Introduction to The internet of things – by Bernard Collin, CEO

Introduction to The internet of things - by Bernard Collin, CEO
Safecoms can be your trusted advisor in all aspects of IT security (including cyber security) for your organization and we'll provide constant protection and innovation to give you continuous peace of mind.

The internet of things – by Bernard Collin

September 2017

Article by Bernard Collin, CEO of SafeComs Network Security Consulting Co., Ltd. in the magazine “EXPAT LIFE in Thailand” about the Internet of Thing (IoT).

Conversation on the IoT (internet of things) is rising as it becomes a more broad and social consideration. It has a wide reach and it also shows that people need to be more aware of their personal impact. What might look like a minor problem hides a greater trouble.

The internet of things is any and every device connected in some way to a network and open to the internet. A home system designed to allow you to set the house to wake up the lights and run the heating/air conditioning ready for your arrival home. A sound system connected wirelessly through your home wifi, a baby monitor you can check from the office. But the term simply applies to any and every device meant to automatically connect to the internet and accomplish a task with little to no oversight.

This is where the problems start, these devices are crafted for simple use and convenience which then become points of weakness. Not designed for high security but simply task completion, many of the devices have now been breached and exploited. The activity isn’t specifically because it targets you, in fact,
that the device is “yours” is incidental, it’s just another bot to them. The devices are not breached to spy on you and aren’t designed to break down and try to ransom the device back to you (See the previous article on Ransomware).

Internet of ThingsWithout your knowledge or consent, any device connected to your internet connection can be used by criminal organisations and general mischief makers against networks and websites. Shutting down a business ability to connect to the internet or simply wielded as a hammer against single uses they have found offends them. People are selling time and activity on your home devices against others, a device you paid for and pay to keep running, on an internet connection you pay for upkeep.

What can we do to combat this new botnet problem?
For one, we should make sure that device creators take their responsibility on creating secure devices more seriously, but on a more personal angle, anyone who likes to add gadgets and devices to their own home should either consider adding security layers to their connection to the internet.

Security is a personal responsibility these days, and being aware of how your devices are being used and exploited is something each household should be concerned about. These are your devices and you should be certain they aren’t being exploited by others for their own ends.

Download the article here

Want to know more?

Security conference at Austcham 2016 by Bernard Collin

Security conference at Austcham 2016 by Bernard Collin
Safecoms can be your trusted advisor in all aspects of IT security (including cyber security) for your organization and we'll provide constant protection and innovation to give you continuous peace of mind.
News and Publications

Security conference at Austcham 2016 by Bernard Collin

7 Oct, 2016

Bernard Collin, CEO of SafeComs Network Security Consulting Co., Ltd. will be presenting at the Austcham on the topic of Security and more specifically on how to avoid and survive an attack on your computer.

During the presentation, we will explore the problems and risks today, the new sophisticated attacks, the evolving strategies and the new hacking trends with real-life scenarios and true stories from customers.Our speaker will review the evolution of Virus and Hacking methodology, the introduction of Phishing to steal ID and the arrival of the destructive

Bernard will review the evolution of Virus and Hacking methodology, the introduction of Phishing to steal ID and the arrival of the destructive Crypto-Malware and Ransomware. We will discuss the risk today and the evolution with growing challenges for the months to come.

We will review prevention strategies to protect your systems and data, and the tools and methods to prevent and block the hackers and their destructive behaviors.

And when all failed, we will see how can you recover from an attack without severe perturbation on your productivity thanks to you being prepared.

Download the introduction article here

Want to know more?

Ransomware Risk… did you get caught?

Ransomware Risk... did you get caught?
Latest news about IT security from Safecoms
News and Events

Ransomware… did you get caught?

My enduring advice on computer security:

Do not solely rely on technology or systems to resist hackers, your first and best line of defense should always be your employee awareness and education program! Technology will assist and can also help in the recovery after a case of damage but first make sure your employees are trained to react appropriately.

Ransomware is the act of using malware to penetrate a computer and encrypts its hard drive, and then, requesting a payment (ransom) from the owner to decrypt his data.

But in fact, how bad is it and what are the Ransomware risks?

