Morrissey Technology

Loading

Cyber ​​Attack Protection with Simas Cyber ​​Enterprise Insurance

Cyber ​​Attack Protection with Simas Cyber ​​Enterprise Insurance

Morrissey Technology – In today’s digital era, data is the most valuable asset for companies. We have learned enough from cases of data breaches, ransomware and other cyber attacks that have occurred recently. Without safe and protected data, company operations can be significantly disrupted. This not only has the potential to reduce revenue, but also directly harm customers.

In addition, the company’s reputation that has been built with great difficulty can be tarnished due to cyber attacks. Therefore, it is very important for companies to have a strict cybersecurity system.

In addition, the existence of regulations in Law Number 27 of 2022 concerning Personal Data Protection which requires companies to ensure data security and protection as well as the threat of sanctions in the form of administrative fines of up to 2% of annual revenue, further emphasizes the importance of strengthening company cyber security.

Cyber-security is like a fence that protects a house from thieves. However, even if you have installed a high fence, there is no guarantee that thieves cannot enter. Hackers could find loopholes and break into the system. Therefore, additional safety nets are needed to anticipate undesirable events.

PT Asuransi Sinar Mas understands that cyber crime will pose a risk of harming various business institutions in Indonesia. To anticipate this, Sinar Mas Insurance has prepared a liability insurance product, namely Simas Cyber ​​Enterprise FOR4D.

“Currently we see that cyber security has become the biggest challenge in the digital era. Protection of customer data is crucial. For this reason, Asuransi Sinar Mas has prepared Simas Cyber ​​Enterprise as protection in facing this risk,” said Director and Corporate Secretary of PT Asuransi Sinar Mas Dumasi M M Samosir, in a written statement, Tuesday (2/7/2024)

“We hope that by using this product, business sectors in Indonesia will get protection against cyber attacks in doing business,” he continued.

Simas Cyber ​​Enterprise provides guarantees for the costs of restoring electronic data affected by cyber attacks, business interruption compensation, Forensic IT services for investigating cyber attacks, threats of extortion by hackers to pay a sum of money to end a cyber attack and other guarantees.

“One of the advantages of our Simas Cyber ​​Enterprise is the fast acceptance process and effective claim settlement process,” explained Dumasi.

Simas Cyber ​​Enterprise can be used for protection for companies that have concerns about the data security of companies that manage customer personal data or store valuable digital assets on a large scale, such as financial institutions, banks, marketplaces and hospitals. Apart from corporations, Sinar Mas Insurance is also developing Cyber ​​Insurance products to be marketed to the individual segment.

Sinar Mas Insurance also provides a Simas Cyber ​​Enterprise FOR4D product consultation service which can be accessed via the following link. Apart from that, Sinar Mas Insurance is also committed to providing education so that the public has an understanding of information technology system security, cyber attacks and what can be done to minimize risks. Education will be carried out through social media and the website www.sinarmas.co.id.

Easy Ways to Search for Files on Windows Laptops and Desktops

Easy Ways to Search for Files on Windows Laptops and Desktops

Morrissey Technology – Searching for files on desktops and laptops will usually become more difficult, as the drive capacity used increases. Usually, file management is always ignored by PC users, because the majority of users only focus on the available storage space. New users will feel the impact when they need a file, which has not been used for a long time. However, there is actually a more effective and efficient way to search for these files. Here’s how to efficiently search for files on a Windows laptop, according to The Verge.

Windows file index

By default, Windows only indexes files in four areas of the PC: Documents, Pictures, Music, and Desktop folders, plus subfolders that branch off https://kepriprov.org/ of those folders. If the file is not in these folders, users can look for it elsewhere, by changing Windows search.

1. Open Settings then go to Privacy & security > Windows Search

2. Under Find my files, you will usually find the Classic search type has been selected automatically. By selecting Classic, the file search can be customized to the selected search location > Change to add the folder to the list of indexed locations by checking the appropriate box.

3. Or if you want it to be easier, users can select Enhanced so that all PCs are included in the query. However, Microsoft warns that this may affect CPU usage and battery life.

Still in the Privacy & security > Windows Search section, at the bottom of Can exclude certain folders from search, users can select folders that do not need to be included in data searches.

