ในวันนี้ที่ใครต่อใครพูดถึงแต่คำว่า Metaverse ถ้าคุณสงสัยว่า Metaverse คืออะไร มันเกี่ยวข้องกับงานของคุณ หรือการให้บริการลูกค้าอย่างไร มันช่วงงานเรื่องเทรนพนักงานได้อย่างไร และ Metaverse จะช่วยให้การทำงานร่วมกันในทีมเวิร์คกว่าเดิมได้จริงไหม ขอให้ลองอ่านบทความนี้ค่ะWhat’s all this metaverse stuff anyhow? Learn how this new imagining of internet connectivity could change how you do business in the future. There has been a considerable amount of buzz around the concept of the metaverse. While the idea has historically been associated with video games, Facebook’s rebrand to Meta introduced the metaverse to mainstream media.Additionally, Google has been working on its own approach to connecting the digital and physical worlds through augmented reality (AR). Even Microsoft has invested significantly in virtual workplaces and working spaces.Despite the recent buzz, the metaverse is still a relatively unknown concept. Most might know it as having something to do with virtual reality (VR) and gaming. But what exactly is the metaverse, and what are its implications on the future of business?What is the metaverse?The concept of the Metaverse isn’t as new as it seems. In fact, the word “metaverse” has existed for almost three decades now. Author Neal Stephenson was the first one to use the word “metaverse” to describe a 3D virtual world.Within this world, individuals were represented as animated characters called avatars. These avatars could engage with other individuals as well as computer-operated entities. While all of this stems from his 1992 novel, Snow Crash, it serves as a basis to understand what tech companies are trying to accomplish.The metaverse concept seen today is similar to Stephenson’s vision. Tech companies such as Facebook are developing in-depth virtual worlds where users can socialize, play games, and even work. There’s a heavy focus on virtual reality within these metaverses as well. Companies are working on incorporating VR headsets to increase immersion and add a more personal touch.While there are many different platforms that call themselves metaverses, the reality is that nothing has lived up to the concept drawn out in Snow Crash. The popular game Fortnite is a self-proclaimed metaverse, but it really just serves as a game with an explorable world. This is a common theme in the gaming universe, and unfortunately, these solutions lack the depth and versatility a metaverse should theoretically offer.What is the point of a metaverse?Human limitations are directly linked with the physical world. These limitations range from communication and coordination to travel time and physical location. The metaverse is seen as a solution to these limitations. By using virtual reality, humans can sidestep many of these physical limitations by developing the rules and world themselves.Within a virtual world, people can experience going to work and walking into an office building without having to leave home. They can interact with coworkers, coordinate projects, and host engaging virtual meetings with more functionality than Zoom, Microsoft Teams, or other online meeting software. All without the commute.A metaverse can also be seen as the next step in social media. Currently, interactions in social media are text-based. Metaverses could make these interactions more versatile and personal by adding a more realistic touch. Instead of a video call, friends could explore the virtual world and create experiences. Families can have virtual get-togethers to accommodate the restrictions of the pandemic.Metaverses are only limited to what can be programmed and designed. This means that the potential use cases of a metaverse are essentially limitless. And the only real limits are computational power and the human imagination.How can the metaverse benefit businesses?The potential applications of a metaverse are endless. In fact, many experts have dubbed the metaverse “the future of digital businesses”. Here are a few ways the metaverse can benefit business organizations:Digital item salesThe metaverse introduces new demand for a variety of digital items. Users will want to customize their avatar, purchase accessories and items, and even purchase