

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Data has become increasingly fluid, travelling constantly beyond the corporate IT perimeter on mobile devices as well as being processed on virtual as well as physical machines. And, with the uptake of public clouds and managed infrastructures, data is flowing off-premise and back as never before.
The growing adoption of an elastic cloud services model, where private data center resources expand instantaneously on demand and as needed into external clouds, delivers unprecedented flexibility, agility and clear economic benefits. There is no upfront investment in infrastructure, no waste and no delay in meeting immediate resourcing requirements while maintaining manageability.
Public clouds provide another great benefit – business continuity. If your data center suffers disruption or damage, off-premise resources can keep the show on the road until the issue is remedied. Public cloud providers themselves have invested heavily in their own business continuity and cybersecurity, creating safe, resilient environments for your business workloads. But that’s not the end of the story…


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Passwords alone are no longer sufficient to protect users’ online accounts as cyberattacks become more frequent and advanced, hence, multi-factor authentication (MFA) is necessary to reduce the risk of unauthorised access to online accounts.
There are different types of MFA that use what the user has and who the user is. SMS-based Authentication, Biometrics Authentication, and Application-based Authentication are the most common types.
When a user turns on SMS-based authentication, they register a mobile number that is linked to their account. Most SMS-based OTPs are only good for a certain amount of time, usually 3 minutes, after which they can’t be used again.
When a user intends to log in to their account, the system produces an OTP and sends it to the registered phone number via SMS. The system then checks the OTP, and if they match, it lets the person into their account.
When a user turns on biometric authentication, they will have to enrol their biometric data into the system by capturing and storing their unique physical or behavioural traits in a digital format. This information can come from things like fingerprint scans, facial recognition, iris recognition, voice recognition, and more.
Besides, when a user attempts to log in to their account, their biometric data is used to verify the user’s identity by comparing the data to a list of existing users whose biometric data has been registered in the system. The user is granted access if the biometric data matches.
Similarly, when a user enables 2FA with an authenticator app on their account, they will typically be asked to scan a QR code or enter a secret key provided by the service into their authenticator app.
Once the secret key is entered, the authenticator app generates a unique OTP using an algorithm such as Time-based One-Time Password (TOTP) or HMAC-based One-Time Password (HOTP) that is valid for a specific time window, typically 30 seconds, before changing. To generate the OTP, the algorithm considers the secret key known only to the user and the app, as well as the current time.
After their regular password has been validated, the user will be prompted to enter the OTP generated by their authenticator app when attempting to log in to their account. The service will then compare the user’s input to that generated by the authenticator app. If the OTPs match, the user is granted account access.
Likewise, SMS-based 2FA works by texting an OTP to a user’s mobile phone. To complete the authentication process, the user must enter this OTP into the online service. While SMS-based 2FA provides an additional authentication method, it is not as secure as authenticator apps or biometrics because SMS can be compromised:
- SIM Swapping: Threat actors can use this technique to acquire phone numbers via data leaks, public records, or social engineering, then bribe or trick a service provider employee into porting the number to a duplicate SIM card under their control. This gives them the ability to intercept users’ SMS verification OTPs and gain unauthorised access to associated online accounts.
- SMS Phishing: Using SMS Phishing (Smishing), threat actors can intercept users’ SMS messages and steal verification OTP to gain access to their various online accounts.
Thus, authenticator apps and biometrics offer a higher level of security compared to other authentication methods like SMS-based 2FA. Users are advised to practice good cyber hygiene by using a strong password and selecting the most secure 2FA method to protect their online accounts.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Unique Identification Authority of India (UIDAI) and the Society for Electronic Transactions and Security (SETS), which is a part of the Office of the Principal Scientific Adviser, plan to work together on research and development in the field of deep technology.
According to a press release, under a memorandum of understanding (MoU), the two sides will conduct collaborative research in areas like cybersecurity, Internet of Things (IoT) security, mobile device security, financial network slice security, and hardware security, among others.
The initiative aligns with the Make in India campaign, with the goal of enhancing self-sufficiency in information technology and cybersecurity, while also reducing the country’s dependence on exports. As part of this effort, experts and officials from both groups will join forces on research projects centred around artificial intelligence (AI) and blockchain technology for cybersecurity. They will also focus on developing innovations in quantum security and cryptography, including quantum random number generators, crypto API libraries, and quantum-safe cryptography.
Accordingly, officers from SETS and UIDAI will propose and implement joint research projects and create tools and products that can be utilised not only within the UIDAI ecosystem but also in other critical IT infrastructures.
Emerging technologies like AI and big data are at the core of the Digital India initiative, serving as tools for good governance and forming the foundation of India’s expansive digital public infrastructure. UIDAI is a statutory authority established under the provisions of the Aadhaar Act 2016. Aadhaar cards are 12-digit unique identification numbers linked to a citizen’s basic demographic and biometric information. The adoption of Aadhaar-based authentication transactions has been witnessing an upward trend as it has proved to be a facilitator in availing several welfare benefits and services, the government has said.
UIDAI has already issued over 1.36 billion Aadhaar numbers to residents, with more than 70 million Aadhaar-based authentication transactions taking place every day. Additionally, nearly 1,700 schemes of the central and state governments for welfare and good governance utilise Aadhaar.
As OpenGov Asia reported earlier, an in-house developed security mechanism for Aadhaar-based fingerprint authentication has been launched. It utilises a combination of finger minutia and finger image, which is powered by AI/ML. The technology enhances the liveness check of captured fingerprints, thereby making Aadhaar authentication transactions more secure and robust.
The new two-factor/layer authentication incorporates add-on checks to validate the genuineness (liveness) of the fingerprint to reduce fraud attempts. The initiative will be beneficial for the banking and financial sectors and telecom players and government agencies. The implementation of the new security mechanism will also aid individuals at the bottom of the pyramid by strengthening the Aadhaar-enabled payment system and preventing fraudulent attempts made by unscrupulous elements.