Excluding folders can also speed up the indexing and searching process. When the user has decided which folders he wants to index by Windows, the user can immediately search.

Finding Files in Windows

There is a search box or icon on the taskbar, just to the right of the Start menu button, that can be used to start a file search. Just type as many file names as the user can remember, and the results will appear as you type. If you want, users can also use the search box when opening the Start menu.

When you start typing, Windows will pop up a dialog showing the user what it considers the best match, and more matches below that. Users will find a series of tabs with various categories that can be used to narrow the search.

Depending on the search terms, Windows may prioritize results from the web and/or the Start menu before files, so users may need these additional filters. If all you want to access are recently installed applications or recently opened files, users Scatter Hitam don’t need to do any searching. Click the Start menu button on the taskbar, and under Recommended, there will be recently accessed apps and files.

Search in File Explorer

For further searches, users can use File Explorer and use the search box in the top right corner. Here are some tips:

  • Note the location in File Explorer, the search will be run on the folder being viewed, along with any subfolders. If you want to search all PCs, first click PC in the left navigation panel. Type the name of the file you are looking for in the search box and press Enter.
  • If you are unsure of the full file name, you can use asterisks as wildcards to represent any combination of characters. For example, searching for am* can produce files named “amstrad”, “america”, and “am8811!g”.
  • You can also use a question mark as a one-letter wildcard. For example, when searching for am?, it will give the user files named “amy”, “amd”, and “am3”.
  • Another trick is to add file extensions. searching with *.jpg, the user will get all the JPEG files in the folder and its subfolders.
  • Boolean operators are also supported. For example, use the words “samsung or google” to find files that include both words or “samsung not google” to get files that have the name Samsung but not Google.
  • If you want to further filter your search, look for Search Options at the top of the File Explorer window. Click to get a list of different search variables that can be used. For example, users can limit searches based on file size or when a file was last edited. There is also a File contents option, which can be used if you want Windows to search the file thoroughly for matches, but this takes more time.

Use third party applications

There are many third-party applications ready and willing to help with searches. Although the features offered are very similar to File Explorer, they are presented in a more intuitive way. The following is a file finder that users can use to search for data/files in Windows.

1. Agent Ransack, is a fast and sleek file finder for Windows, allowing users to search for file name matches and file contents simultaneously. Easy to select search locations and supports wildcards and Boolean operators.

2. Everything, the lightest and easiest file search tool for Windows that can also be run as a portable application directly from a USB drive. It has its own set of advanced features, including the option to match uppercase and lowercase letters in file names and being able to save searches for future use.

3. SearchMyFiles, a free search application that displays results very quickly and offers a convenient search options panel, where users can limit file matches based on file size, file date, and file attributes. It can even help users in searching for duplicate files.

4. PowerToys Run can provide a search experience similar to Spotlight on macOS. Press Alt + Space to bring up the search box in the middle of the screen, then type the name of the file you are looking for. Very useful for finding and opening certain files quickly.

https://knotraglobal.com/blogs/-/for4d/

https://dropdeadgorgeousrock.com/-/for4d/

McAfee's Anti-Spam

This is How McAfee’s Anti-Spam Feature Works

Morrissey TechnologyMcAfee launched its newest feature to protect users from cyber fraud using various modes. Even though there have been many appeals and education not to install applications carelessly, not everyone understands and is aware of the importance of protecting the data we have. Moreover, the people targeted by the perpetrators are usually people who are not aware of things like this.

One of them is the APK mode distributed via WhatsApp, which can threaten the bank accounts of victims who use mobile banking. For this reason, McAfee released a feature called Scam Protection.

By using this feature, it is hoped that the user’s important data will not be known by any party. This feature will provide a warning if there is a malicious application installed on the user’s cellphone.

Apart from that, this feature will analyze links in text messages, emails, or even on social media using the help of AI technology. There is also a Safe Browsing feature, which if activated, Scam Protection will block dangerous sites, thereby reducing the possibility of leaking user data.

How many hours a day do you spend on your cell phone? 5 Hours? 10 hours? Cell phones have become a part of everyday life. There is a saying that says a wallet can be left behind but it is impossible with a cell phone. However, unfortunately awareness of the importance of cellphone usability is not comparable to awareness of the importance of cellphone security. “That’s why McAfee is here as a leading security solution,” said Eddy Cahyono, CEO of Kharisma Inside Mandiri Sejahtera (KIMS).