experiences and services within the metaverse. This creates new opportunities in digital sales and adds new demand for graphics designers, programmers, and more.New CurrenciesCryptocurrency is becoming more prevalent across the globe, and it will be even more vital in a metaverse ecosystem. Currently, the majority of up-and-coming metaverse platforms utilize blockchain technology. This helps to facilitate buying and selling within the metaverse and ensures financial transactions are executed securely.Blockchain and cryptocurrency have introduced interesting advantages over the conventional finance industry. A metaverse may just be the opportunity finance companies need to incorporate some of these advantages and benefits within their own systems.Greater collaborative effortsCollaboration over Zoom or MS Teams is convenient, but it can also be restrictive. By establishing digital conference rooms, the metaverse can retain the flexibility of video conferencing while imitating the effectiveness of physical meetings.Additionally, virtual reality can provide an entire workspace as opposed to a simple video call. This can help facilitate creativity and promote a more cohesive environment. It can also help keep employees more engaged in their work and connected overall which is critically important with work from home or a remote workforce.Virtual storefrontsVirtual real estate is a fast-growing investment opportunity. In fact, the blockchain-based platform, Decentraland, has seen several multi-million dollar property sales in the last few months. With that kind of price tag, it isn’t just retail investors buying up property. Investment firms and corporations are betting on the future of online business and storefronts.The metaverse could serve as an opportunity for online businesses to offer a more engaging experience instead of just a website. A VR storefront could create a better purchasing experience for the buyer, as well as offer a more personal touch.Is the metaverse really the future of business?Current metaverse solutions are quite a ways off from the concepts introduced in science fiction. However, with companies like Facebook joining the development process, it may not be such a far-off idea. The concept of the metaverse introduces a lot of opportunity and potential. Businesses from a wide variety of industries could benefit from the increased popularity of virtual reality.However, a metaverse will undoubtedly require a considerable amount of bandwidth and infrastructure to support it. The design and implementation of digital items, buildings, and storefronts will require significant programming and support. While there may be an upfront investment, going virtual is a possibility that many companies could take advantage of in the future.Outsource IT provides a wide range of IT services for companies of all sizes and will continue to do so even when businesses transition to the metaverse. With decades of experience, we understand the issues and problems companies face in this digital age, while keeping up to date with new technologies. Contact an Outsource IT account manager to learn more about how we can serve your business IT needs.Is Your Business Ready for the Next Digital Transformation? Contact us today to schedule a technology brainstorming session. Netway Communication open 24x7📲: 02 055 1095📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway
ทำอย่างไรให้รอดจากการมิจฉาชีพที่คอยแฮคข้อมูลทางมือถือThere has been an alarming surge in mobile malware attacks. Learn what you need to do right now to keep your devices safe. Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%.For years, mobile phones have become more powerful. They now do many of the same functions as a computer. Yet, people tend to secure their computers better than they do their smartphones. This is a behavior that needs to change. Over 60% of digital fraud now occurs through mobile devices. That makes them highly risky if proper safeguards aren’t followed.Use Mobile Anti-malwareYes, your mobile phone needs antivirus/anti-malware too! Malware can and does infect smartphones and tablets. Ensure that you have a reliable mobile anti-malware app installed.Don’t Download Apps from Unknown SourcesOnly download mobile apps from trusted sources. Do not download outside a main app store. Trusted app stores include places like:Apple App StoreGoogle PlayThe Microsoft StoreAmazon AppstoreDon’t Assume Email is SafeMany people prefer checking email on their phone rather than PC because it’s so handy. But they have a false sense of security about the safety of emails when viewed on a mobile device.It’s difficult to hover over a link without clicking when on a smartphone. If you see something questionable and want to check the link, open the email on your PC where you can do that.Beware of SMS Phishing (aka “Smishing”)In March of 2022, text spam outpaced robocalls. Unwanted text messages rose by 30%, ten percent higher than robocalls. Many of those spam texts are smishing. Be on the lookout for text messages that don’t quite make sense. For example, getting a shipping notification when you haven’t ordered anything.Remove Old Apps You No Longer UseGo through your device and remove old applications that you are no longer using. There is no reason to keep them around, potentially leaving your device at risk.Keep Your Device UpdatedSpeaking of updates, you also need to keep your device’s operating system updated. Are you using the current version of Android or iOS? Not installing updates can mean your phone has vulnerabilities. These vulnerabilities allow hackers to breach your data.Use a VPN When on Public Wi-FiPublic Wi-Fi is dangerous. Most people understand that, but many connect to it out of necessity. Reduce your risk by using a VPN app.Mobile Security Solutions to Prevent a DataBreach Don’t wait until your phone is infected with malware to secure it properly. It’s only a matter of time before you are the next victim.Contact Netway Communication, we serve you 24x7📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway
8 เช็คลิสต์เรื่องไอทีที่ควรทำก่อนออกเดินทางแนะนำเช็คลิสต์ทางด้านไอทีแบบง่ายๆ ที่ควรตรวจสอบก่อนเดินทาง เพื่อคุณจะได้ไม่ต้องมาคอยปวดหัวระหว่างเดินทางไปเที่ยวหรือทำงานHave you ever left a charger behind at an airport?Been caught without a charge for your phone? Keep travel chaos to a minimum by reviewing our pre-travel tech checklist. แนะนำเช็คลิสต์ทางด้านไอทีแบบง่ายๆ ที่ควรตรวจสอบก่อนเดินทาง เพื่อคุณจะได้ไม่ต้องมาคอยปวดหัวระหว่างเดินทางไปเที่ยวหรือทำงาน เพื่อจะได้ไม่ต้องมาคอยปวดหัวระหว่างเดินทางไปเที่ยวหรือทำงาน ลองทำกันได้เลยค่ะ 1. ตรวจเช็คแอปต่างๆ 2. ตรวจเช็คสายชาร์จและอแดปเตอร์ 3. ตรวจเช็คว่าแบตเต็มไหม 4. เช็คแพคเกจมือถือของคุณ 5. เช็คหรือเพิ่ม VPN 6. ทำแบคอัพไว้แล้วหรือยัง 7. ตรวจสอบความปลอดภัยของอุปกรณ์ต่างๆ 8. ตรวจสอบที่ระบุมาทั้งหมดอีกครั้งNetway Communication ขอให้คุณเดินทางปลอดภัย และเที่ยวให้สนุกนะคะ หากมีปัญหาต้องการปรึกษาเรื่องความปลอดภัยในระบบคลาวด์ Netway Communication ยินดีให้คำปรึกษาแบบ 24x7 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. Travel smarter and more securely by doing several checks before you go. . Use our handy tech travel checklist. 1. Check Your Apps 2. Check Your Cords & Adapters 3. Check Your Power 4. Check Your Mobile Plan 5. Check or Add a VPN 6. Check Your Backup 7. Check Your Device Security 8. Check Your Double-Checks Give us a call! Netway Communication operate 24x7, we can help you on Cloud, and tech consult. 📲: 02 055 1095📧: support@netway.co.th👨💻Web chat: [[URL]]/💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official💚Add Line ID: @netway https://bit.ly/line-netway Our technology inevitably comes with us when we travel. Most of us won’t even travel to the end of the block without our smartphones. When you go on a trip, not having your technology there when you need it can ruin your day.Travel smarter and more securely by doing several checks before you go. Use our handy tech travel checklist. It can save you from suffering from lost devices, missing chargers, or a data breach.1. Check Your Apps Have you ever sat at an airport gate wondering why it looked so empty? You then found out that your gate had changed, and you had no idea. You go rushing to the other end of the concourse, hoping you’re not too late. How did everyone else know about the gate change? They most likely had the app for the airline and received a notification. Before