After several months of discussions and support provided by the UIDAI to its partners and user agencies, the new security mechanism for Aadhaar-based fingerprint authentication is now fully functional. The implementation of the new security mechanism has resulted in the replacement of the less secure single-factor authentication methods, which relied solely on either finger image or finger minutiae. The new system now uses a more robust two-factor authentication process, which is a positive outcome for all stakeholders involved.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
As the development and use of technology is rapidly advancing, it is becoming increasingly popular for parents to let their children use electronic devices at an early age. Unfortunately, most of the time, children do not have the skills to protect themselves in cyberspace.
A survey conducted last year on parents’ opinions regarding online safety revealed that the average age of Vietnamese children first owning a mobile phone is nine years old. However, the average age at which children are informed about information security in cyberspace is 13 years old. This means that there are about four years that children interact online without being warned about potential risks and how to deal with them.
In 2020, the Management and Sustainable Development Institute (MSD) and Save the Children conducted a nationwide survey that showed that children often use the Internet for learning (83%), entertainment (71%), making friends (71%), sharing information (23%), shopping (30%) and live streaming (6.3%). It was reported that 40% of children feel unsafe when using the Internet. More than 70% of children have had unwanted experiences such as personal information disclosure, harassing texts, and cyberbullying.
The risks become more diverse and unpredictable and do not spare anyone. Therefore, children need to be educated and equipped with the knowledge to protect themselves and take advantage of technology. In 2021, the Prime Minister approved Decision No 830, under which the “Protecting and Supporting Children to Interact Healthy and Creatively in Cyberspace” programme for the 2021-2025 period was launched.
The Deputy Head of the Information Security Department, Tran Dang Khoa, stressed that digital technology products in Vietnam must be created and applied to successfully implement the programme.
The objective of the programme is to safeguard children against online risks and empower them with digital literacy while fostering a healthy online environment. It also seeks to develop innovative Vietnamese products and applications that enable children to learn, connect, and enjoy recreational activities online.
It is the first national one in Vietnam for child protection on the Internet. Under the programme, a network to rescue and protect children on digital platforms was created. It seeks to enhance public awareness, share valuable experiences, and receive and handle reports from the community about child abuse on the Internet.
The programme outlines six principles that parents and teachers must follow to assist children in interacting with digital media. They consist of recognising a child’s right to access and use the Internet, helping children use the Internet safely as soon as possible; respecting the child’s privacy; understanding the psychology and development of children to accompany them; guiding children to access support when needed; and being available when the child is in need.
The General Director of Smart Cyber Security, Ngo Tuan Anh, said that when schools equip computer rooms with an Internet connection according to regulations, the big challenge is finding and equipping tools to help monitor and manage students. There are technology solutions that can help schools manage students on the internet conveniently, he said. The products apply the cloud computing model, allowing schools to deploy and easily use them at a reasonable monthly cost quickly. A representative of the Vietnam Cybersecurity Emergency Response Teams/Coordination Centre (VNCERT/CC) named three major technologies: protection technologies on operating systems, browsers, and applications; child protection devices and applications on terminals; the applications that support reflections and checking.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Ministry of Industry and Trade has been focusing on protecting consumer rights online amid the boom of e-commerce and the digital economy since the COVID-19 pandemic. The Ministry launched Consumer Rights Day on World Consumer Rights Day, which is marked every year on 15 March.
The Ministry has stressed the importance of consumer protection in building a healthy environment and promoting socioeconomic development. This year’s event highlighted information transparency and safe consumption.
Despite the implementation of the Law on Consumer Rights Protection on 1 July 2011, there has been a persistent prevalence of consumer rights violations across multiple levels, with a growing level of complexity. Entering the post-COVID-19 period, e-commerce, especially borderless trade, has made consumer rights protection a new focus as there were several risks consumers face online. These risks include the sale of counterfeit and substandard products, as well as the misuse of personal information for fraudulent purposes.
The Vietnam Competition and Consumer Authority is preparing to revise the Law on Protection of Consumer Rights to ensure that the legislation stays up-to-date with the evolving landscape. The proposed amendments to the law are expected to be presented for approval at the National Assembly’s meeting in May.
Tran Huu Linh, General Director of the Vietnam Directorate of Market Surveillance, noted that apart from the online shopping trend, there has been an increase in trade fraud and risks to consumers, including fake and poor-quality products. According to statistics from the Ministry, over 1,660 online kiosks offering more than 6,400 products were taken down, and five e-commerce websites accused of selling counterfeit and/or uncertified products were blocked last year.
Linh emphasised that safeguarding consumer rights in the online realm was a priority for the market watch, particularly considering Vietnam’s ambition to become a frontrunner in digital economy development within the region. The government has set a goal for the digital economy to contribute 20% to the country’s GDP by 2025.
Owners of many online stores are prioritising consumer protection as one of their key business strategies. The official urged consumers to make orders from licensed platforms or official stores to ensure their rights are protected. The Deputy Director of the Vietnam Competition and Consumer Authority, Nguyen Quynh Anh, explained that consumer protection needs to have stronger and more substantive changes, which requires the active participation of businesses.
“We used to think that consumer protection was the matter of the State management agency and the consumers. Now, enterprises will be a more important subject in the consumer protection process,” Anh said. It is crucial for enterprises to recognise their responsibility in safeguarding consumer rights and ensuring that consumers have access to reasonably priced and safe products and services.
In 2020, Vietnam approved a National Digital Transformation Programme by 2025, with an orientation toward 2030. The strategy helps accelerate digital transformation through changes in awareness, enterprise strategies, and incentives toward the digitalisation of businesses, administration, and production activities.