KIMS is the sole distributor of McAfee Security products, and not only in Indonesia, but also in the Southeast Asia region.

https://aligarhlocks.in/wp-content/products/for4d-togel/

Google Gemini AI

Good News! Google Presents Gemini AI for School Children and Teachers

Morrissey TechnologyGoogle announced that it is bringing Gemini AI technology to students using their school accounts, also giving educators/teachers access to new tools from Gemini AI. Previously, Google had offered Gemini services to teenagers using their personal accounts.

Google says that giving teenagers access to Gemini can help prepare them the skills they need to thrive in a future with generative AI.

Google says Gemini will help students learn more confidently with real-time feedback. Google claims that it will not use data from chats with students to train and improve its AI models, and has taken steps to ensure that it brings this technology to students responsibly.

Gemini has guardrails that will prevent inappropriate responses, such as illegal substances or age-inappropriate substances, from appearing in the response. Gemini will also actively recommend teens use the proofreading feature to help them develop information literacy and critical thinking skills FOR4D.

Gemini will be available to teen students when using a Google Workspace for Education account in English in more than 100 countries. Gemini will be turned off by default for teens until an admin chooses to turn it on.

Apart from that, Google also announced that they were launching the Read Along in Classroom feature globally. This feature helps students build reading skills and get real-time support. Educators can assign reading activities to students based on their grade level or phonics skills.

They can then see insights into their students’ reading accuracy, speed, and comprehension. Google is also trialling the ability to generate personalized stories tailored to students’ needs.

Google makes it easy for educators to create, manage, and share interactive lessons. Additionally, educators also gain the ability to manually mark assignments as incomplete or completed, and perform grading actions in bulk.

https://www.opportunitycreator.com/-/for4d/

Artificial Intelligence

A Glance at the Trends in Artificial Intelligence (AI)

Morrissey Technology – Recently, Netflix released a new, futuristic film based on the story of artificial intelligence (AI) technology, entitled “Atlas”. This film shows the dark side of AI and also the possibility of collaboration and harmonization between humans and AI, through a technology called “neurolink”.

Atlas, a fictional character in the film, represents the current skepticism of much of humanity towards the development of artificial intelligence (AI) and its impact on real life and the future of humanity. Even though the technology in the film is actually all around us now, be it AI or neurolink, whose name and working principle are similar to the neuralink technology developed by Elon Musk.

Full name Elon Revee Musk, a well-known businessman and investor in the digital sector, born in 1971, recently received strong criticism from one of the expert scientists known as the GodFather AI, Yann Andree LeCun. According to Yann, as written on his X / Twitter account, Elon is too based on conspiracy theories and “exaggerates” when talking about AI development. According to Yann, the development of AI technology is (should) be based on research and scientific studies FOR4D.

Elon, via his X/Twitter account, has thrown back criticism by asking what contribution scientists like Yann have made to the development of AI today. Moreover, according to Elon, Yann is “just” an employee of a large corporation who must be ready to take orders. In fact, Yann, who is the Chief AI Scientist at Meta, is also a well-known Professor of Mathematics with dozens of scientific papers/technical papers that he has published, including about the development of AI technology which is now widely carried out in the world.

This debate is interesting, valid and relevant, illustrating how the point of view of a businessman and investor like Elon collides with that of a scientist and researcher like Yann. AI technology must be fully implemented by various parties, from both positive and negative sides in its development and use. Even today’s AI technology itself, because it is developing quickly and almost independently, is projected to one day be able to surpass human intelligence and control. How far have we prepared FOR4D.

AI and the Digital Divide

In the AI ​​for Good Global Summit Forum which was held in Geneva at the end of May 2024, it was stated that humanity today will not be able to avoid (the development of) AI technology. However, behind the discourse about all the goodness brought by this technology, all of us, also globally, continue to be haunted by risks and negative impacts that cannot yet be clearly measured.

Negotiations and debates are still hotly underway in countries in the Global North and Global South. One of the points is about how to develop AI ethically, of course by understanding the different conditions and ecosystems in each country.

