Connect with us

Tech & Innovation

5 Steps to plan your digital transformation

Five key areas decision makers should consider while planning for a digital transformation. Inspired by Sun Tzu’s Art of War, the concepts and examples are based on my views and lengthy experiences in the IT industry.

Published

on

By Yeo Siang Tiong
General Manager for Southeast Asia at Kaspersky

Being in the IT industry for the last 28 years, I had the chance to observe the many advancements and upheavals in the field – advancements in technology, changes in standards and protocols, mergers and acquisitions, layoffs and re-organizations. But I have never seen Southeast Asia (SEA) transforming at a breakneck speed until this pandemic. 

This transition boils down to one segment – digital. In fact, the region has reached more than the forecasted 310 million online consumers for 2025 in 2020, five years in advance. Thanks to the 40 million first-time internet users last year from Indonesia, Malaysia, the Philippines, Singapore, Thailand, and Vietnam.

As a result, there is now an urgent need for businesses to reconsider their infrastructure, their business model, and their ways of doing transactions. The stakes are higher for firms to wade through this digital wave, with this global crisis in the background.

So today, I want to share five key areas decision makers should consider while planning for a digital transformation. Inspired by Sun Tzu’s Art of War, the concepts and examples are based on my views and lengthy experiences in the IT industry. These 5 areas are – 五事:道、天、地、将、法。

  1. Alignment – Alignment from the board level or CEO to the last men in the front-line like the customer support and sales is important. If aligned, the men will fight the toughest war. The “Shared Values” and “Strategy” in the McKinsey 7-S Model are probably the closest elements to this concept. 

Unfortunately, the modern management theory sees the shareholders as the ultimate people to please, with employees as mere digits akin to the factory workers of the Industrial Age. Coupled with disproportional use of debt-based leveraged buyouts, owners are no longer owners and alas, the employees who staked their well-being on the company, their voices are hijacked. 

Fortunately, this is probably true only for the larger corporations where the gains are meaty. Nonetheless, for all corporations of various sizes, the spirit of the company is the thread that weaves all together. Without a clear sense of direction and purpose that is well communicated, the individual parts can be difficult to summon and align.

Applying this logic to digital transformation, the whole company from the C-suite to the groundwork staff should be structured correctly, aligned, fully aware and on board.

A good example is how companies pivot into digital retail. It is important that the company is well aligned to execute this. The company needs to understand that digital retail is another channel to reach the same customer. So for companies who does not have a consistent strategy for omni-channel, they end up setting up a new department to target this without rallying the other conventional channel to join the race, causing fault lines to divide the company.

  1. Natural elements – Natural elements refer to climate and timing. In this era of digital transformation, timing is the more appropriate element. Interestingly, the concept of timing is also reflected in many ancient Chinese classical philosophical studies, like Lao Tzu’s Tao De Jing, who advocated in flowing with “Tao”. 人法地,地法天,天法道,道法自然. For those who observed the masters in executing the TaiChi movement, counteracting the enemy’s strokes involves the timing of absorbing their strikes by moving along the force, not against. 

Not going so far, we are well aware that the current pandemic has been causing major disruptions across all industries and entities in Southeast Asia. Based on “Tao”, businesses, no matter what shape or size, should move along with the on-and-off lockdowns and restrictions. How? There is no other way but to harness the power of technology. 

With transactions online predicted to hit $1.2 trillion in SEA by 2025, it is timely to start shifting your physical records and dealings online, from forms to be filled, payment, and other in-between affairs. If you have not started or considered it yet, you should do so now.

  1. Physical elements – You may ask how physical elements are related to a non-physical environment such as the internet. During the ancient time, this will be about the soldiers’ marching distance and the war’s type of terrain. Currently, and in digital transformation, it is about your market that you operate in (terrain).

Identifying the right market is critical. This is not just a geographical market identification, it is also identifying the approach to the market, and targeting the correct audience type that fits into the company strategy. For example, a clothing line manufacturer may choose to directly market to the consumers. The manufacturer may choose to go for un-addressed country to avoid conflicting with the existing ecosystem of business partners, or may choose a new target audience (youngsters), reaching them through social media influencers, and selling it purely online.

  1. Managers – One cannot execute a plan without the management’s approval. This pandemic showed that innovation is needed to thrive and our recent survey revealed that managers play a crucial role to enable it. 