The programme targets businesses, cooperatives, and business households that want to adopt digital transformation to improve their production, business efficiency, and competitiveness. The plan aims to have 80% of public services at level 4 online. Over 90% of work records at ministerial and provincial levels will be online while 80% of work records at the district level and 60% of work records at the commune level will be processed online.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
The Ministry of Information and Communications (MIC) is cracking down on telecom carriers that do not stop junk SIM cards in the market. Mobile network operators have been instructed by the Authority of Telecommunications (AOT) to ensure that all the necessary authentication information of the subscriber is provided when registering.
Telecom carriers need to update procedures and regulations on registering subscribers’ information following Decree 49/2017. In addition, mobile network operators are required to uphold their commitments with MIC and comply with the requests outlined in the legal documents issued by AOT. The agency intends to collaborate with local information and communications departments to oversee and inspect enterprises’ implementation process.
Enterprises that engage in serious violations, such as providing services to new subscribers with insufficient or inaccurate information or selling pre-entered SIM cards with activated mobile services, will be forced to halt the registration of new subscribers, the government has said.
MIC is considering strict punishment like suspending the right to register new subscribers for 3-6 months if telcos are found committing violations of regulations on mobile subscriber management. This is the first time that MIC has put in place heavy sanctions on mobile network operators.
Experts have noted that despite measures to punish violators, junk SIM cards still exist because the regulations are not respected. Despite making repeated promises to prevent the circulation of junk SIM cards, telecom carriers have failed to effectively address the issue and junk SIM cards are still in circulation.
According to MIC, Vietnam has 126 million mobile subscribers, and the market has become saturated. Annually, telecom carriers vie for 800,000 new subscribers, but they cannot alter their market share by simply competing for new subscribers. Hence, it is imperative to strengthen the registration process for new subscribers.
In Ho Chi Minh City, it is not hard to buy a pre-activated SIM card from popular carriers like state-run Viettel for only US$ 3-8.5 without the need to produce identification documents. It can be used instantly when inserted into a mobile phone. The price of a junk SIM card depends on the specific number and current promotion programmes of mobile service providers. For instance, at present, the price for a card from Viettel is US$ 6.8.
By combining junk SIM cards with popular communication apps, criminals can spread fake news or images, building their credibility and gaining the trust of their victims for future scams. The use of virtual phone numbers that are not tied to any specific location or physical device makes managing them extremely challenging. Criminals are exploiting this to activate Over-the-Top (OTT) applications with ease, which can be used for illegal activities.
After 31 March, a large number of mobile subscribers without standardised information will be deactivated. The Deputy Head of the Vietnam Telecommunications Authority explained that it is not feasible to prohibit individuals from owning multiple SIM cards as they may require them for business purposes. However, to limit the use of SIM cards for malicious activities, when an individual wants to own more than three SIM cards, they must sign a contract with the mobile carrier.
The official also highlighted that one of the key priorities of the telecoms industry for 2023 is to fully resolve the problem of SIM cards with incorrect or missing identity information of their owners. Additionally, efforts will be made to raise public awareness about the risks of using junk SIM cards.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Over the coming years, Singapore is poised to witness significant transformations in digital financial services, particularly in three key domains: the emergence of Web 3 and decentralised finance, the widespread integration of artificial intelligence (AI) and the implementation of machine learning (ML) technology.
Prioritising strong governance and compliance should be at the top of the Banking, Financial Services, and Insurance (BFSI) sector’s list of objectives. Adherence to regulations, following rules and taking responsibility can greatly enhance services, ensure safety, and enhance the client experience.
Employing a centralised data protection solution enables consumers to track and verify if and how their data is being protected data across various workloads. When clients have the ability to do so, they can be confident that their data is being adequately safeguarded. Moreover, this can ensure that recovery time objectives and IT audit compliances are met.
Combatting threats such as malware and ransomware, along with ensuring overall cybersecurity, requires a strategic approach across multiple levels. This includes actively monitoring for potential issues and regularly backing up data. Storing immutable copies of data in a secure location can prevent malware from encrypting them.
In addition, data intended for recovery should undergo scanning and cleaning by the organisation’s anti-virus solution to ensure that any potentially harmful data, also known as “dirty” data, is not inadvertently reintroduced into production systems.
Ensuring seamless operations while mitigating the risks of ransomware and other cyber-attacks can be challenging. However, modern data protection solutions have demonstrated their ability to reduce costs, enhance automation, enhance human capabilities and identify innovative ways to reuse data to generate new value.
The OpenGov Breakfast Insight on 22 March 2023 held at the Voco Orchard Singapore aimed to share insights and practical solutions to empower organisations to maximise data capability through cost-effective, secure and automated data-driven processes that adhere with current data regulations and comply with the standards of Singapore’s Banking, Financial Services and Insurance industry.
Opening Remarks


Kicking off the session, Mohit Sagar, CEO & Editor-in-Chief, explains that financial data management is a set of processes and policies, usually helped by specialised software. This approach enables an organisation to merge its financial data, adhere to accounting regulations and legal requirements, and generate comprehensive financial reports.
The regulatory body responsible for overseeing Singapore’s financial institutions and establishing guidelines for data management and protection is the Monetary Authority of Singapore (MAS). According to its regulations, financial institutions are required to implement robust policies and procedures for managing data, including appropriate classification, handling and protection.
“Financial institutions must ensure that adequate security measures are in place to mitigate the risks of data breaches and cyber threats. This could include implementing strong encryption protocols, regularly testing systems for vulnerabilities, maintaining up-to-date software and hardware and training on cybersecurity best practices,” Mohit emphasises.
The Personal Data Protection Commission (PDPC) serves as the data protection authority in Singapore, responsible for enforcing compliance with the Personal Data Protection Act (PDPA). The Act sets a baseline level of data protection that must be followed by all sectors operating in Singapore.
Additionally, the PDPA also mandates that organisations obtain individuals’ consent before collecting, using, or sharing their personal information. The PDPC is empowered to investigate any breaches of the PDPA and impose penalties for non-compliance.