you leave for a trip, make sure to download any apps you may need. It’s better to download them when you’re at home on your own Wi-Fi. If you wait until you’re at the airport, reception may be an issue. Some of the apps you may want to grab or update before your trip are: Airline appTrain appHotel appTheme park appCamping ground appWeather appCity tourism app2. Check Your Cords & Adapters People leave behind countless chargers and adapters every day. They litter airports, restaurants, and train stations around the world. Make sure to bring a backup charger for your laptop, tablet, or phone. Otherwise, you may find yourself paying a premium for a new charger in a gift shop. Your device could also go black if you lose its charger and can’t quickly get a new one. 3. Check Your Power A great way to ensure you have the power you need is to buy a small charging battery. You can find these in most major retailers or online. They are small “blocks” that hold a charge and can power up a cell phone in a pinch. Having this extra backup also helps you avoid potential juice-jacking ports. These are fake or compromised public USB charging ports. Hackers use them to steal your data when you plug in.4. Check Your Mobile Plan If you’re traveling out of the country, you’ll want to check your mobile plan. If you don’t have the ability to call internationally, then you may not be able to text or call home. Carriers can add an international capability to your plan, but ask about pricing. It can get expensive if you’re on long calls or using mobile data. An alternative is to set up a VoIP app you can use with your office, friends, or family while you’re traveling. These enable both calls and SMS, but you do need an internet connection. 5. Check or Add a VPN Free Wi-Fi may be a welcome site when you’re on the road, but it can also be dangerous. You don’t know who else is using that Wi-Fi. A hacker hanging out on the connection can easily steal your data if you’re not protected. It’s better to use either your mobile carrier connection or a virtual private network (VPN) app. VPN plans are inexpensive and will keep your data encrypted, even if you’re on public Wi-Fi. 6. Check Your Backup Unfortunately, mishaps occur when traveling. You may leave your phone behind on a boat, have your luggage lost, or get your device stolen while in a crowded area. 10% of all laptop thefts happen in airports. Don’t lose all your data with the device! Back up your devices to the cloud or local storage before you travel. This ensures that you won’t lose the valuable information on your device. You also won’t need to think twice about enacting a remote “wipe my device” command if necessary. 7. Check Your Device Security Make your devices as secure as possible before you hit the road. When we’re traveling, our minds are occupied by other things. So, you may not think to check your antivirus or avoid suspicious phishing links. Protect your devices before you go using: Antivirus/anti-malware DNS filtering Screen lock with passcode Sharing features turned offVPN application Find-My-Device feature turned on 8. Check Your Double-Checks What do we mean by checking your double-checks? Use the buddy system as a backup. When the family is getting off a plane, each should check with the other that they have all their devices.If you’re traveling alone, have a friend or family member check up by text. Did you grab your charger? Is your VPN turned on? Those little reminders can go a long way toward avoiding digital travel nightmares. Improve the Security of Your Devices Now Don’t leave your devices unprotected. This could mean a breach of your banking app or personal data. Contact us for device security solutions to reduce your risk. Give us a call! Netway Communication operate 24x7, we can help you on Cloud, and tech consult. 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway
2023 Trends in Data Privacy That Could Impact Your Complianceสรุปเทรนด์ล่าสุดปี 2023เรื่องความปลอดภัยข้อมูลที่อาจส่งผลกับ Compliance องค์กรคุณคาดการณ์ว่าภายในปี 2024 ข้อมูลส่วนบุคคลของประชากรกว่า 75% บนโลกใบนี้จะต้องได้รับการปกป้องภายใต้นโยบายอย่างน้อย 1 นโยบาย และใน ทุกวันนี้กว่า 40% ของงานด้านเทคโนโลยีการจัดการนโยบายความเป็นส่วนตัว มีการนำ AI เข้ามาประยุกต์ใช้ เราขอเชิญคุณมาเรียนรู้ไปกับเรา เรื่องเทรนด์ล่าสุด ที่จะช่วยให้งาน compliance สำหรับองค์กรเดินหน้าไปอย่างปลอดภัยและสอดคล้องกับนโยบาย Approximately 40% of privacy compliance technology needs artificial intelligence to operate. Learn how data privacy is evolving and how it could impact your compliance needs. Data privacy has been a growing requirement ever since the internet age began. So much personal information is flying around through computer networks. Protecting it has become a mandate. Most companies must follow HIPAA, GDPR, or another industry or locality-based privacy rule. By the end of 2024, 75% of the world’s population will have their personal data protected. It will fall under one or more privacy regulations. You don’t need to be a large enterprise organization to have data privacy compliance at the top of your mind. It goes hand in hand with cybersecurity. Additionally, privacy requirements hit all sized companies. Between July 2020 and July 2021, GDPR violations rose by 113.5%. The number of associated fines also jumped, by 124.92%. Check out this link here, to find out about some of the biggest fines for GDPR data violations. It’s important to make data privacy a priority and factor it into all your data collection processes. When companies collect, send, or store personally identifiable information (PII) it needs protection. This means putting adequate safeguards in place. To stay on top of your privacy compliance obligations, you should also keep up with trends in this area. Next up, we’ve documented the biggest data privacy trends happening in 2023 that you should be aware of. What’s Happening in Data Privacy Compliance? AI Governance Approximately 40% of privacy compliance technology needs artificial intelligence (AI) to operate. AI has certainly made its way into many of the applications we use on a daily basis. When you’re typing in MS Word and text just springs up as a suggestion, that’s AI predicting what you’ll type next. When working on a photograph in Photoshop, you can now click a button to give a frowning face a smile. This is also the work of AI. So, it’s no surprise that AI is running many of the algorithms responsible for keeping data protected. But what happens when there is a problem with the AI? This is the question that AI governance is working to address. This is a new trend in data privacy because AI has never been so prevalent throughout the data journey as it is now. Whenever AI is used in the data protection area, organizations need to govern it properly. This helps ensure that automated processes aren’t accidentally exposing sensitive data. Consumer Privacy UX A trend that we’ve seen over the last several months is putting more privacy power into the consumer’s hands. Many privacy regulations require that apps and websites provide data transparency. They need to tell people what data they’re collecting, how they’re collecting it, and what they do with it. People also need an “out” to get their data back. These needs have led to consumer privacy UX becoming a “thing.” You can think of this as a centralized privacy portal. A place people can access privacy-related settings in various apps. This gives better visibility into how their data is being used. Increased Scrutiny of Remote Employee Monitoring The pandemic has forever changed the global workforce. Many organizations are now running completely remote offices. Or may be using a mix of remote and in-office staff. The dramatic increase in people working from home has led to data collection changes. Companies are ramping up their monitoring of those employees working off-site. But this type of monitoring opens a can of worms when it comes to data privacy. Organizations need to ensure that they aren’t encroaching on the rights of their staff. This is most pertinent when putting monitoring in place on employee devices. For example, approximately 49% of remote employees use their personal computers for work. Companies often put endpoint device monitoring in place for security reasons. They need to ensure they are not gathering or backing up any personal data. That would be data owned by the