Within the country itself, for example, amidst the big discourse on the development of artificial intelligence (AI) and the ethics of its use, Indonesia is still faced with conditions of digital infrastructure/access gaps, unequal digital literacy skills in each region and the shadow of worry about job losses due to replacement. by AI technology.

This can also be seen in the reality of urban and rural disparities. Urban areas are considered to have more opportunities to be able to keep up with AI developments better than rural areas in Indonesia.

Of course, one of the reasons is because the forums available to discuss AI issues take place more in urban areas than rural areas, as well as the intensive use of AI in various health, financial and educational services in a number of big cities.

AI and Cybercrime

AI is indeed able to present a new style of learning and working that is more effective and productive with superior results for its users in creative and positive ways. But on the other hand, AI can also “facilitate” similar things for criminals.

Returning to the film “Atlas” which was mentioned at the beginning of this article, there is a figure called “Harlan”, an AI technology with terrorist abilities and attitudes that threaten human security. It may still seem futuristic, but crimes based on AI technology are already widespread around us.

In mid-2023, for example, WormGPT, an AI-based malware, will be able to generate and spread malicious code automatically. This certainly shocked the cybersecurity world and served as a reminder that AI technology has the potential to be misused. At least, here are some crimes that use AI technology, as quoted from Technology Review.

1. Spread of Phishing

Phishing is the biggest cyber crime that is “assisted” by AI. Phishing criminals are now using AI technology to further perfect their criminal tricks. Spam generating services, such as GoMail Pro, for example, have integrated ChatGPT into their services to make it easier for criminals to interpret their fraud and send it to victims.

2. Deepfake Fraud

AI technology now allows cybercriminals to fabricate sounds, images and videos so that they appear very similar to the real thing. In an MIT Technology review of AI-based cybercrime, it was found that many platforms openly sell deepfake services at a relatively cheap price of around 160,000 per image. In Hong Kong, a finance worker at a multinational company was tricked into paying US$25 million (Rp. 392.97 billion) to a fraudster who used deepfake technology by posing as the company’s chief financial officer.

3. Jailbreak Service

This service allows criminals to manipulate AI systems. For example, writing code to create ransomware. Some AI companies, such as OpenAI and Google, have routinely installed security systems to prevent this from happening.

4. Doxxing and Spying (without rights)

AI is not only used for phishing, but is also a tool that is widely used for doxxing, for example to identify someone’s personal information online. This is because the AI ​​system is trained to retrieve data quickly from the internet, including personal data. Several researchers found that some AI technologies are capable of analyzing sensitive information such as ethnicity, a person’s location and a person’s occupation.

5. Hoax / Disinformation

AI can be used to produce highly realistic and convincing propaganda and disinformation content. This content can then be shared on social media and other online platforms to manipulate public opinion, spread hatred, or disrupt the democratic process.

6. Harassment Behavior

AI can be used to harass individuals online. AI can be used to analyze social media and other online activity to gather information about victims, and then use that information to send harassing or threatening messages. AI is also used to manipulate photos and videos of victims.

AI and Human Kindness

Not only is it a source of fear, AI is also being developed for the good of humanity. In the film “Atlas”, it is told that ultimately AI technology was used for good for the good of humanity. Apart from AI in the film Atlas, the development of AI-based technology for good is currently also being carried out in the fields of agriculture, fisheries, health, education and AI-based security.

For example, the development of AI to detect breast cancer by Google Health in collaboration with several hospitals in the UK. In Indonesia, BRIN is also developing innovative AI-based technology, including: SADEWA for weather prediction, SEMAR for fisheries and extreme weather at sea, SRIKANDI for air quality related to the health and environmental sectors, SANTANU for rain monitoring, JATAYU for aviation weather, SRIRAMA for climate change, KAMAJAYA FOR4D for the start of the season related to agriculture, INDRA for water resources and GATOTKACA for monitoring humidity or water vapor over Indonesian territory.

So, if we return to the excerpt from the debate between Elon and Yann above, it can be said that AI technology is not something that can or should be seen from just one point of view. There is a need to involve multiple stakeholders, namely government, academics, civil society, the private sector and the technical community, to ensure that the development and use of AI technology can be carried out ethically, safely and responsibly.