Data recovery refers to the process of getting lost, deleted, corrupted or inaccessible data back from storage media like hard disk drives, solid-state drives, USB drives, or other types of data storage devices. Several companies in Singapore offer data recovery services that specialise in getting data back from different types of storage media used by financial institutions.
“It’s important to remember that data recovery services can be expensive, and it’s always best to have a full data backup and disaster recovery plan in place to minimise the risk of losing data,” is Mohit’s caveat. “Establishing a robust backup and recovery system can help avoid the need for expensive data recovery services and ensure business continuity in the event of a data loss incident.”
The protection of sensitive financial data from unauthorised access, theft and cyberattacks is a top priority for Singapore’s financial institutions. To achieve this, they employ a range of security measures, including encryption, access controls, firewalls, regular updates and patches, employee training and awareness programs, penetration testing, and incident response planning.
These safeguards work together to create a comprehensive data security framework that helps to prevent data breaches and protect the integrity and confidentiality of financial data.
“Under the PDPA, financial institutions must obtain the consent of individuals before collecting, using, or disclosing their personal information,” Mohit reiterates. “But while this is the norm, there are exceptions to this rule.”
Concessions are allowed under certain circumstances, such as legal obligations or the prevention of criminal activity. As an example, financial institutions may disclose personal information to law enforcement agencies to comply with legal requirements or to prevent potential criminal activity.
Mohit understands that risk mitigation is a crucial component of risk management in Singapore’s financial sector, and financial institutions employ a range of strategies and tools to identify, evaluate and reduce the risks they face.
Diversification, risk transfer, risk avoidance, risk monitoring and reporting, contingency planning, and strong governance and compliance frameworks are examples of risk mitigation strategies utilised by financial institutions in Singapore.
Financial institutions consider the development of a data exit strategy and recovery plan as an essential part of their risk management. The process involves identifying crucial data, anticipating exit scenarios, creating a recovery plan, establishing data backup procedures, testing the recovery plan, and maintaining the plan by updating, reviewing, and monitoring it regularly.
“By adhering to these steps, financial institutions can establish a robust data exit strategy and recovery plan that ensures the protection and recovery of vital data in the event of a data breach or system failure,” Mohit ends.
Welcome Address



According to Raymond Goh, Veeam’s Vice President of Sales Engineering for APJ, the banking, financial services and insurance (BFSI) industry has experienced significant changes over time and has had to contend with various challenges such as regulatory compliance, cybersecurity threats, and the need to innovate to stay competitive.
The pandemic has accelerated the industry’s digital transformation, resulting in a greater demand for digital banking services. However, it has also introduced new challenges, such as physical branch disruptions and an increased risk of cyberattacks.
“Despite the challenges, the industry can provide value to its customers by leveraging new technologies and innovative strategies.” Raymond is convinced “To effectively manage risks, BFSI institutions must continue to invest in digital infrastructure, cybersecurity measures, and advanced analytics.”
The FSI journey from 1866 to the present has been remarkable; from brick-and-mortar establishments to the current digitised systems, payment apps, digital wallets, contactless payments, crowdfunding platforms, and many others.
Financial systems can be affected by various disruptions, including funding and liquidity issues, asset price declines, contagion effects and heightened credit risk. The impact of a crisis on the financial sector is largely determined by the sector’s ability to mitigate four risks: market risks, liquidity risks, credit risks, and earnings risks.
“The rise of FinTech and non-bank startups are altering the competitive landscape in financial services, forcing traditional institutions to reconsider their business practices,” Raymond reiterates. “Old school processes and legacy systems are no longer relevant in the digital world, and indeed, can be a hindrance.”
Financial institutions must foster an innovative culture that promotes innovation and utilises technology to streamline existing processes and procedures for optimal efficiency. This cultural shift towards a technology-centric mindset mirrors the broader industry acceptance of digital transformation.
Raymond recognises that today’s consumers are more knowledgeable, sophisticated and informed than ever, and they demand a high degree of customisation, personalisation and convenience from their banking services.
It is predicted that future generations, starting with Generation Z, will have an even greater preference for omnichannel banking and be more technologically savvy than Millennials.
Organisations using obsolete business management software or siloed systems will be unable to compete in this increasingly digital-first environment. Without a solid, futuristic technological foundation, businesses will miss out on crucial business evolution.
“In other words, digital transformation is no longer merely a good idea, but a necessity for survival,” Raymond states.
Financial service organisations that use cutting-edge business technology, particularly cloud applications, have a significant advantage in the digital transformation race as they can innovate more quickly. The agility and scalability of cloud technology are its strengths. Without the constraints of system hardware, cloud technology allows systems to evolve in tandem with the business.
Raymond agrees that banking is being reshaped as regulations tighten and consumers adopt new technologies and demand 24/7 access to their most sensitive data, regardless of device.
As a result of a string of high-profile breaches in recent years, security is one of the leading challenges facing the banking industry and a major concern for bank and credit union customers. Financial institutions must invest in the most advanced technologically driven security measures, such as Authentication, End-to-End Encryption (E2EE) and Address Verification Services (AVS), to protect customers.
Financial services are increasingly confronted with issues related to auditing as the frequency of data breaches and privacy concerns continue to increase. This has led to more stringent regulatory and compliance requirements.
Compliance with financial data protection standards is subject to strict regulations and audits entail some of the most rigorous requirements in modern business, often involving the need to manage highly complex IT infrastructures.
Adhering to and conducting annual disaster recovery (DR) testing regularly can be both expensive and resource-intensive.
From a financial standpoint, any amount of downtime is unacceptable, and banks may face significant penalties for revealing confidential information. The centralisation of remote or branch offices (ROBO) can exhaust an organisation’s resources and bandwidth.
Businesses around the world were heavily impacted by the pandemic, causing considerable disruption and presenting numerous challenges. These challenges demand innovation, the necessity for enhanced employee engagement, rapid market changes and quality improvement.
