IT Solutions & Services Philippines – Aim.ph

  • IT Services
    • IT Consulting & Training
    • Infrastructure
    • Business & Recovery Planning
    • Database Management
    • Resource Augmentation
    • IT Security & Audit
  • Technologies
  • About Us
  • Contact Us
  • Careers

The State of Cybersecurity in the Philippines

August 24, 2016 by Vlad de Ramos

The State of Cybersecurity in the Philippines

The Philippines’ Comelec data breach and its involvement in the Bangladesh heist highlight two important points: the government’s cybersecurity is predictably poor and criminal hackers have become so sophisticated that they can slip and steal cold hard cash across borders. Now that we have knowledge on how disappointing government services can be, it’s now more important […]

Read More

Filed Under: Business, IT News Tagged With: IT Security

Old School IT Security Tactics When an Antivirus Program is not Enough

August 23, 2016 by Vlad de Ramos

Old School IT Security Tactics When an Antivirus Program is not Enough

One of the biggest issues of most companies today is information security. With news of cyber attacks from large corporations such as Sony, Home Depot, and Primera Blue Cross, companies have to take a step further when it comes to cyber security and disaster recovery.   Traditional Anti-Virus Are No Longer Enough   Most enterprises […]

Read More

Filed Under: Business

Authentication in the Age of Information Insecurity

August 19, 2016 by Vlad de Ramos

Authentication in the Age of Information Insecurity

Authentication, as defined by Wikipedia, is the process of confirming the truth of an attribute of a single piece of data as claimed. In our daily routine, we use authentication even in small ways.  The act of putting a key into a lock is a simple form of authentication. By using our ATM cards to […]

Read More

Filed Under: Business, How IT Works Tagged With: IT Security

The Sequence of a Targeted Cyber Attack

July 20, 2016 by Vlad de Ramos

The Sequence of a Targeted Cyber Attack

  How do cyber attacks happen exactly? According to a recent report, criminal hackers don’t need to rely on malware. They can act like a normal network admin, lurk around a compromised network, and steal your data. Originally it was believed that malware is the weapon of choice by criminal hackers in wreaking havoc on […]

Read More

Filed Under: How IT Works, IT News Tagged With: Data Breach, IT Security

The Promise and Peril with Enterprise Cloud Services

July 19, 2016 by Vlad de Ramos

The Promise and Peril with Enterprise Cloud Services

In the 1950s, the mainframe was so big and expensive that organizations could not afford to purchase it. In fact only a few can put up their own mainframe systems for their use.  In response, the “time sharing” method was developed, finally enabling multiple users to access data and CPU. This was known as the […]

Read More

Filed Under: Business Tagged With: Cloud, IT Security

The Latest Effective Phishing Techniques Targeting Retail Businesses

July 13, 2016 by Vlad de Ramos

The Latest Effective Phishing Techniques Targeting Retail Businesses

Despite its prevalence, phishing is not a tale as old as time. In fact, these email scams originated around 1995 but has taken 10 years before common folks knew what it meant. A play on the word “fishing,” phishing is the act of sending an email to a person claiming to be a legitimate enterprise. […]

Read More

Filed Under: Business, IT News Tagged With: IT Security

6 Hacking Lessons That Businesses Can Learn from Mr. Robot

July 12, 2016 by Vlad de Ramos

6 Hacking Lessons That Businesses Can Learn from Mr. Robot

Mr. Robot is a drama-thriller television series about Elliot Anderson, a security engineer by day, and a hacker at night. He suffers from social anxiety disorder and clinical depression, only able to connect with people by hacking their personal lives. Eventually his talents capture the attention of a hacktivist group called fsociety. Pulled in by their […]

Read More

Filed Under: Business, How IT Works Tagged With: Data Breach, IT Security

The Top Causes of Data Breach that You Need to Prepare for in 2016

June 22, 2016 by Vlad de Ramos

The Top Causes of Data Breach that You Need to Prepare for in 2016

  Like what Johnny Mnemonic has shown us more than a decade ago, data will be the currency of a digitally connected world. The film was a total flop, but it did foretell an important insight – the value of data in a dystopian world ruled by mega corporations (you know, like Google and Facebook). […]

Read More

Filed Under: Business, IT News Tagged With: IT Security

IT Security: How Philippine Banks Can Mitigate Cyber Attacks

June 21, 2016 by Vlad de Ramos

IT Security: How Philippine Banks Can Mitigate Cyber Attacks

Data breach cases are gradually becoming a dime a dozen. While the most expensive breaches we’ve known so far are from the big companies in the US, that doesn’t mean the Philippines is safe. While the once “sick man of Asia” has made economic leaps thanks to the exponential growth of the offshore outsourcing industry, […]

Read More

Filed Under: Business, IT News Tagged With: IT Security

Hacking The IoT (Internet of Things) Era

May 23, 2016 by Vlad de Ramos

Hacking The IoT (Internet of Things) Era

  The Internet of Things might as well be called the Internet of Vulnerabilities. Here are the new vulnerabilities that are unintentionally caused by IoT, especially now that security compliance is not yet required among connected devices.

Read More

Filed Under: Uncategorized

« Previous Page
Next Page »

Categories

  • Business
  • Careers
  • How IT Works
  • IT News
  • Outsourcing
  • Uncategorized

Services

  • IT Consulting and Training
    Make sure your information infrastructure is compliant and safe. Find out how.
  • Infrastructure
    Maximize your investment on network architecture and infrastructure. Learn more.
  • Business & Recovery Planning
    Is your business prepared for an IT disaster? Learn how you can plan for it.
  • Database Management
    Is your database accurate and readily available? Learn how Database Management can help.
  • Resource Augmentation
    Neutralize the risks of ever-changing technologies in the business environment. Find out how.
  • IT Security & Audit
    Is your business ready to handle serious breaches and hacks? Learn how IT Seciry and Audit can help.

Top Articles

  • 15 Things You Didn’t Know Could be Hacked 15 Things You Didn’t Know Could be Hacked
  • ASEAN Integration 2015: Everything Entrepreneurs Need to Know ASEAN Integration 2015: Everything Entrepreneurs Need to Know
  • Top 10 Jobs for IT Graduates in the Philippines Top 10 Jobs for IT Graduates in the Philippines
career opportunities

Get In Touch

5/Flr GC Corporate Plaza 150
Legaspi St. Legaspi Village
Makati City
T: +63.2.533.2682

Quick Links

  • Testimonials
  • Blog

Stay Connected

APACIo Certificate
Copyright © 2016 Aim.ph All Rights Reserved.