Each stakeholder will have varying points of view and may differ in negotiating the positives vs. negatives of AI technology. However, if we believe that differences in negotiations are a blessing, then AI will certainly be able to bring full benefits.

https://www.impulseintl.com/-/for4d/

Malware in Chrome Web Store

Watch out! Lots of Malware in Chrome Web Store

Morrissey Technology – Google may claim that less than 1% of extension installations from the Chrome Web Store contain malware. However, other security researchers have different data. For your information, currently the Chrome Web Store contains more than 250 thousand extensions — a kind of additional application for the Chrome browser. Google boasts that its security team has succeeded in reducing the number of extensions containing malware from the Web Store.

“Just like other software, extensions can also contain risks,” said Google’s cybersecurity team.

However, other data emerged from a Stanford University security research team, consisting of Sheryl Hsu, Manda Tran, and Aurore Fass, who collaborated with the CISPA Helmholtz Center for Information Security.

They researched the Security-Noteworthy Extension (SNE) in the Web Store, and this SNE is an extension that is categorized as malware, violates Chrome Web Store rules, or an extension that has security holes.

During July 2024 to February 2023, there were 346 million users who installed extensions in the SNE category FOR4D. 63 million of them violated Web Store rules, and three million had security holes, meaning extensions containing malware were installed 280 million times.

In fact, in that time period there were only 125 thousand extensions available in the Chrome Web Store. The trio of researchers also found that Chrome extensions that are safe and do not contain malware usually don’t last long, only 51.8 to 62.9% survive after one year. Meanwhile, extensions that fall into the SNE category can actually last for an average of 380 days, and can even reach 1,248 days if they only contain security holes.

The SNE that lasted the longest in the Chrome Web Store was TeleApp, which lasted for 8.5 years and was last updated on December 13, 2013. When it was discovered to contain malware on June 14, 2022, this extension was removed. What’s worse, the application or extension rating doesn’t help much to find out the presence of malware in this SNE case.

“Overall, users never give SNE a low rating, which may be because users may not realize that this extension is dangerous. There is also the possibility that there are bots that give fake reviews and give high ratings to the extension,” wrote the research team in his paper.

https://knowyouridol.com/-/for4d/

https://stirringthefire.com/-/for4d/

Facing AI, the World of Work Needs Digital Skills and Collective Bargaining

Facing AI, the World of Work Needs Digital Skills and Collective Bargaining

Morrissey Technology – The development of Artificial Intelligence (AI) has various impacts on humans. Especially in the employment context. So that AI can continue to provide benefits to the world of work, there needs to be collective bargaining between workers, corporations and AI technology providers.

“To ensure that AI can bring prosperity to humanity, there needs to be a serious policy regarding employment carried out through collective bargaining,” emphasized Celeste Drake, Deputy Director General of the International Labor Organization (ILO) – UN, at the Artificial Intelligence and Implications on the Indonesian Labor Market Forum.

The ILO, the UN organization that focuses on employment issues, also provides a number of additional pre-conditions, to ensure that AI does not necessarily “threaten” existing jobs.

“Efforts need to be made to ensure digital skills and lifelong learning for the workforce, so that they can then utilize AI technology,” said Celeste at the event which was also attended by ICT Watch at the invitation of ILO FOR4D – Jakarta.

He also added that adequate governance regarding the use of AI in the world of work also needs to be in place. “Which AI can be used and which should not be used, there needs to be governance,” he stressed.

According to him, with adequate AI governance, anticipatory steps can be taken to minimize discrimination against workers related to the use of AI technology or the recommendations produced by it.

The ILO is currently studying in depth and continuously whether and how AI technology can disrupt the employment sector. This is for example how algorithmic management practices are often associated with work efficiency and effectiveness, such as ranking systems, supervision and control through tracking devices, online recording of working hours, the use of various forms of work, and so on.