PhishingThis past year has seen some of the most devastating cyber-attacks and highly profitable ransomware for the perpetrators. They added up to astronomical costs for the companies that got caught. Despite the resistance to give in to the threat, some had no choice but pay extremely high value ransoms.

The health care business was particularly targeted with ransoms in the thousands of US Dollars, paid in bitcoins to recover access to their patient data, which in some cases were vital as their life could have been at risk.

Despite the increase in monitoring software and serious deployment of sophisticated automated technology with the latest generation of firewalls, anti-virus, intrusion detection, web traffic filtering and so on, specially crafted spear phishing attacks ultimately reached their high value target.

But low value targets were also in the line of fire. Automated phishing targets anyone and the ransom is proportional to the size of the business. Some small companies got away with paying 0.99 bitcoin, some with a couple more, but it is always costly, a serious waste of time and energy, lots of frustration and stress, and
you never know if you will get your data back, even if you pay. Moreover, even if you think you are clean there is no guarantee they haven’t left a backdoor and won’t be coming back for more…

In many cases, we have to admit the failure of the legacy perimeter defenses to identify and stop the most basic phishing attacks, and there is a serious risk that sooner or later one unprepared employee will click on a tempting email link that will bypass the lines of defense. Hackers are now adapting their email subject lines making it impossible to preemptively block them.

Is Ransomware slowing down?

Not really and we are trying to predict what’s cooking for this year. Analysts are observing the skyline as the demise of Dyre malware in 2015 seems to indicate a preparation of something far more dangerous. The next wave will probably propagate through worms crawling from site to site and disk to disk, and stay dormant for a long time before emerging. Which indicates that the last line of defense, the backup needs to seriously increase to keep data history unaffected. History of Backup allows you to go back in time to a version of the data without malware… but how much recent development will you have lost?

A serious preparation for all companies is paramount, and it is not really clear how the next attack will develop.

It is certain that mobile technology is the prime target as it is so pervasive in everyone’s life. Some employees don’t even have a PC any more and manage their e-life on their phone with a bigger screen. As a result, most IT managers have lost total control and are desperate in their attempt to protect the company’s network and assets (see our article on EMM –Enterprise Mobility Management to see the difficulty)

ransomware

New tools are being developed, new defenses are being crafted and it is a race with time to get a response as quickly as possible when the next threat emerges. Companies must deploy the latest technology for their peripheral protection and sharpen their intrusion detection tools, with a strong emphasis on behavioral analysis. However, is it available to all? And at what cost?

Your chances of surviving an attack will increase with the amount of sophistication you can afford for your periphery but the first line of defense remains the education of your staff.

The most disturbing trends are now:

  • Phishing emails are smarter with adaptive subject lines
  • Phishing emails use fake company names targeting those close to you
  • Worms will stay dormant for longer limiting the capacity to recover

What you need to do:

Train your staff, show them what phishing is, explain Trojans and worms, and consult with a competent security company to reduce the risks. Be prepared if you get hit, so the damage is limited and you can recover without paying up.

Always be aware of the threat and expect the worse so you are prepared to survive any incident. The government is not close to catching the bad guys, they are potentially far away and extremely well organised, so you need to take your security very seriously.

The Author:

Bernard Collin is the CEO of SafeComs, a security firm based in Bangkok Thailand, with offices in Myanmar. Bernard started his IT career with Apple in 1997 in Paris, then moved to Digital Equipment in Geneva and specialised in IT security in 1987 with the evolution of DECnet network and later on the Internet. Bernard Started SafeComs in 1999 in Australia and throughout his life consulted with large businesses in Europe and in Australia. His expertise includes office automation and network security, and he is a regular speaker at Security events and at Chambers of Commerce. His company SafeComs has been awarded numerous prizes including SIPA (Software Industry Promotion Agency) in Thailand for creative software development.

Want to know more?

Cyber security Thailand – Interview of Bernard Collin by Le Paris Phuket

Cyber security Thailand - Interview of Bernard Collin by Le Paris Phuket
Safecoms can be your trusted advisor in all aspects of IT security (including cyber security) for your organization and we'll provide constant protection and innovation to give you continuous peace of mind.
News and Publications

Cyber Security in Thailand – Interview of Bernard Collin

April, 2016

Interview of Bernard Collin, CEO of SafeComs Network Security Consulting Co., Ltd. by the French Magazine “Paris Phuket” about IT security and hacking in Thailand. SafeComs has extensive  expertise in dealing with hacking and offers many solutions tailored to the situation. Do not hesitate to call if you need any help.

