APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Unified Communication
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Taming the flow monster in real-time payments

    Bhupendra Warathe, Chief Information Officer (Corporate and Institutional Banking, Information Technology and Operations)

    Benefits in Unifying Business Communications

    Liam Mallett, CIO, Kings Group

    Innovation-Operations- Transformation - The New IOT Challenge of CIO

    Chin Seng Teo, Global CIO & SVP Global Information Systems, DP World

    Changing Face of Unified Communications from the 80's to Now

    Darshan Appayanna, CIO, Happiest Minds Technologies

    IntelligenceBank Digital Asset Management: Managing the Marketing Process, Easier

    CEO, Intelligence Bank

    ZWCAD Software Co., Ltd. : Integrated CAD/CAM Solution Provider

    CEO, ZWSOFT

    SIPEF

    Daniel Suraboyini, Head Global Chief Information Officer, Information Technology, SIPEF

    The Ever-Changing Landscape of Hospitality Industry

    Virgil Michael, IT Director, Hoiana Resort & Golf

    right

    Protecting Business Travelers from Cyberattacks

    Kenneth Chau, SVP Of Global Enterprise And President Of Asia Pacific, UCloudlink

    Tweet
    content-image

    Kenneth Chau, SVP Of Global Enterprise And President Of Asia Pacific, UCloudlink

    As the world becomes more connected and business travels now a norm for a lot of industries, just how safe is our mobile data connection?

    Recent news on the leakage of unreleased episodes of HBO’s iconic “Game of Thrones” television series had reminded us on the heightened cybersecurity risks that businesses and organizations face around the world every day.

    Following the Petya and Wannacry ransomware attacks which caused major disruptions to thousands of companies in recent months, the breach of “Game of Thrones” content showed how cybersecurity mishaps can lead to the potential loss of highly-valuable intellectual property and sensitive commercial information, jeopardizing businesses operations in any industry.

    To protect confidential and proprietary business data against the clear and present danger of cyberattacks, companies need to step up their defenses to safeguard their corporate systems and data. One of the biggest vulnerabilities for companies is unsecured public Wi-Fi. Available at airports, hotels and coffee houses around the world free of charge, public Wi-Fi does not only enable users to get online and access information and applications stored in enterprise servers remotely, it could also open doors for cybercriminals.

    According to a recent survey by security solution provider Symantec, almost 90 percent of people in Hong Kong had used public Wi-Fi in a way that exposed their information to risks, but only one in four had taken protective measures.

    With the growing popularity of bring your own device (BYOD) in the workplace, and the increasing need for international business travel, executives are always carrying valuable corporate data and proprietary information on their smartphones, tablet computers and laptops. These trends haven’t gone un-noticed by cybercriminals.

    In recent years, companies around the world have invested billions of dollars on information security technologies including firewalls and real-time access control to protect their systems.

    By provisioning the CloudSIM dongle to business travelers, companies can better safeguard their information systems against breaches and intrusions from hackers

    However, injudicious use of public Wi-Fi hotspots by business travelers can inadvertently disable their companies’ information security strategies in one fell swoop.

    While public Wi-Fi is easy to use and convenient, business travelers need to evaluate the risks that may be posed to their companies and customers as cybercriminals seek to exploit ways to steal valuable corporate data and sabotage carefully-orchestrated business plans.

    The solution is not to halt advances in mobility and ban usage of wireless connectivity altogether. Instead, IT managers can enjoy the best of both worlds and leverage new and more secure technology innovations to unlock the advantages of mobile productivity and efficiencies.

    Rather than using public Wi-Fi, business travelers should only access corporate servers through wireless connectivity solutions managed and supported by their IT departments. With the latest technologies, private connection setup for authorized corporate users can be very easy and straightforward. In fact, it can be almost as convenient as getting on public Wi-fi, only far more secure.

    Proprietary technologies like the CloudSIM solution, provides wireless connectivity to multiple user devices through a designated adaptor that roams on the strongest available 4G LTE or 3G cellular network. Without the installation of a local SIM card, all data transmissions via the CloudSIM dongle is protected by WPA2-PSK encryption for enhanced information security.

    By provisioning the CloudSIM dongle to business travelers, companies can better safeguard their information systems against breaches and intrusions from hackers, while enabling their staff to enjoy excellent mobile connectivity in more than 100 countries around the world.

    In addition, data usage in the CloudSIM dongle is continuously monitored in real-time, which ensures visibility and control on all network traffic through CloudSIM devices, further minimizing risks of unintended network usage, in the event of a cyberattack.

    The CloudSIM dongle is also an effective way for businesses to reduce costs of international roaming, which often deterred cost-conscious business travelers and could potentially impact productivity. For instance, a business traveler from Asia passing through the UK, France, Belgium and the Netherlands in one day may be charged daily-roaming fees four times within 24 hours. To avoid the prohibitively expensive roaming costs, the CloudSIM solution can help companies manage their telecommunication costs through a pay-as-you-go (PAYG) model, ensuring all data capacity is effectively utilized. Unused data on SIM cards will no longer be a drag on costs. A range of data packages including pre-paid and monthly packages are available to serve companies with different employee travel needs.

    With constant access to a safe and highly-secure private wireless dongle, instead of wasting time to evaluate the myriad cellular network options of local carriers, business travelers can now focus on their business priorities and workflow. More importantly, companies can reduce the risks of increasingly virulent ransomware and other malicious cyberattacks, keeping commercially-sensitive company data at arm’s length from cybercriminals.

    tag

    Information Security

    real-time access

    Weekly Brief

    loading
    Top 10 Unified Communication Solution Companies - 2018
    ON THE DECK

    Unified Communication 2018

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Digital Transformation: A Journey Beyond Technology

    Digital Transformation: A Journey Beyond Technology

    John Ang, Group CTO, EtonHouse International Education Group
    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Building A Strong Data Foundation: The Key To Successful Ai Integration In Business

    Richa Arora, Senior Director Of Data Governance, Cbre
    Transforming Tollways Through People, Data and Digital Vision

    Transforming Tollways Through People, Data and Digital Vision

    Carlo Cagalingan, Chief Digital Officer and Chief Information Officer, Metro Pacific Tollways Corporation
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://unified-communication.apacciooutlook.com/cxoinsights/protecting-business-travelers-from-cyberattacks-nwid-4517.html