element-id="elm_1pzzhzTy1Rs6jruwDp2h6A" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_1pzzhzTy1Rs6jruwDp2h6A"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">One of the most critical steps in preparing for the unexpected is to create a contingency plan. A contingency plan is a set of procedures that help a business respond to unforeseen events. Such as natural disasters, supply chain disruptions, or unexpected financial setbacks. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">The plan should outline the steps the business will take in the event of an emergency. Including who will be responsible for what tasks. As well as how to communicate with employees, customers, and suppliers.</span></p></div></div>
</div><div data-element-id="elm_uxB92_jL6F0uGSL5eIjQ4g" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_uxB92_jL6F0uGSL5eIjQ4g"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">2. Maintain Adequate Insurance Coverage</span></h3></div>
<div data-element-id="elm_MEyCWefh3sZJKnQrAHq8Ww" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_MEyCWefh3sZJKnQrAHq8Ww"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses should always maintain adequate insurance coverage. This protects them from unexpected events. Insurance policies should include things like:</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Liability coverage</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Property damage coverage</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Business interruption coverage</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Data breach costs</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Business interruption coverage is particularly important. It can help cover lost income and expenses during a disruption. Such as a natural disaster or supply chain disruption.</span></p><p style="margin-bottom:8pt;"><span style="font-size:11pt;">One of the newer types of policies is cybersecurity liability insurance. In today’s threat landscape, it has become an important consideration. Cybersecurity insurance covers things like costs to remediate a breach and legal expenses.</span></p></div></div>
</div><div data-element-id="elm_M5troId_kSfq4jJUwTeJgg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_M5troId_kSfq4jJUwTeJgg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">3. Diversify Your Revenue Streams</span></h3></div>
<div data-element-id="elm_ZVo-NtpyA0R5sYFf8OlUiA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_ZVo-NtpyA0R5sYFf8OlUiA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses that rely on a single product or service are at greater risk. Unexpected events can cause them significant harm. Something like a raw material shortage could cripple an organization without alternatives.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Diversifying your revenue streams can help reduce this risk. It ensures that your business has several sources of income. For example, a restaurant can offer catering services. A clothing store can sell merchandise online as well as its physical location.</span></p></div></div>
</div><div data-element-id="elm_lQf9DXHLZbdMNls_5xFLWg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lQf9DXHLZbdMNls_5xFLWg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">4. Build Strong Relationships with Suppliers</span></h3></div>
<div data-element-id="elm_v6aRZTbT-FG3JhrVmVragg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_v6aRZTbT-FG3JhrVmVragg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses should build strong relationships with their suppliers. This ensures that they have a reliable supply chain. This is particularly important for businesses relying on one supplier for their products. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">In the event of a disruption, having strong relationships matters. It mitigates the risk of a supplier bankruptcy or supply chain issue. Having supplier options can help reduce the impact on your business.</span></p></div></div>
</div><div data-element-id="elm_z1AFUBpOpN4__AFgMnuy_Q" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_z1AFUBpOpN4__AFgMnuy_Q"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">5. Keep Cash Reserves</span></h3></div>
<div data-element-id="elm_bY1aeAmR-IRHHBxiBMOekQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_bY1aeAmR-IRHHBxiBMOekQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses should keep cash reserves to help them weather unexpected events. Cash reserves can help cover unexpected expenses. Such as repairs, legal fees, or loss of income. As a general rule of thumb, businesses should keep at least six months' worth of expenses in cash reserves.</span></p></div></div>
</div><div data-element-id="elm_lQDv2uZffSNDVlfF2sYgJA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_lQDv2uZffSNDVlfF2sYgJA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">6. Build Strong Outsourcing Relationships</span></h3></div>
<div data-element-id="elm_08g-4W9y4NZZatohnXEI9Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_08g-4W9y4NZZatohnXEI9Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">If business owners try to do everything in house, they’re at higher risk. For example, if a key IT team member quits. In this case, the company could face major security issues.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Build strong outsourcing relationships with an IT provider and other critical support services. If something happens to a company’s staff or systems, they have a safety net.</span></p></div></div>