In a study included in ILO Working Paper 96 as of August 2023, it was shown that most jobs and industries are exposed to AI only in automation and are more likely to “supplement” rather than “replace” with the latest Generative AI technologies, such as chatGPT. Therefore, according to the ILO, the biggest impact of AI technology is likely not to be the loss of jobs, but rather the potential changes to the quality of work, especially work intensity and autonomy.

https://danestanynews.ir/for4d/

Huawei

No Longer Needed, Huawei Completely Abandons Android

Morrissey TechnologyHuawei officially launched HarmonyOS NEXT, the latest version of its operating system, at Huawei’s annual developer conference, HDC 2024, which is the stage for the company’s biggest announcement. This announcement comes after years of development of the HarmonyOS operating system, which was originally known as Hongmeng.

This Chinese-developed operating system (OS) completely ditches the Linux kernel and Android Open Source Project (AOSP) codebase in favor of a completely independent architecture built around Huawei’s Hongmeng kernel and system.

Huawei claims that the new system architecture delivers a 30% improvement in overall machine performance and a 20% reduction in power consumption. Currently in beta testing, HarmonyOS NEXT is looking for developers and a number of early adopters to participate. Those interested should be aware that the beta version may be unstable and may cause data incompatibility issues.

The main feature of HarmonyOS NEXT is the ability to bridge the gap between different devices. According to Huawei, developers only need to create one version of an app to ensure a consistent user experience across different screen sizes in the Huawei ecosystem FOR4D.

This was demonstrated at the conference with popular apps such as Taobao, Yiche, and Bilibili running smoothly across different devices. Additionally, HarmonyOS NEXT offers a unique “App Continuation” function. Imagine starting a video call on your tablet and seamlessly transferring it to your phone with one click. This system also allows easy sharing of data between devices. For example, you can easily cut and paste images from your phone to your tablet while working on a document.

HarmonyOS NEXT FOR4D is claimed to be more than just device connectivity. This system integrates artificial intelligence (AI) capabilities directly into the system, referred to as “Harmony Intelligence.”

This integration unlocks a variety of features, including:

  • AIGC image creation: Create unique images from line drawings, colorize existing photos, or even enlarge them.
  • Industry-first AI voice repair: This feature aims to help people with speech disorders by improving communication.
  • “Xiaoyi Sees the World” for visually impaired users: This feature uses AI to “read images” by describing their content aloud, potentially helping users identify objects around them.
  • AI-powered control: HarmonyOS NEXT allows third-party apps to leverage the system’s AI for features like real-time text reading, smart form filling, and image/text translation.
  • Then Huawei’s virtual assistant feature, Xiaoyi, has received an upgrade and is called Xiaoyi Intelligent Agent. Xiaoyi no longer requires a wakeup word and can be “summoned” by simply dragging and dropping content onto the navigation bar.

This allows for more intuitive interactions where Xiaoyi can analyze content and offer relevant actions, such as creating charts from images or summarizing documents. Security remains a top priority for Huawei. HarmonyOS NEXT FOR4D introduces the new Star Shield security architecture, designed to keep user data safe. This architecture implements several steps:

  • Rigorous application inspection: Code and applications that do not meet security standards will be blocked from being installed.
  • Multi-device data encryption: Data is encrypted end-to-end across multiple devices for increased protection.
  • Hardware-level encryption: Individual files are encrypted with a unique key stored on the device’s hardware.
  • Permission control: Restrict unnecessary app permissions to minimize privacy risks.
  • HarmonyOS NEXT is still in the development phase, with a commercial launch expected in Q4 2024. The beta testing phase has begun, and Huawei is actively seeking developers and early adopters to provide feedback and help improve the system.

https://psychcjr.com/for4d/

Ransomware National Data Center

National Data Center Down, Cyber ​​Expert Says Suspected of Being Attacked by Ransomeware

Morrissey TechnologyThe National Data Center (PDN) experienced disruption from Thursday (20/6/2024) until today there are no signs of progress towards returning to normal operations. Cyber ​​experts suspect that PDN suffered a Ransomeware cyber attack. As a result, PDN experienced problems resulting in long queues carrying out the immigration process not only at Soekarno-Hatta Airport, but at all Immigration Offices throughout the country.

Chairman of the CISSReC Cyber ​​Security Research Institute, Pratama Persadha, revealed several things that could cause total disruption like this, including electricity supply disruption, server damage, internet connection disruption, as well as cyber attacks such as DDoS or Ransomware.