Download the French article here or read it online here on page 65
English translation of the article coming soon

Want to know more?

Lepetitjournal.com – 3 questions a Bernard Collin, PDG de SafeComs

Lepetitjournal.com - 3 questions a Bernard Collin, PDG de SafeComs
SafeComs's publications about internet security on all kinds of press
Publications
Three questions a Bernard Collin, PDG de SafeComs
Published in Lepetitjournal - June 9, 2010
lepetitjournal

A Bangkok depuis 2003, Bernard Collin, originaire de Belgique, dirige SafeComs, florissante compagnie de sécurité informatique qui s’adresse particulièrement aux PME. Élue meilleure “Start Up” de l’année en 2007 par la Chambre de commerce du Benelux, SafeComs entend doubler son chiffre d’affaires d’ici 2010 avec le développement d’un nouveau produit.

Want to know more?

Software in Thailand 2010: An IT pro point of view

Software in Thailand 2010: An IT pro point of view
SafeComs's publications about internet security on all kinds of press
Publications
Software in Thailand-2010-An IT Pro Point of View
Published in Dailynews - January 8, 2010
Software in Thailand 2010: An IT pro point of view

Bernard Collin has compiled a list of observations, resolutions and predictions about things happening in Thailand’s software and IT industry that he thinks will be important to business people in 2010.

Read English version here
Read Thai version here

Want to know more?

Cyber Threat – This Years top IT Risks (Part 3)

Cyber Threat - This Years top IT Risks (Part 3)
SafeComs's publications about internet security on all kinds of press
Publications
Cyber Threat - This Years top IT Risks (Part 3)
Published in Big Chilli - March 2009
Computer Security Audit services in Thailand and Asia, IT audit helps you identify the gaps in your security such as improperly implemented hardware and software

Maximize your company’s potential and learn how to influence public policy with these useful tips from Bernard Collin, CEO of SafeComs

Read more here with the article and photos as it appeared in the press

Maximize your company’s potential and learn how to influence public policy with these useful tips, from Bernard Collin, CEO of SafeComs.

The global recession, political instability and restrictive government policies mean the road ahead for many businesses this year is a bumpy ride. Learn how to make your company’s journey go that little bit smoother with this third and final installment of Bernard Collin’s top ten IT risks for 2009, and the opportunities that arise from them.

8. The Risk: Losing staff
Big companies are making valiant efforts not to lay off staff by cutting shifts, shortening the working week and extending breaks. We should applaud these efforts, but at some point, some companies have no choice but to cut staff. Not long after the initial shock wave of the crisis, the Bank of Thailand was predicting over a million lay offs this year. Letting good staff go is a risk because it will be difficult to get them back or replace them.

The Opportunity: Outsourcing
Now would be a great time to look at outsourcing some of your business functions, especially IT functions like backup. The most common concerns about outsourcing data and backup are confidentiality of information and the risk of disclosure or loss of data. These are genuine concerns and they can be addressed. SafeComs has developed a comprehensive backup system called SafeBox that illustrates some of the best practice principles you should be looking for if you decide to outsource.

9. The Risk: Restrictive government policies
Government policy will make all the difference in a deep recession like this one. The risk in Thailand is that ministers and senior government officials are a bit preoccupied at the moment with noneconomic matters and might just possibly make less than optimal policy decisions, like erecting lots of non-tariff barriers on trade or putting more restrictions on movement of labour. In my view, more restrictions on foreign experts working in Thailand would make a bad situation worse. Hiring a foreign database design expert to lead a project that employs a dozen Thai programmers is not in the same category as bringing 100 Burmese laborers into the country to pick tomatoes. The problem is bureaucrats tend to write one-size-fits-all regulations.

The Opportunity: Influence public policy
It is possible to influence government policy in Thailand, and I don’t mean in the way you are probably thinking. The first step is to get involved with your local Chamber of Commerce. All the Chambers belong to something called the Joint Federation of Chambers of Commerce in Thailand. The Joint Federation gathers data and information and informed opinions from the members and meets whenever they can with senior government officials who do listen. I’ve been involved in some of these efforts and seen some positive outcomes, so don’t waste time listening to the barstool cynics.