In this scenario, FinTech and its underpinning technology will be major disruptors. Blockchain will shake things up; digital will become mainstream; customer intelligence will be the most significant predictor of revenue growth and profitability; the public cloud will become the dominant infrastructure model; and regulators will also turn to technology.
The common theme among these is resilience, trust and data agility.
Over the last two years, the Financial Services Industry has placed significant importance on specific issues. Some key initiatives are modernising the IT operating model to adapt to the new normal, simplifying legacy systems to decrease costs, enhancing the technological capabilities to better understand customer requirements, preparing the architecture to facilitate connections with any device or location and prioritising cybersecurity measures.
FSI organisations face distinct challenges due to their strong customer relationships, financial accountability and regulatory oversight. These challenges include effectively managing regulatory and capital costs, improving operations and customer experiences to meet modern standards, safeguarding against cyber threats and ransomware attacks and ensuring data and privacy security.
According to Raymond, Veeam plays a major role in addressing all these areas and can offer unique solutions to the various opportunities and challenges that FSI organisations may encounter. Veeam’s solutions encompass streamlining and automating operations, facilitating cloud migration and modern application development, ensuring data immutability, and effectively managing privacy, risk, and compliance.
“By embracing digital transformation, utilising big data analytics, forming strategic partnerships, having strong compliance and cybersecurity frameworks and investing in talent development programmes, FSI organisations can take advantage of opportunities and address challenges,” Raymond believes.
End-user Insight


Luis C Cruz, Executive Director, Head of Automation, Infrastructure for DBS Big Data, AI and Analytics, DBS Bank Ltd is convinced that by aligning IT initiatives with the company’s overall business objectives, a comprehensive IT strategy can help businesses deliver long-term shareholder value.
“This strategy entails identifying the company’s current and future technology requirements, evaluating potential technology solutions, and developing a plan for implementing those solutions,” Luis explains.
By doing so, the company can ensure that its IT investments support business growth and profitability while reducing costs and boosting efficiency. In addition, a comprehensive IT strategy can help the business gain a competitive advantage by leveraging emerging technologies and optimising the IT infrastructure.
A comprehensive IT strategy can generate long-term shareholder value by enabling organisations to make informed decisions about technology investments and leverage technology to achieve business goals.
A robust IT strategy:
- Aligns with organisation goals and governance
- Adapts to the marketplace and changes how our employees work
- Is focused and consistent
- Honestly identify challenges
- Would be authentic, clear and understood
- Is memorable with a compelling tagline and value proposition
- Has to be actionable towards a goal
- Shows where to play and how to win
Providing foundational infrastructure capabilities that support business objectives and delivering applications and solutions to aid employees in achieving their desired business outcomes are examples of company strategies that are enabled by IT.
“The concept of SMAC or Social, Mobile, Analytics and Cloud stack, is an example of a technology strategy that is widely used throughout the industry and by IT leaders,” Luis reveals. “It all comes down to the customer experience.”
Determining the optimal approach, timing and speed (the how, when and pace) of SMAC implementation is crucial as it forms the basis for leveraging big data in corporations. As IT leaders, Luis anticipates the need to stay up-to-date on SMAC trends and implications relevant to their roles. A perfect example of a company that effectively leverages SMAC-stack infrastructure is an online streaming service provider website.
To generate sustainable shareholder value, businesses must cultivate strategic and functional IT competencies, enhance tools that improve the IT function and promote a customer-centric culture. These efforts will fortify the organisation’s internal processes and enable the development of an efficient decision support system, as well as the delivery of transformational applications.
In addition to benefiting the company, these efforts will also benefit customers by enabling enterprises to provide consistent, high-quality IT services and innovative IT solutions to business units. This will allow organisations to optimise IT efficiency and enhance its impact on enterprise outcomes, ultimately driving long-term investor value.
“IT strategy is influenced by several internal and external factors,” ends Luis. “And understanding these is critical for developing a successful IT strategy that aligns with the organisation’s overall goals and objectives.”
Closing Remarks
Raymond acknowledges the significance of data backup as a critical aspect of maintaining data resilience and availability but emphasises that it is only one aspect of a comprehensive strategy.
Data backup is a single component of ensuring data availability and resilience in hybrid cloud environments. In addition to backup solutions, it’s essential to consider other factors that can affect data resiliency and availability, such as infrastructure and data proximity, Raymond opines.
“Data proximity, the physical location of data in relation to its applications, is a crucial factor to consider when designing hybrid cloud environments. These factors must be taken into account to ensure that hybrid cloud environments are designed optimally to meet the needs of applications and data requirements.”
By adopting solutions such as edge computing or hybrid cloud architectures, organisations can ensure data proximity. These solutions enable data to be stored and processed closer to where it is required, which can improve application performance and ensure data resiliency and availability.
This involves ensuring that there are adequate computing, storage, and networking resources available to support the workload, as well as having a highly available and resilient infrastructure to mitigate the risk of outages.
“Veeam provides data resiliency through secure backup and fast, dependable recovery solutions for the hybrid cloud of the organisation,” Raymond explains. “Our solutions are intended to safeguard critical data and applications, prevent data loss and enable rapid and dependable recovery in the event of a disaster or outage.”
Veeam offers solutions designed to help organisations achieve their business continuity and disaster recovery goals by ensuring data resiliency and availability in their hybrid cloud environments.
Mohit concurs that with the increasing volume of data being produced and stored every day, data protection has become increasingly crucial. Businesses are adopting techniques that allow for data restoration in the event of loss or corruption.
“As organisations continue to produce and store more data, it is becoming increasingly difficult to ensure the security and protection of that data,” Mohit observes.
In this VUCA landscape, technology can provide significant benefits to organisations in protecting their data. Implementing technological solutions helps businesses to secure their data from loss, theft and unauthorised access. It also ensures quick data restoration in emergency or outage situations.
