Share This

Saturday, December 27, 2014

The game-changing trends: social media, cloud, big data in information technology

Information technology players believe Malaysia is beginning to tap into the potential of the Internet of things.

KUALA LUMPUR: Social media, the cloud and big data will be the game-changing trends that will transform Malaysia’s information and communications technology (ICT) industry and spur further growth of the Internet of Things (IoT) next year, says industry players.

National ICT Association of Malaysia (Pikom) chairman Cheah Kok Hoong said Malaysia had started to tap into the rapidly growing potential of IoT, which could be a new economy by itself covering business areas such as embedded device manufacturing, connectivity infrastructure and application deployments.

He said the trend would provide a new opportunity to position the country as the hub for regional IoT innovation projects in South-East Asia.

However, companies would be increasingly challenged by new factors on the back of business agility that came with mobility, security, analytics, and miniaturisation of devices and millennial generation aspirations, he told Bernama.

“Adoption of cloud solutions will also move from conceptual to the practical stage.

“As predicted by International Data Corp’s global market intelligence, Malaysia’s big data market is anticipated to hit not less than RM75mil but many businesses have yet to consider big data as a big business for their organisation and it thus remains at a tactical level,” he added.

IT spending registered significant growth as reflected in the growth of value-added services, which are expected to grow about 13.6% in 2014 to RM68bil from RM59.8bil in 2013.

Cheah said the overall ICT services sector was also projected to grow at 12.7% in 2015 to RM77.7bil.

Meanwhile, CA Technologies South Asia vice-president Chua I. Pin said the country was entering an era where IT had become the central source of revenue for businesses.

He said 2015 would see a shift in the way businesses structured themselves, looking for new engagement and revenue opportunities using connected devices, big data and analytics, and underpinning these new models would be a fundamental shift in the way software is developed and deployed.

“Software will continue to become the primary way that consumers interact with businesses, which would evolve dramatically in 2015 as businesses become more competitive to reach out to their clients, and we will see apps shifting from simply helping people make decisions to being able to predict what people need,” he said.

Cheah added that with the need for more sophistication in the ICT industry, human capital remained the main challenge in the industry towards achieving high-income nation status.

There is a persistent and widening gap of remuneration packages for ICT professionals between Malaysia and neighbouring countries such as Vietnam and Thailand, coupled with the declining number of ICT graduates, he said.

He said although the new trends such as big data and social media had created many new job functions in high demand, the nation still faced a lack of skilled talent in the market. — Bernama

Related posts:

2014 has seen a tsunami of epic hacks and identity thefts, including the recent massive cyber attack on Sony Pictures Entertainment. Sec..


Technologies: Malaysian Internet users ...technology trends, evolution and change in telco industry
Malaysian Internet users, technology trends, evolution and change in telco industry. MAXIS: Data takes dominance. Net effect: According to Lundal, productivity for the future depends on the degree of Internet adoption.

Monday, December 22, 2014

Education: alleviating poverty or causing it, funding children with retirement fund?

It is not prudent to fund children’s education with your retirement fund

EDUCATION is the social game changer. In poor countries, it alleviates poverty. In developing nations like Malaysia, a more educated population can catapult us to developed status.

Scores of parents are striving hard to send their children to international schools to gain the holistic education, have better choices of tertiary institutions and have access to better paying jobs.

Borrowing future funds

Sending children to international schools is deemed the ticket out of mediocrity in Malaysia and to have a fighting chance in the global job market. But to what end?

Whether it is using EPF savings or selling off property to fund children’s private or international school education, this can be costly to many middle-class parents. While it may be acceptable to borrow funds to ensure our children get better secondary or tertiary education as they can always pay off the loans when they become employed, it is harder to replace “lost” retirement funds.

Therefore, it is not a prudent move to use funds meant for retirement as the fund is most needed when the “parents” are not at income-generating age any more.

Prioritising funds

With today’s Gen X-ers who are becoming parents at later age, we not only have to nurture our children but also care for our ageing parents whilst saving for our retirement. Prioritising investments is key.

1. Be realistic. Parents want the best for our children. If education savings are started early to take advantage of compounding effect, that’s great. If funds only permit an overseas tertiary education, then find the best local education option as our children can still experience holistic learning during university years abroad.

2. Gen Y-er parent, start investing now into a diversified portfolio. It is already too late if you have not started, as the cost of education will only increase.