“If the disruption occurs due to a cyber attack, then the risk is even greater because it not only disrupts services but can also result in personal data being leaked,” said Pratama in his written statement.

Previously there had also been a cyber attack on Immigration which resulted in the leak of personal data, namely the leak of 34 million passport data. What’s even more dangerous, said Pratama, is if hackers can access the servers at the National Data Center, of course the data leak that occurs will not only affect the Directorate General of Immigration but also other institutions that use PDN to store citizen data.

If we look at the pattern of disturbances that occur, Pratama believes that there is a possibility that the problems that occurred at PDN were caused by cyber attacks using the ransomware method, as was the case that happened to Bank Syariah Indonesia previously.

“If the problem faced by PDN is a technical problem, it certainly won’t take that long. The electricity supply problem can be resolved immediately by using electricity supply from another substation or using a generator for temporary supply,” he said.

Likewise, if the problem is an internet connection, such as a break in the fiber optic cable entering the PDN, it can still be resolved quickly using a Point-to-Point radio connection which has a large bandwidth and doesn’t take long to install.

“Similarly, if you are hit by a cyber attack using the DDoS method, the response time required will not be that long because it can be easily resolved by utilizing Anti-DDoS devices and collaborating with ISPs to increase bandwidth capacity and help overcome DDoS from the ISP side,” he explained. .

By seeing this incident, Pratama said that using PDN could endanger the country if it is not equipped with strong security, so that each government agency hosting PDN must create a strong Business Continuity Plan (BCP) so that it does not depend 100 ℅ on PDN infrastructure.

He said that with the PDN down incident, the government must clearly explain what happened and from the start explain BCP from this kind of risk. It should be noted that the PDN currently being built only provides the infrastructure to store data from each agency that owns the SPBE.

“The cyber security factor also still needs special attention because what PDN managers currently guarantee is the cyber security of the PDN infrastructure itself, while the cyber security of each SPBE application is still the responsibility of the agency that owns the SPBE,” he concluded.

https://jakartautara.imigrasi.go.id/js/sdemo/

http://nem-lb.com/web/-/togelonline/

https://smkwalisongojakarta.sch.id/-/togelonline/

https://gidapp.bangkok.go.th/cibma/-/togelonline/

Joe Biden Blocked Victims Increase, Russian Antivirus Company Suspended

Joe Biden Blocked Victims Increase, Russian Antivirus Company Suspended

Morrissey Technology – The United States government under the command of President Joe Biden banned the sale of Kaspersky antivirus in his country for national security reasons. US citizens are asked to switch to other antivirus services. The Bureau of Industry and Security under the US Department of Commerce argued that Kaspersky threatens the security and privacy of users in the US because the company is headquartered in Russia.

“Russia has demonstrated that it has the capacity, and even more so, the intent to exploit Russian companies like Kaspersky to collect and weaponize the personal information of US citizens,” said US Commerce Secretary Gina Raimondo.

One Reuters source said Kaspersky’s close ties to the Russian government posed a national security risk. It is feared that Kaspersky and the Russian government could steal sensitive information, install malware, or prevent security updates on devices belonging to US citizens FOR4D.

Kaspersky will be banned from selling its software to consumers and businesses in the US starting July 20, 2024. However, they can still release software and security updates to their users until September 29, 2024. After that Kaspersky could no longer provide updates for its users in the US. Raimondo insists Kaspersky users in the US are not breaking the law and advises them to use alternative antivirus.

“Individuals and businesses in the US who continue to use or own Kaspersky products and services are not breaking the law, you are not doing anything wrong and are not subject to any criminal or civil penalties,” Raimondo said.

“However, I ask you to immediately stop using this software and switch to an alternative to protect yourself and your data and your family,” he continued.

This ban is the latest development in a series of actions taken by the US government against Kaspersky FOR4D. In 2017, the Donald Trump administration banned US federal agencies from using Kaspersky antivirus.

Earlier this year, Russian government hackers reportedly stole classified documents stored on the personal computer of a contract employee at an intelligence agency who used Kaspersky antivirus. This is the first reported espionage incident due to the use of Kaspersky antivirus. The US government is increasingly aggressive in blocking foreign technology or limiting it. Companies in China, especially, are increasingly restricted from getting technology from America.