employee and not the company. Data Localization One of the concerns when the social app TikTok became popular relates to location. With the firm being a China-based company, people worried about the privacy of their data. The data was originally stored on servers governed by the Chinese government. A country with very different data privacy rules than the US and other countries. Data localization is going to become more prevalent. Increasingly organizations look at where their cloud data is being stored. Where a server resides governs the privacy rules and regulations that it may fall under. Thus, companies and governments are now asking a question of cloud providers. This is, “Where is my data stored?” Many want their data to be as close to home as possible. Privacy-Enhancing Computation (PEC) Data privacy by design is a fairly new term. Using privacy-enhancing computation is a way that AI is helping cybersecurity. By using PEC as a built-in component of software and apps, developers provide value to clients. They address privacy concerns by making data protection more automated. Look for PEC components in data analytics when shopping for business tools. When is the Last Time You Had a Compliance Check? Need help with your cyber security? Give us a call! Netway Communication operate 24x7, we can help with a compliance checkup. 📲: 02 055 1095 📧: support@netway.co.th 👨💻Web chat: [[URL]]/ 💙Facebook Messenger: @netway.official https://www.facebook.com/netway.official 💚Add Line ID: @netway https://bit.ly/line-netway
บางครั้งผู้ดูแลระบบจำเป็นจะต้อง Allow หรือ Block ผู้ติดต่อทั้งในรูปแบบ Email Address หรือ Domain ซึ่งบนระบบ Microsoft 365 สามารถเข้าไปตั้งค่าได้ที่ Exchange Admin Center ผ่าน Admin Center สามารถดูวิธีการได้ตามด้านล่างนี้ 1. เข้าสู่หน้าจัดการผู้ดูแลระบบ (Admin Center) ได้ที่ https://portal.office.com/adminportal/home#/homepage หลังจากที่เมนูด้านซ้ายไปที่ Admin centers > Exchange 2.เมื่อเข้าสู่หน้า Exchange admin center ไปที่เมนู Other features > Spam filter 3. ในหน้า Anti-spam policies หากมีเพียง Default policy แนะนำให้สร้าง Policy ใหม่ เพื่อจะได้คืนค่าเดิมได้ หากมีอะไรผิดพลาด และเมื่อสร้าง Policy ใหม่ Policy ที่ถูกสร้างขึ้นจะมีผลก่อน Default Policy เสมอโดยเลือก Create > Inbound และใส่รายละเอียดให้ครบถ้วนใส่ชื่อ Policyใส่เงื่อนไขที่ให้ Policy มีผล หากต้องการสร้างสำหรับทั้งองค์กร ให้เลือกหัวข้อ Domainเลือกเงื่อนไขที่ต้องการให้มีผล เช่นIncrease spam score (ตัวเลือกที่เข้าข่าย จะมีผลต่อการเพิ่มคะแนนการเป็น Spam มากขึ้น)Mark as spam (ตัวเลือกที่เมื่อเข้าข่าย จะส่งผลให้ข้อความฉบับนั้นๆ เป็น Spam ทันที)บางเมนูสามารถเลือกเป็น Test mode ได้ โดยเลือกให้แจ้งเตือน แต่ยังไม่ส่งผล โดยจะแจ้งเตือนบุคคลที่ต้องการActionเลือกได้ว่า จะส่งผลอย่างไรต่อข้อความนั้นๆ หากโดน Mark as spam แล้ว เช่น 1. หากข้อความนั้นๆ เข้าข่ายว่าเป็น Spam จะทำอย่างไร (ปกติเข้า Junk ของ User)2. หากข้อความนั้นๆ เข้าข่ายว่าเป็น High confidence spam จะทำอย่างไร (ปกติจะเข้า Junk ของ User)3. หากเป็น Phishing (Email หลอกลวง) จะทำอย่างไร (ปกติจะถูกส่งเข้า Quarantine) และเมื่อเลื่อนลงมาด้านล่าง จะมีจำนวนวันที่ให้ข้อความอยู่ใน Quarantine (ค่าเดิม 15 วัน ตั้งได้สูงสุด 30 วัน)Allow and block listถึงเมนูที่ต้องการ Allow หรือ Block ผู้ติดต่อสามารถตั้งค่าได้ที่เมนูนี้Sender allow list : Email address ที่ต้องการ Allow (ยอมรับ) ใช้ในกรณีที่เข้า Spam โดยไม่ต้องการDomain allow list : Domain ที่ต้องการ Allow (ยอมรับ) ใช้ในกรณีที่เข้า Spam โดยไม่ต้องการSender block list : Email address ที่ต้องการ Block ซึ่งส่งผลให้ถูกมองว่าเป็น SpamDomain block list : Domain ของ Email ที่ต้องการ Block ซึ่งส่งผลผู้ติดต่อทั้งหมดที่ใช้ Domain ดังกล่าวถูกมองว่าเป็น Spam จากนั้นกด Next และตรวจสอบรายละเอียดการตั้งค่าต่างๆ และกด Createในกรณีที่มีการสร้าง Policy อยู่แล้ว และต้องการเพิ่มหรือลบ Allow หรือ Block ผู้ติดต่อ ให้เลือก Policy ที่สร้างไว้ จากนั้นเลือก Edit allowed and blocked senders and domains ได้เลย ดังภาพ เมื่อตั้งค่าทั้งหมดแล้ว ให้กด Save และสังเกตุการใช้งานอีกครั้งหนึ่ง ว่า Rule ทำงานตามเงื่อนไขที่กำหนดหรือไม่ ผู้ใช้งานสามารถกำหนดเงื่อนไขได้หลากหลายตามความต้องการ ซึ่งไม่จำเป็นต้องทำในรูปแบบตามตัวอย่างเสมอไป หากมีข้อสงสัยเพิ่มเติม สามารถสอบถามได้ที่ support@netway.co.th ครับรายละเอียดเพิ่มเติมhttps://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/anti-spam-policies-configure?view=o365-worldwide