3. Education is not just about getting the paper qualification. It is about learning. Parents can show kids new ways to learn without busting purses. Take advantage of free online courses like TedTalk or Khan Academy and “experiences” offered by museums, art galleries, nature trips and even playtime in the park.

By CHEONG WAI KUAN, VICE-PRESIDENT OF SUCCESS CINCEPTS LIFE PARTNERS

The writer can be contacted at info@successconcepts.biz / http://www.successconcepts.biz/ The Star/Asia News Network

Related Articles:

Predicament: Retirement or private school fees?

Drought not only drying dams, but also our savings

Save early to meet the big cost of your coming marriage

Sunday, December 21, 2014

2015 Hack of a year ahead!

2014 has seen a tsunami of epic hacks and identity thefts, including the recent massive cyber attack on Sony Pictures Entertainment. Security experts are predicting more or worse cases of such hackings, including in Malaysia where the awareness of cyber threats and security measures is still very low


Brace for more cyber attacks

PETALING JAYA: If you think that a cyber attack like what happened to Sony Pictures Entertainment could only happen in Hollywood, think again.

It is a sign of what’s to come globally in 2015, say cyber security experts.

In the attack on Sony on Nov 24, the attackers hacked the company’s network and took terabytes of private data, deleted original copies from the company’s computers and left messages threatening to release the information if Sony did not comply with their demands.

Nigel Tan, director of systems engineering for software security firm Symantec Malaysia said the prominent data leaks of 2014 would keep cyber security in the spotlight in 2015.

“With the interconnected nature of a global Internet and cloud infrastructures, cross-border flow of data is unavoidable and needs to be appropriately addressed.

“Malaysia was affected in the data breaches this year and will continue to be affected next year,” he said.

Tan recalled a hack last month by a site called Insecam, which downloaded and displayed images from unsecured webcams of CCTV and simple IP cameras around the world, including from Babycams.

Symantec expects more mega data breaches next year, especially with the rising use of mobile devices for e-payment and the cloud computing technology for storage of personal and confidential information.

“Mobile devices will become even more attractive targets for cyber attackers in 2015 as mobile carriers and retail stores transition to mobile payments.

“Mobile devices are also used to store troves of personal and confidential information. They are left switched on all the time, making them the perfect targets for attackers,” said Tan.

He said the growing use of smart home automation, like smart televisions, home routers and connected car apps had also increased the potential of cyber attacks as more devices were being connected to the network.

Cyber law expert Dr Sonny Zulhuda agreed that the idea of synchronisation and interlinking of smart home automation (or the Internet of things) would be too tempting for both users and “abusers”.

“Users need to balance the use of these devices and smart technology with the efforts to preserve security, privacy or confidentiality.

“Just imagine how many mobile users are concerned about installing a good malware scanner on their devices. In the mind of the criminals, on the other hand, this will make their work even easier.”

Dr Sonny, who is assistant professor at the law faculty of the International Islamic University Malaysia, said it would come to a point where people would get too tired with the intrusion and abuse of their privacy.

“In Malaysia, for example, more people are being aware about the need to protect personal data thanks, to the enforcement of the PDPA 2010 (Personal Data Protection Act).

“Perhaps it is timely now to consider the development and penetration of cyber insurance as a new product for our insurance industries,” he said.

Imam Hoque, managing director of business analytics software and services company SAS said another reason why more cyber criminals target mobile devices was the increasing number of corporations embracing the “bring your own device” (BYOD) to work policy.

“This coupled with a general trend for business to provide more methods of interaction with consumers using mobile devices opens up further opportunities for hackers.

“The emergence of more mainstream malicious software kits for these mobile devices will accelerate the number of attacks on the mobile channel,” he said.

Hoque said that the continued trend to store data within the cloud, coupled with the high-publicised data losses from corporations such as Sony would encourage more hackers to consider large data loss exploitation.

“This in turn will lead to higher levels of identity theft and the ability of hackers to compromise the relationships between individuals and the institutions with which they interact,” he said.

CyberSecurity Malaysia CEO Dr Amirudin Abdul Wahab said while malware would continue to rise steadily on mobile devices to attack individuals, cyber criminals would also exploit the mobile device for advanced persistent threats (APT) on specific targets, resulting in high impacts on security, prosperity and public safety like critical infrastructure and big corporations.