A great majority (96%) of surveyed companies confirmed that their board plays a direct role in business innovation. This means that if innovation has more weight behind it, there will be more drive and this not only changes the way businesses operate, but their deep-rooted culture and corporate DNA. 

These are welcome findings and a reminder to loop in your C-suite about your digital transformation plan.

Aligning this across the structure is also important. Execution needs to be aligned all the way to the last person in the hierarchy. That means, the many layers of managers are key to its success, and not just lip service from the top. At times, we see the drive from the top, but the effort is thwarted by managers, especially line managers who are used to addressing old markets, using old tools, or are simply not convinced. 

Qualities we need to look for in good managers are : wise, trustworthy, benevolent, courageous, strict ( 将者,智、信、仁、勇、严也。)

  1. Structure and Protocols/Process – Technological advancements freed us of the need to maintain roads for military supplies, to marshal armies in proper subdivisions, and to control military expenditure. However, this was changed to the need to plan our steps, consider our assets, redefine our protocols, and train our employees regularly. 

For instance, the same survey revealed that 95% of innovations in a company fail before the launch and the culprit is lack of planning. Reverting back to digital transformation, it is important to have defined protocols, comprehensive security measures and tools at hand, and a clear road map and division of tasks to make it possible. 

It is important to equip your company before diving into an irreversible transformation. Be sure that you have the updated and secured tools, revisited and adapted your process flows to a digital-first approach, and trained all your employees about securing and managing your evolving IT environment.

What part then, does cybersecurity play in this transformation? One thing that companies mistakenly think is that cybersecurity stifles innovation. In our recent survey, 54% of our respondents shared this thought. But news about data breaches and ransomware attacks should be considered a clear warning about this thinking. Any such breaches will set the company back in terms of digital transformation as it shakes the transformation at the foundation layer. This is akin to old times when you move the front troops too fast, stretching the supplies line and risking the hijacking of your food supplies, and starving the front troops before they reach the destination.

So yes, it is essential that your digital transformation plan include a comprehensive look into cybersecurity at the earliest.

BizNews

GoDaddy encourages MSMEs to streamline their online presence

Having your own website allows you to leverage borderless communication, control your own messaging, and increase your reach among audience segments you might otherwise lose to other brands on social media. 

Published

on

As a company that empowers everyday entrepreneurs, GoDaddy supports small business owners and entrepreneurs for them to be well-equipped to thrive online, especially given the current landscape. The company is particularly focused on empowering micro, small, and medium enterprises (MSMEs), as the global pandemic has significantly impacted this sector. 

The Department of Trade and Industry (DTI), in a recent survey, said that 10% of Philippine MSMEs have closed operations since June of 2021, with 46% of MSMEs in partial operations, and 53.8% reporting a decline in their sales. 

With these figures, it’s no surprise that many have adapted a digital means of conducting business, with varying degrees of success. While social media is often the main entry point and a great first step in establishing an online presence and futureproofing your business, GoDaddy also emphasizes the need to identify the unique advantages that having an official business can bring to help entrepreneurs move along in their digital journey. 

While it’s instinctive, especially for small businesses, to think that creating a website is time-consuming and expensive, establishing an online presence via an official website is actually a great, long-term investment. Having your own website allows you to leverage borderless communication, control your own messaging, and increase your reach among audience segments you might otherwise lose to other brands on social media. 

With tools like the GoDaddy Website Builder, you can launch your website in no time, as the tool gets you started with thousands of templates to choose from, as well as a drag-and-drop editor to easily build the website’s look. Custom site content can also be added in each section of the website. The Website Builder features tablet and mobile layouts, making your website more responsive and unique to your business. 

Having a website can also allow you to spotlight your brand’s offerings, away from the clutter of images on any given social media platform. You can organize this further, and dedicate an ecommerce shopping section integrated with your website, with GoDaddy E-Store

Another benefit of having your own website in the early stages of a business is being able to pin down both the quantity and quality of your website traffic. To maximize this capability, a powerful tool you can add in your kit is the Digital Marketing Suite, with inclusions such as analytics to track marketing success, and Search Engine Optimization (SEO) training to guide you in driving even more traffic to your site. This suite of digital tools comes with tailored action plans, enabling you to plan your next moves, guided by data, in attainment of your business goals and toward expansion of your business. 