“In essence, the purpose of technology partnerships is to assist businesses in implementing and improving their technical systems,” Mohit believes. “There is no doubt: collaboration in technology promotes growth, eases processes and reduces timelines.”
Two heads are better than one when it comes to implementing established technology systems. But while a technology partnership can effectively deliver technical expertise, it is important not to underestimate the value business acumen offers in return.
“Ultimately, collaborating and pooling resources can prove to be a highly effective approach in propelling both parties towards progress and innovative solutions,” Mohit concludes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Singapura memiliki peran kuat dalam perkembangan finansial di Asia. Otoritas Keuangan Singapura (Monetary Authority of Singapore/ MAS) memperkirakan sektor ini akan tumbuh 4%-5% pertahun pada 2021-2025 dan rata-rata membuka 3-4 ribu lapangan pekerjaan baru tiap tahun. Untuk itu, Kemenkeu Singapura mengeluarkan Peta Transformasi Industri Finansial (Industry Transformation Map/ ITM) 2025 pada September 2022, agar industri finansial Singapura menjadi yang terdepan.
Namun, di balik angka pertumbuhan yang menarik itu, ancaman keamanan siber di Singapura pun kian meningkat. Berdasarkan laporan Badan Keamanan Siber Singapura (Cyber Security Agency of Singapore/CSA) pada Agustus 2022, ransomware, phising, command and control server, dan kejahatan siber meningkat di Kota Singa ini.
Keamanan siber menjadi hal yang tak bisa ditawar bagi perusahaan perbankan, finansial, dan asuransi. Sebab, aset data yang mereka kelola dan kepercayaan pelanggan merupakan urat nadi perusahaan agar bisa terus hidup dan bertumbuh. Sekali terjadi, insiden keamanan siber akan menodai reputasi perusahaan dan menjauhkan mereka dari sumber utama penggerak bisnis: kepercayaan pelanggan.
Serangan ransomware diperkirakan akan makin meningkat di tahun mendatang. Data Veeam menunjukkan 50% perusahaan menjadi lumpuh akibat serangan ransomware, sebanyak 76% perusahaan setidaknya terkena sekali serangan ransomware, dan 38% perusahaan tidak bisa mengembalikan data yang terkena serangan ransomware.
Untuk itu, membangun benteng yang cerdas untuk memerangi ancaman seperti malware, ransomware, dan kejahatan siber lain menjadi sangat krusial bagi berbagai bisnis. Sebuah solusi keamanan data terpusat bisa menjadi jawaban untuk memastikan keamanan siber terpantau secara keseluruhan.
Perusahaan bisa mencegah potensi serangan siber seperti ransomware dengan melakukan pencadangan data secara teratur. Untuk menambah lapisan keamanan, salinan ini bisa dilengkapi dengan replikasi dan foto. Proses klasifikasi data yang harus disimpan sesuai dengan prioritasnya juga diperlukan sebagai langkah mitigasi ancaman siber. Langkah mitigasi selanjutnya adalah memindahkan salinan data ke lokasi penyimpanan yang lebih aman untuk mencegah dokumen itu terenkripsi oleh malware. Dengan demikian, data tetap tersedia meski sistem kehilangan pasokan listrik, serangan siber, atau insiden lain.
Solusi keamanan siber terpusat diperlukan untuk memberi kemudahan bagi pengawas untuk melacak dan memverifikasi apa dan bagaimana perlindungan data di berbagai lini. Solusi yang bisa dapat memberikan peringatan jika terjadi indikasi penyusupan ransomware atau serangan lain ke sistem juga amat dibutuhkan. Pengawasan terpusat pun menambah keyakinan bahwa data telah terlindung secara maksimal, meringankan pekerjaan dengan bantuan automasi, kecerdasan buatan, kemampuan mengolah ulang data untuk mendapat insight baru, dan mengurangi biaya operasional.
OpenGov Breakfast Insight akan berbagi wawasan dan solusi praktis mengenai automasi dan arsitektur aplikasi. Acara yang diselenggarakan pada 22 Maret 2023 di Voco Orchard Singapura akan meningkatkan kemampuan proteksi data Industri Perbankan, Jasa Keuangan dan Asuransi (BFSI) Singapura.
Pembuka


Entitas bisnis privat perlu memiliki strategi pemulihan terhadap serangan siber, kegagalan sistem, atau bencana alam. Perusahaan perlu menyiapkan beberapa hal terkait rencana pemulihan, mulai dari identifikasi data yang perlu dilindungi, prosedur pencadangan data, rencana memulihkan data penting, serta pengujian, pembaruan dan audit atas rencana pemulihan data.
Pencadangan dan pemulihan data perlu dilakukan karena kelalaian menjaga data pelanggan bisa berimbas pada mahalnya biaya pemulihan, denda, dan mencoreng reputasi perusahaan ketika terjadi bencana.
Karena itu, sangat disarankan bagi perusahaan untuk memiliki cadangan data yang komprehensif dan rencana pemulihan bencana untuk meminimalkan risiko kehilangan data.
“Rencana pemulihan harus menjadi salah satu pertimbangan utama, sebab ini yang akan menjadi penyelamat ketika terjadi serangan,” jelas Mohit Sagar, CEO dan Pemimpin Redaksi, OpenGov Asia.
Selain itu, mereka pun mesti taat pada aturan yang ditetapkan pemerintah untuk menjaga berbagai kemungkinan kegagalan sistem layanan finansial. Dari sisi pemerintah, mereka menetapkan regulasi bagi lembaga keuangan, perbankan dan asuransi.
Aturan Pedoman MAS mensyaratkan lembaga keuangan untuk memiliki kebijakan dan prosedur manajemen data yang kuat.
Lembaga keuangan diharuskan melakukan klasifikasi, penanganan, dan perlindungan dan keamanan data yang tepat. Selain itu, Personal Data Protection Commission (PDPC) mensyaratkan organisasi untuk patuh dengan aturan data pribadi (Personal Data Protection Act/ PDPA).