“We foresee sophisticated APT carried out using a combination of technical sophistication, excellent planning and coordination, and social engineering,” he said, adding that another major cyber threat next year was the increasing influence of social media.

“Social media can be exploited to propagate political and racial radicalism as well as religious extremism that could destabilise our national security and societal harmony which we have taken for granted all these years.”

BY Hariati Azizan The Star/Asia News Network

Common hack job used to attack Sony Pictures 

The entrance of Sony Pictures Studios in Culver City, California is seen December 16, 2014. "Guardians of Peace" hackers invoked the 9/11 attacks in their most chilling threat yet against Sony Pictures, warning the Hollywood studio not to release a film which has angered North Korea. - AFP

PETALING JAYA: The hack on Sony Pictures Entertainment might have been one of the most incredible cyber attacks ever, but it was carried out in one of the most common modus operandi of cyber crime.

As reported on Friday, US investigators had evidence that hackers stole “the keys to the entire building” of Sony Pictures by getting the password of a top-level information technology employee in the entertainment company.

Security experts in Malaysia have warned that we are also vulnerable to similar attacks with low level of awareness of cyber threats and security measures.

Cyber criminals exploit “users’ ignorance”, along with the rise of social media and mobile devices, to mount attacks against them,” said CyberSecurity Malaysia CEO Dr Amirudin Abdul Wahab.

He said more cyber criminals were using a combination of technical sophistication and social engineering - a non-technical method of intrusion that relies heavily on human interaction – to trick people into breaking normal security procedures and giving up their personal data.

Nigel Tan, director of systems engineering for Symantec Malaysia, cautioned that user behaviour will continue to be big target points for cyber crime next year.

“Sometimes the weakest link is the person behind the keyboard. If they visit dodgy websites, click on unknown links in fake emails and download apps or malicious software, cyber criminals will take advantage of this to siphon off information like passwords for online banking or e-mails.”

Tan said as most people still tend to use the same password for all their online transactions, services and websites, a stolen password can give the thief access to the victim’s whole life.

“And once they access your email, they can reset all your passwords and take over your identity,” he said.

Imam Hoque, managing director (Fraud and Security Solutions) with business analytics software firm SAS said the growing number of online services has created a goldmine for cyber criminals.

“If you think about how many different services you interact with over web and mobile channels, the numbers are forever growing.

“You need to consider what a hacker would need to know to compromise your accounts and then what damage they could do,” he said, stressing that hackers tend to go for the weakest link and then work their way from there.

Tan highlighted the case of a group of hackers in August who claimed to have stolen 1.2 billion usernames and passwords belonging to more than 500 million e-mail addresses in a hack described as the “largest data breach known to date”.

“They did it by targeting every site their victims visited, instead of focusing on one large company,” he said.

Cyber law expert Dr Sonny Zulhuda said cyber criminals tended to exploit people’s greed to attack them.

“While it is important to equip ourselves with some technical knowledge about the risks and threats to security, we also need to use our common sense when facing possible threats.

“One thing we need to understand with technology is the law of economy – why would people provide you mobile apps for free? Or any online service for that matter, for free?”

“How do they make profit if not from the access to users’ information that they acquire when you install such a free app? If one is keeping this in his mind, then he will be more mindful and careful in using the mobile devices.”

Dr Amirudin warned local computer experts not to be seduced by the seemingly easy but lucrative reward of cyber crime.

“Cyber crime is preferred by criminals due to its profitability, convenience and low risk, and their ‘success’ has boosted the global underground economy. It has even become a money-making profession for some computer experts.

“If this trend affects Malaysians, our own experts could be recruited to join the lucrative international underground economy, while our general public become their potential victims.”

Related posts:

Anonymous hackers has begun the cyber war on Singapore
Anonymous hackers has begun the cyber war on Singapore. Singapore's internet and phone regulator said it was investigating the hack. Anonymous hackers have declared war on Singapore with a pledge to hit at official ...
A woman browses the Internet at a cyber cafe in Kuala Lumpur. (File photo)
Malaysia Websites hacked but not whacked after threatened; time to build secured websites
PETALING JAYA: Local websites have been hacked ahead of the deadline set by a foreign-based hacker group, Anonymous, that said it would attack the Malaysian Government portal at 3.30am today. On the micro-blogging ...

NSA secretly hacks, intercepts Google, Yahoo daily