“It’s only logical to go where the audience is, and that is online with the quarantine having increased the online activity. With  a lot of businesses having started doing so, the challenge now evolves to how to drive and retain online engagement,”  Norman Barrientos, GoDaddy’s Director of Marketing for Southeast Asia, said. “There are many ways to go about this and one of the most exciting things about digital is the capability to experiment. For those who have little wiggle room for extra time, having a website can be a way for businesses to strengthen and streamline their online presence,” he added. 

Continue Reading

Tech & Innovation

Why you should care about your digital footprint

In this age of digital and technological transformation, information about anything and everything is readily available online. While we may reap the benefits of this more often than not, we must still remain vigilant and take active steps to protect ourselves and the people around us. 

Published

on

With how widespread the use of technology and the internet has become, it is practically impossible to come across someone that hasn’t used Google at least once in their lifetime. Likewise, people who don’t own a single social media account are far and few between; and while access to such websites have their perks, their accessibility in itself could easily lead to one’s downfall.

In a presentation entitled “Online Privacy and Risk Management” by OSINT Intelligence Analyst Ritu Gill held during Trend Micro’s annual cybersecurity conference DECODE 2021, Gill points out common habits of internet users that could be threatening their safety. Gill also shares instances when we unknowingly leave traces of our identity and ‘digital breadcrumbs’ that hackers could easily use to access sensitive information.

While the conference is primarily attended by cybersecurity professionals, students looking to learn about the field are still welcome. “The various panel discussions and presentations are designed to cater to different sectors as part of our efforts to educate vulnerable audiences and raise awareness on online safety and security,” said Alma Saturnino-Alvarez, Director of Threat Hunting at Trend Micro.

To better protect ourselves and minimize our digital footprint, here are some DOs and DON’Ts from Intelligence Analyst Gill herself that can apply to everyone –expert or otherwise. 

1. Be careful when posting photos of things that could contain sensitive information.

While this may be obvious and self-explanatory, it still persists to be a common mistake of social media users. Gill shares that even when covering up flight information and ticket numbers, an exposed barcode or QR code alone could already make your personal information (such as destination, boarding gate, address, and even bank information) available to anyone that knows where to look (or anyone that’s used an online barcode reader).

P.S. This also goes for photos of packages bought from online stores and vaccination cards.

2. 20 questions? This or that? Favorite ____? Be mindful of the information you publish online.

What may look like an innocent game to get to know people better, might actually be the key for hackers to unlock your personal data. These games, according to Gill, are prime examples of oversharing sensitive data online. Answers to seemingly innocent questions like “What street did you grow up on?” or “Name of first pet?” could provide hackers with the answers to security questions commonly asked for when securing an email address or bank account. 

Posting or publishing information like addresses, phone numbers, and birthdays without any security settings can unlock a mine full of data for hackers. 

3. Don’t click on suspicious links even and especially if it states that you’re now supposedly the heir of a recently deceased monarch and a billion times richer. 

Being on the receiving end of a suspicious text or email is something most of us have probably experienced at one point in our lives. While some links come accompanied by intriguing messages or seemingly automated “official” looking notifications, they’re no different from those obviously sent to scam in that one click on the link could automatically infect your entire system. Gill suggests using URL or website checkers like urlscan.io to get a read on where the link came from and to trace malicious activities from the source.

Remember to ALWAYS think before you click. 

4. Everything you post online builds your digital footprint. Be aware and thoughtful of what you post and how it can potentially endanger yourself and others.

Always exercise caution when posting online, especially if your accounts are not on private. Aside from refraining from posting phone numbers, addresses, and bank information avoid geotagging locations you are presently in or posting while on vacation. Such information could make people aware that your house is empty at the time or may compromise the location of you or your family. Gill warns to keep in mind that privacy settings don’t always work and sites may be “leaky” so manual precautions like these could save your life.

You have control over the information you release online; therefore, do so responsibly. 

5. Utilize the resources available to you to build your security and stay secure. 

While it may seem taxing, simply going through and adjusting your privacy settings could make a big difference. Gill advises to use strong passwords (not based on the names of pets or loved ones), turn on two-factor authentication, and install the latest software and app updates on your devices. Additional steps you can take include using a password manager, encrypted email, and a paid Virtual Private Network (VPN). Securing ourselves online can also be as easy as removing old accounts that are no longer in use and deleting software or unnecessary third-party apps from devices. 

Beyond securing social media accounts, Gill also reminds us to think about our online search habits and the search engines we use. Even on incognito, websites and service providers can still access search histories. Sites like coveryourtracks.eff.org, amiunique.org, and whoer.net can easily show how your browser appears to other sites. Using browser extensions like HTTPS Everywhere or Privacy Badger can help further adjust your privacy settings and keep you protected.