Sambutan



Perubahan masif layanan digital dalam lima hingga sepuluh tahun terakhir telah mengubah proses bisnis dan ekspektasi pada industri finansial. Perusahaan diharapkan bisa memiliki strategi untuk menangani berbagai tantangan digitalisasi, mulai dari privasi, keamanan data, hingga serangan siber harus ditangani.
Raymond Goh, VP Sales Engineering, Veeam APJ menyebutkan empat tantangan utama industri finansial; risiko pasar, likuiditas, kredit, dan pendapatan. Untuk menghadapi tantangan pasar, perusahaan finansial perlu terus melakukan inovasi. Salah satunya adalah lewat automasi untuk efisiensi proses dan tetap memenangkan pasar. Berinvestasi pada automasi membuat perusahaan bisa mengubah pekerjaan, proses, dan prosedur manual.
“Di era digital, tidak ada ruang untuk proses dan sistem manual. Oleh karena itu, penting bagi lembaga keuangan untuk mempromosikan budaya inovasi, di mana teknologi dimanfaatkan untuk efisiensi proses dan prosedur,” tandas Goh.
Perusahaan finansial mesti makin gesit untuk menghadapi tantangan persaingan dari industri fintech yang menjadi pesaing kredit layanan perbankan tradisional. Apalagi konsumen saat ini makin cerdas dan mengharapkan layanan perbankan yang lebih praktis dan terpersonalisasi.
“Selain itu, pasca COVID-19, sejumlah perubahan pada sistem bisnis juga terjadi,” lanjut Goh.
Bertambahnya kecepatan perubahan bisnis menjadi salah satu bagian dari tantangan itu. Bisnis berubah untuk mengikuti ekspektasi pasar yang makin banyak tuntutan. Perusahaan pun diminta untuk terus melakukan inovasi sebagai jurus adaptasi terhadap pasar. Automasi bisa membantu mempercepat proses dengan menggantikan proses yang diolah manusia untuk mempercepat proses dan menghindari human error.
Seiring dengan digitalisasi yang terus menjadi arus utama, inovasi seperti fintech dan blockchain tidak dapat terhindari sebagai persaingan yang harus dihadapi. Untuk memenangkan persaingan, perusahaan finansial dan perbankan mesti memanfaatkan analisis data untuk mengenali pelanggan lebih dalam. Sebab, bisnis yang mampu menebak dengan tepat keinginan pelanggan akan menghasilkan solusi yang meningkatkan pendapatan, mendongkrak pertumbuhan, dan menimbun keuntungan.
Sementara untuk menjaga risiko pendapatan, keamanan siber dan modernisasi jaringan menjadi tantangan berikutnya. Perusahaan finansial merupakan sasaran empuk bagi para penjahat siber. Tidak heran jika tingkat serangan siber makin meningkat dari tahun ke tahun dan industri pun perlu makin waspada dan mempertebal tembok keamanan mereka.
Komputerisasi di perbankan sudah dimulai cukup lama, sehingga tak heran jika sejumlah pemain perbankan terkemuka masih menggunakan aplikasi dan sistem lawas. Namun, sistem kuno ini tidak bisa akan mampu mengimbangi kecepatan dunia digital, sehingga, modernisasi sistem-sistem ini mutlak diperlukan untuk mengimbangi permintaan konsumen dan memajukan bisnis.
Untuk itu, Goh menyampaikan bahwa saat ini organisasi jasa keuangan banyak yang mengalihkan sebagian sistem mereka ke cloud untuk mempercepat proses bisnis. Tentu, keandalan teknologi cloud adalah kelincahan dan fleksibilitas dalam memperbesar atau memperkecil kapasitas sistem yang dibutuhkan (skalabilitas).
Berdasarkan riset yang dilakukan Veeam, sebanyak 50% beban kerja akan dilakukan di komputasi awan (cloud) pada 2023. Sementara 65% perusahaan akan menggunakan layanan komputasi awan untuk strategi perlindungan data mereka.
“Tuntutan lain bagi industri perbankan adalah mesti tersedianya sistem tanpa jeda selama 24 jam, 7 hari seminggu. Tidak ada toleransi untuk downtime dan kebocoran data rahasia bisa menyebabkan sanksi denda yang bisa menghancurkan bisnis perbankan.”
Saat ini, perusahaan tak lagi punya cukup waktu untuk pemulihan data. Jika dulu downtime bisa dilakukan dalam hitungan dua hingga tiga hari, saat ini toleransi terhadap downtime kian menipis. Kegagalan sistem selama 30 menit atau dalam hitungan jam saja akan sangat berpengaruh pada kepuasan pelanggan.
Bank perlu mempersiapkan sistem mitigasi dan cadangan sebaik mungkin untuk data-data paling sensitif mereka. Selain itu, kemampuan sistem untuk mampu memulihkan seluruh data tepat waktu juga menjadi tantangan. Goh menyebut 9 dari 10 pelanggan tidak bisa lolos dari ketentuan ini.
Insight Pengguna


Perusahaan perlu memastikan investasi TI yang dilakukan bisa mendukung bisnis mendulang pendapatan dan profitabilitas bisnis, mengurangi biaya, dan meningkatkan efisiensi. Selain itu, strategi TI dengan memanfaatkan teknologi baru juga membantu bisnis memiliki keunggulan kompetitif.
Untuk itu, Luis C Cruz, Direktur Eksekutif, Kepala Automasi, Infrastrutktur untuk Big Data, AI, dan Analisa DBS, percaya bahwa kemampuan untuk terus belajar menjadi fondasi untuk strategi TI yang komprehensif dan kompetitif.