</div><div data-element-id="elm_P6v9KZYkJ8EiyUyPRtYLDA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_P6v9KZYkJ8EiyUyPRtYLDA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">7. Check Your Financials Regularly</span></h3></div>
<div data-element-id="elm_pGsFXLNvkGnUxC4aKFO_ZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_pGsFXLNvkGnUxC4aKFO_ZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small business owners should check their finances regularly. This is to ensure that they are on track to meet their goals and to identify any potential issues early on. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">This includes:</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Tracking income and expenses</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Creating and reviewing financial statements</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">·&nbsp;Regularly meeting with a financial advisor</span></p></div></div>
</div><div data-element-id="elm_KIKoQY3EH8H8hgy7RLpFKg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KIKoQY3EH8H8hgy7RLpFKg"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">8. Invest in Technology</span></h3></div>
<div data-element-id="elm_8TwI1vqSWsDaOXYxkF5hRg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_8TwI1vqSWsDaOXYxkF5hRg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:8pt;"><span style="font-size:11pt;">Investing in technology can help small businesses prepare for unexpected events. For example, cloud-based software can help businesses store their data off-site. This ensures that it is safe in the event of a natural disaster or cyber-attack. Technology can also help businesses automate processes. Automation reduces the risk of errors and improves efficiency.</span></p></div></div>
</div><div data-element-id="elm_9Bp5xRx9jIZLwQBWHXj6mA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_9Bp5xRx9jIZLwQBWHXj6mA"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">9. Train Employees for Emergencies</span></h3></div>
<div data-element-id="elm_cw4UnA7ldoUJqUDT576kXA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_cw4UnA7ldoUJqUDT576kXA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses should train their employees for emergencies. This helps ensure that everyone knows what to do in the event of an unexpected event. </span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">This includes training for natural disasters, cyber-attacks, and other emergencies. Businesses should also have a plan for communicating with employees during an emergency. As well as ensure that everyone has access to the plan.</span></p></div></div>
</div><div data-element-id="elm_IdDKm9VByMlTAn7RYEuyqw" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_IdDKm9VByMlTAn7RYEuyqw"].zpelem-heading { border-radius:1px; } </style><h3
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;">10. Stay Up to Date on Regulatory Requirements</span></h3></div>
<div data-element-id="elm_hYhg0XhdWYv42ylJr02fIg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_hYhg0XhdWYv42ylJr02fIg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Small businesses should stay up to date on regulatory requirements. This helps ensure that they are compliant with all laws and regulations. This includes tax laws, labor laws, and industry-specific regulations. Non-compliance can result in fines, legal fees, and damage to your business's reputation.</span></p><p style="margin-bottom:12pt;"><span style="font-size:11pt;">In conclusion, small businesses face many risks. But by following these tips, they can prepare themselves for the unexpected.&nbsp;</span></p></div></div>
</div><div data-element-id="elm_eujRmLHIlh-3QLrwQyoKTA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_eujRmLHIlh-3QLrwQyoKTA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><p><span style="color:inherit;">Improve Business Continuity &amp; Disaster Preparedness</span><br></p></div></h2></div>
<div data-element-id="elm_zHkrqWA5W03YOBri8wPmUA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_zHkrqWA5W03YOBri8wPmUA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="margin-bottom:12pt;"><span style="font-size:11pt;">Get started on a path to resilience and protect your business interests. We can help you prepare for the unexpected. Give us a call today to schedule a chat.</span></p><p><b><span style="font-size:11pt;">Article used with permission from </span></b><a href="https://thetechnologypress.com/10-tips-to-help-small-businesses-get-ready-for-the-unexpected/"><b><u>The Technology Press.</u></b></a><b><span style="font-size:11pt;">&nbsp;</span></b></p></div></div>
</div><div data-element-id="elm_iXbSKGSiT3q37kYryTipEw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_iXbSKGSiT3q37kYryTipEw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%0A%0AI'm%20very%20interesting%20in%20your%20IT%20service.%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%0A%0ARegards."><span class="zpbutton-content">Contact Consultant</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 09 Jun 2023 01:34:35 +0000</pubDate></item></channel></rss>