In this age of digital and technological transformation, information about anything and everything is readily available online. While we may reap the benefits of this more often than not, we must still remain vigilant and take active steps to protect ourselves and the people around us. 

To quote Gill’s final words, “Don’t be a soft target. Take control of your online privacy and security”.

Continue Reading

Tech & Innovation

GCheck these tips to spot phishing scams and protect yourself

Scammers have found creative ways to sneakily get these info so it’s important to expose them and  get to know their methods.

Published

on

Ever experience that moment when you get a text message early in the morning and you excitedly jump out of bed thinking it’s crush-laloo greeting you, only to find out it’s some random SMS with bad grammar asking for your personal details? That inis-factor you’re feeling for these scammers — yes we’ve all been there, we feel you!

It doesn’t just stop there though. Nowadays, with the convenience of being able to buy anything with just a pa-“mine” comment at a live selling session or order that flash sale item with a tap of our fingers, come new levels of scam tactics. A common one is called phishing, where scammers send fake SMS, Emails, or links designed to trick people into giving away sensitive information such as personal information, banking details, and passwords. 

Scammers are getting more and more creative that we have to be G to be informed about what’s going on. Knowing the different ways they work is the first step in protecting ourselves. We all give in to certain types of “budol” as we call it—wherein we willingly fall for irresistible discounts or all-in-one bundles, or when you know you don’t need a new phone case but you purchase it anyway because it’s cute. To buy your wants and needs is okay, especially that you’ve been working hard for it. What is not okay is when you get yourself into types of budol that actually robs you of all your hard-earned money.

Are you G to be protected? Here are some common phishing scams and ways to protect yourself especially as we enter the merriest season of the year:

A popular method for scammers is to pretend to be an authorized customer representative on different platforms by appropriating company logos and a person’s profile picture. In social media, this can happen if you post your complaints publicly. They send a direct message and pretend to offer help with your concern. In emails, they use what seem to look like official addresses and create a sense of urgency to pressure you into following the steps they have outlined, otherwise, you will lose access to your account or incur possible charges. While in SMS, they send suspicious messages and links that will prompt you to install an app or require you to input your MPIN or OTP for many reasons: you’ve won a contest, have expiring rewards to claim, or that you need to update your contact information. Sometimes they’ll even call you. 

How do you spot scammers? Start by checking the sender. Is the text or call from a random phone number? Does the email look credible or does it look like it came from a sketchy free platform? Always check the source. Second, did they send you a link? GCash, for example, will NEVER send you an email asking to click a link. Scammers have become clever to make sure they no longer have typos on their message alerts. They used to misspell words like GAcsh or replace letters with numbers like GC4sh, but they’ve leveled-up to replicating official web pages by using the same visuals or actual promos to phish details from users.

Their goal is to get your One Time PIN (OTP) so they can link their device to your account, and your MPIN so they can login. If they can’t get your MPIN, they will try to ask for more OTPs in order to reset your MPIN. If you’ve been saving money for your pending bills and you don’t want to wake up as a player in Squid Game, never give out your MPIN and the OTPs that you receive on your phones.

However, scammers have found creative ways to sneakily get these info so it’s important to expose them and  get to know their methods. Here are some examples:

  • Hiram mobile phone – they borrow your phone for a variety of excuses but their real intent is to request OTPs to be sent to your phone so they can reset the MPINs themselves without you knowing.
  • Shoulder surfing – from the name itself, they spy over your shoulder to steal personal information that might help them in hacking your account.
  • Live selling sessions – this usually happens to online sellers when they broadcast what’s on their phones. Scammers just need good timing to initiate the OTP, display it on your screen for all to see, and therefore compromise your account.

If you find yourself on the receiving end of any of these suspicious instances or if you have concerns with any of the GCash services, the best way to address them is through the Help Center accessible within the app only.

The Christmas season and mega-sales online are happening soon so it’s important to remember this GChecklist: 

(1) check the sender or credibility of any website where you are being redirected 

(2) never share your MPIN or OTP

(3) only do actions within the GCash app. 

Once you tick off everything on this list, make sure you’re G to share this so your friends and family can protect themselves, too. For your holiday hauls, don’t forget: magpa-budol wisely!
For more information, visit gcash.com.  

Continue Reading
Advertisement
Advertisement

Like us on Facebook

Trending