10. The Risk: Political instability
This discussion has enough smart people working on it already so we don’t need to go into the gory detail here. We are all hoping for the best in 2009, but with tensions running high on all sides it’s hard to say what direction things are going to go. The occupation of Suvarnabhumi airport last December 2009 was a pretty good demonstration of “business interruption”, a definite risk for 2009.

The Opportunity: Develop and implement a business continuity plan
Use this down time to do some scenario planning and develop a concrete business continuity plan. Start with data backup. The prospect of airport shutdowns aside, what if there were a disastrous fire in your building? A flood? A virus attack? Could you backup your data on a new system and how long would it take?

The most appropriate choice of hardware and software will depend on the volume of data your company generates. For a small business that could mean something as simple as an external hard drive. If your business uses 25 to 100 computers, think about outsourcing backup. People always raise concerns about security when we mention outsourcing backup, but the fact is outsourcing backup is often more secure, more reliable and more cost effective than many in-house operations.

Want to learn more?
www.safecoms.com
SafeComs is a Bangkok based company specializing in network security for computer systems and for unique security solutions delivered over the Internet. SafeComs can provide Internet security audits, license legalization audits, critical backup solutions and anti-spam services.

Backing up Data: Windows backup made easy
windows.microsoft.com/en-us/windows/back-up-files
This article explains how to do the backup with Windows.

Outlook backup tutorial
www.sitedeveloper.ws/tutorials/outlook.htm
If you are using MS Outlook, it’s essential that you learn how to backup the data stored here. This article was written by someone employed by Microsoft and it’s still possible to follow the instructions.

Open Source Software: Basic concepts
http://en.wikipedia.org/wiki/Open_source
Wikipedia is the world’s first and most successful open source encyclopedia, so not surprising it’s got lots of good information on the origins and evolution of the Open Source movement.

Best Open Source software
http://lifehacker.biz/articles/best-open-sourcesoftware/
Features all the most popular Open Source applications like Mozilla Firefox, Miro, Open Office and Thunderbird plus hundreds of other applications. A one-stop-shop for Open Source.

The Open versus Closed Source argument

http://en.wikipedia.org/wiki/Comparison_of_open_source_and_closed_source
Neither entirely neutral (it’s on Wikipedia after all) nor completely accurate, this extensive article offers a readable “idiot’s guide” to the basic issues so hotly contested wherever computer nerds meet.

Thailand’s Computer Crime Act

An unofficial translation of the Computer
Crime Act:
http://www.prachatai.com/english/node/117

Check if a website contains malware that could infect you:
http://www.browserdefender.com/
Not sure how safe a website is? Browser Defender will test Web sites for excessive popups, “phishing” and other fraudulent practices, and browser exploits. Downloads are tested for viruses and bundled adware, spyware or other possibly unwanted programs.

Computer Crime Acts Worldwide
http://en.wikipedia.org/wiki/Computer_crime
As usual, Wikipedia provides a reasonably good primer on the basics of computer crime. This article lists countries with CCAs, including Malaysia and Singapore. Thailand’s CCA is not listed yet.

Want to know more?

Cyber Threat – This Years top IT Risks (Part 2)

Cyber Threat - This Years top IT Risks (Part 2)
SafeComs's publications about internet security on all kinds of press
Publications
Cyber Threat - This Years top IT Risks (Part 2)
Published in Big Chilli - March 2009
Computer Security Audit services in Thailand and Asia, IT audit helps you identify the gaps in your security such as improperly implemented hardware and software

Beat the recession and protect yourself against crime with these handy tips from Bernard Collin, CEO of SafeComs

Read more here with the article and photos as it appeared in the press

Bernard Collin, CEO of SafeComs, has compiled this year’s top ten major IT security and business risks and the best ways to prevent them. This month we offer the second article of three.

It’s the Year of the Ox and the astrologers tell us we can gain prosperity through fortitude and hard work. Given the global economic forecast for the coming year, it looks like we are all going to need lots of both. Expect cybercrime to surge, expect Thai authorities to step up their crack down on copyright violations, hackers to create new and ingenious viruses, and your competitors to be looking for ways to control costs and retain customers. Bernard Collin, CEO of SafeComs Co. Ltd. in Bangkok, offers these thoughts on the top ten IT security and business risks for 2009 and the opportunities that come with them.