Pencadangan data saat ini tidak semata digunakan untuk menyiapkan backup semata, tapi sekaligus sebagai bagian dari perlindungan data. Ia menyampaikan konsep “SMAC” (Social, Mobile, Analitic, dan Cloud) sebagai basis penggunaan big data di perusahaan besar.
“Konsep “SMAC” digunakan secara luas di seluruh industri dan oleh para CIO/pimpinan TI untuk melakukan transformasi proses bisnis dan meningkatkan pengalaman pelanggan,” jelas Luis.
SMAC merupakan model baru bagi tim TI perusahaan agar organisasi lebih terkoneksi, kolaboratif, dan produktif. SMAC bisa memengaruhi seluruh “ekosistem” perbankan mulai dari pelanggan, karyawan, dan mitra.
“Harapan saya adalah kita, sebagai pemimpin TI, tetap mengikuti tren dan implikasi dalam SMAC karena sangat berkaitan dengan peran kita. Situs penyedia layanan streaming online mungkin adalah contoh terbaik dari perusahaan yang memanfaatkan infrastruktur tumpukan SMAC dengan sebaik-baiknya.”
Luis mengutip bahwa untuk mendorong nilai pemegang saham jangka panjang, bisnis harus mengembangkan kompetensi TI yang strategis dan fungsional, meningkatkan alat TI yang meningkatkan fungsi TI, dan menumbuhkan budaya yang berpusat pada peningkatan kepuasan pelanggan. Proses ini akan memperkuat proses internal organisasi, yang dapat mengarah pada pengembangan sistem pendukung keputusan yang efisien dan penyampaian aplikasi transformasional.
Hal ini juga akan menguntungkan pelanggan, karena perusahaan akan dapat memberikan layanan TI yang konsisten dan berkualitas serta solusi TI yang inovatif untuk unit bisnis. Dengan ini, organisasi akan mengoptimalkan efisiensi TI dan meningkatkan dampak TI pada hasil perusahaan, sehingga mendorong nilai pemegang saham jangka panjang.
Penutup
Raymond Goh: Menjawab tantangan digitalisasi dengan automasi, cloud, pengelolaan data, dan kekekalan data untuk memperkuat ketahanan siber
Organisasi FSI memiliki kombinasi tantangan unik karena bisnis ini berkaitan erat dengan kepercayaan pelanggan, beban tanggung jawab yang besar lantaran mengurus keuangan, hingga peraturan yang ketat. Ancaman serangan siber dan ransomware juga terus menghantui. Untuk itu, perusahaan perlu melakukan investasi untuk mengamankan sistem, menjaga operasional, sekaligus berinovasi agar layanan bisa terus menyesuaikan dengan ekspektasi pelanggan yang makin digital.
Menurut Goh, seluruh tuntutan itu bisa diringankan dengan solusi Veeam. Solusi automasi bisa digunakan untuk merampingkan dan mengotomatisasi operasional. Sehingga, sumber daya manusia bisa dialihkan untuk berkonsentrasi pada inovasi dan hal lain yang berkontribusi langsung pada pertumbuhan perusahaan ketimbang hanya memelihara sistem lama.
“Dengan beralih ke perlindungan data modern, Anda menghilangkan beban besar dari manajemen lama sekaligus memberikan perlindungan dan pengawasan yang lebih besar terhadap data sensitif Anda,” terang Goh.
Selain itu, automasi juga menghemat anggaran perusahaan. Pemulihan data otomatis, pelanggan Veeam berhasil mengurangi biaya pencadangan dan pemulihan 55% lebih efisien dan mengurangi biaya pencadangan dan perlindungan data hingga 50%.
Veeam membantu perusahaan untuk melakukan migrasi ke cloud dan pengembang aplikasi modern. Perpindahan ini membutuhkan keahlian untuk mengubah data yang terjebak disistem lama ke komputasi awan (cloud) yang fleksibel. Dengan data yang lebih fleksibel, pelanggan bisa mengolah ulang data mereka dan membuahkan insight yang berguna bagi perusahaan. Pelanggan Veeam yang menggunakan kembali data mereka untuk mendorong pengembangan dan pengujian aplikasi modern berhasil meningkatkan produktivitas hingga 11%.
Perlindungan data dari serangan malware dan ransomware menjadi keharusan. Untuk itu, Veeam menawarkan solusi kekekalan data (data immutability). Konsep ini memberi garansi dan mengatasi celah antara jaringan produksi dan pencadangan data. Jadi, meski terjadi serangan, data cadangan tertap 100% terlindungi. Sebanyak 95% pelanggan Veeam yang menggunakan cadangan permanen tidak terpengaruh atau hanya sedikit terdampak dari ransomware.
Dengan banyaknya aturan yang mengikat institusi finansial, Veeam bisa membantu mengelola privasi, risiko, dan kepatuhan data. Sistem perlindungan data modern memastikan penyimpanan dan perlindungan data bisa mengikuti aturan-aturan yang bisa berubah sewaktu-waktu. Pelanggan yang menggunakan Veeam untuk regulasi dan privasi secara aktif berhasil mengurangi 45% kegagalan audit dan kepatuhan.
Mohit menambahkan bahwa organisasi dapat memperoleh manfaat besar dari penggunaan solusi teknologi untuk melindungi data mereka. Dengan menerapkan solusi ini, bisnis dapat memastikan bahwa data mereka aman dari kehilangan, pencurian, dan akses tidak sah serta dapat dipulihkan dengan cepat jika terjadi keadaan darurat atau gangguan.
“Intinya, tujuan kemitraan teknologi adalah untuk membantu bisnis dalam menerapkan dan meningkatkan sistem teknis mereka,” tegas Mohit.
Dia percaya bahwa kolaborasi teknologi bisa mendorong ekspansi bisnis perusahaan. Menurutnya, dua kepala lebih baik daripada satu ketika menerapkan sistem teknologi. Hal ini serupa dengan kemitraan teknologi yang dapat memberikan asistensi dan pengetahuan teknis apa pun secara efisien.