1. The Risk: Business Software Alliance crack down on unlicensed software
The Business Software Alliance or BSA will be getting a lot more anonymous reports in 2009, so be on the safe side and do a software audit. Fast!

The Opportunity: Get legal, look at Open Source

A time of slow business activity is the perfect opportunity to do a software audit. SafeComs can run a complete audit and produce a full report on exactly what software is running on your systems, its legal status, and its productivity in terms of performing the tasks it is supposed to be doing. This is also a great time to explore the many benefits of Open Source software.

2. The Risk: Money and data theft through virus infection

Complacency is the big risk in 2009. The most desirable targets: companies using illegal software.

The Opportunity: Learn to protect your systems and put safety measures in place
A slow business cycle is the perfect time to get your house in order in terms of security. Don’t stop at the technical fixes. Now that things are a bit less hectic, use the time to educate yourself and your staff.

3. The Risk: Loss of personal or company data
Most business owners are aware of the risk and most think they have backup under control. The reality: very few companies are adequately prepared for even minor data loss events.

The Opportunity: Upgrade your backup system

Use this period of relative quiet to review and revamp your data backup system. Look into outsourcing your data backup.

4. The Risk: Losing customers

If you are running a company, you’ve got to find ways of cutting costs without compromising your brand image and losing your regular customers.

The Opportunity: Winning new customers

Spend some time exploring Enterprise Management and Customer Relations Management systems. Smart companies use hard times to build for the future. At SafeComs, we can also completely outsource ER and CRM, which means some companies can save enough to pay for the system in a few months.

5. The Risk: Thailand’s new Computer Crime Act
A new Computer Crime Act came into effect in August 2008. Compliance requires installing data logging systems, which requires a bit of expertise. The risk is you can spend a lot of time, effort and money and not get the technical stuff right and find out too late that you’re not in compliance with the law.

The Opportunity: Set up compliance measures
Because it’s so new, the Computer Crime Act is a bit of a puzzle. While there is still some debate, the law seems reasonably clear on what data you need to keep and for how long. In this respect, it’s a hardware and methodology issue.

6. The Risk: Good old fashioned theft
Expect an increase in petty theft of small items like mice, hard drives and printer ink cartridges and more expensive items like printers and laptops. Laptop computers are the prime target for both the casual and experienced thief because they are just so easy to steal and so easy to resell. And please, lock up these extremely expensive CDs with your original software and licenses you paid substantial amounts of money for and are sitting on an open shelf in your office.

The Opportunity: Tighten up security
Use down time to tighten security. Start by updating your equipment inventory. Review security policies and procedures and do some awareness raising among staff.

7. The Risk: Amateur consultants
Expect to be flooded with offers of cut-rate work on everything from website and database design to Internet security. People are out of work and need money and will promise you anything to get your business.

The Opportunity: Bargain rates on good work
The flipside is that there will be a lot of very good people available and willing to work at lower rates than before the downturn. In terms of talent, it’s going to be a buyers’ market. Don’t rush into things. Do careful background checks and talk to references.

Want to know more?

Cyber Threat – This Years top IT Risks (Part 1)

Cyber Threat - This Years top IT Risks (Part 1)
SafeComs's publications about internet security on all kinds of press
Publications
Cyber Threat - This Years top IT Risks (Part 1)
Published in Big Chilli - February 2009
Computer Security Audit services in Thailand and Asia, IT audit helps you identify the gaps in your security such as improperly implemented hardware and software

Is your computer really safe from cyber crime?
Bernard Collin, CEO of SafeComs, has compiled this year’s top ten major IT security and business risks and the best ways to prevent them. This month we offer the first three.

Read more here with the article and photos as it appeared in the press

Is your computer really safe from cyber crime?

Bernard Collin, CEO of SafeComs, has compiled this year’s top ten major IT security and business risks and the best ways to prevent them. This month we offer the first of three articles.

IT’S the Year of the Ox and the astrologers tell us we can gain prosperity through fortitude and hard work. Given the global economic forecast for the coming year, it looks like we are all going to need ample quantities of both. Expect cybercrime to surge, expect Thai authorities to step up their crack down on copyright violations, hackers to create new and ingenious viruses, and your competitors to be looking for ways to control costs and retain customers. If that doesn’t sound too promising, remember what Winston Churchill said: “A pessimist sees the difficulty in every opportunity; an optimist sees the opportunity in every difficulty.”

With that thought firmly in mind, here are a few of the IT security and business risks for 2009 and the opportunities that come with them. Look out for part 2 in next month’s BigChilli.

1. The Risk: Business Software Alliance crack down on unlicensed software

President Barack Obama is going to leave no stone unturned in his efforts to revive the American economy. Expect increased enforcement of copyright laws to be one of those stones. Thailand already has the enforcement mechanism Obama needs: the Business Software Alliance or BSA. This is not the typical ‘window dressing’ agency set up for the sake of appearances. The BSA has got the full support of the Thai authorities and they had an exceptional success rate in 2008.

For the BSA, ‘success’ is measured by the number of companies they bust and the amount of fines they collect. The reward to an individual reporting on a company using pirated software is now 500,000 Baht. In 2009, we are going to see a lot of layoffs and cutbacks, which means a lot of very unhappy people who could use half a million Baht. I expect the BSA will be getting a lot more anonymous reports in 2009.

The problem with pirate software is that many managers are either unaware of the level of illegal software floating around on their systems or they underestimate the risk.

The Opportunity: Get legal, look at Open Source

A time of slow business activity is the perfect opportunity to do a software audit. This way you gain a full report on exactly what software is running on your systems, its legal status, and its productivity in terms of performing the tasks it is supposed to be doing. This is also a great time to explore the many benefits of Open Source software. You’ll find details of SafeComs’ audit service on our official website.

2. The Risk: Money and data theft through virus infection
Complacency is the big risk in 2009. It’s been fairly quiet on the virus front over the past couple of years. Everyone is happily surfing the net and chatting with friends and feeling quite confident they are safe from infection.

Up until a few years ago, a hacker’s main objective was fame and glory within the hacker community. Hacking is now organized crime controlled by big international syndicates and they are hiring talent.

The total value of cybercrime now exceeds the revenue from drugs and other traditional criminal activities. At SafeComs, we’ve seen a dramatic increase in the number of professionally designed threats like key-loggers and Trojans as well as an increased capability at remaining undetected.

The criminal hacker’s objective is to silently infect a PC or network and use it to attack other systems or to steal identity and banking details. The most desirable targets: companies using illegal software. With unlicensed copies, you have no way to apply security patches or update your antivirus programs.

We did a quick and dirty survey once. We bought a few dozen pirate software packages at a well known location in Bangkok. One in three contained a virus, trojan or keylogger designed to infect whatever system it was installed on.

The Opportunity: Learn to protect your systems and put safety measures in place

Use this downtime to educate yourself and your staff so everyone understands the dangers and enforce strict penalties for staff who break the rules. The steps required to protect your own PC or laptop or your company network are actually not that difficult. You can find lists of dos and don’ts on many websites and antivirus and firewall software is pretty cheap these days. People are the weak link. A very good rule of thumb is that if it sounds too good to be true, it is. That seems so obvious, but people are still falling for the Nigerian scam.

A slow business cycle is the perfect time to get your house in order in terms of security. Do all the technical stuff: make sure your computers have all the most up-to-date security patches; update your antivirus at least once a day; and run a virus check from an outside AV company, usually advertised as a free online AV test.

If you do online banking, make sure your bank has proper secure authentication system (2-factor authentication or one-time password), or limit the amount that can be transacted in one day and check your balance daily. But don’t stop at the technical fixes. Now that things are a bit less hectic, use the time to educate yourself and your staff.

3. The Risk: Loss of personal or company data

Catastrophic data loss is generally seen as something that happens to other people. Statistics indicate that you stand a very good chance of being the next ‘other person’.
In a recent US survey, 30% of PC users had lost all of their files due to events beyond their control, and 60% of companies that lost their data shut down within 6 months of the loss event. Most business owners are aware of the risk and most think they have backup under control. The reality: very few companies are adequately prepared for even minor data loss events.

The Opportunity: Upgrade your backup system

Use this period of relative quiet to review and revamp your data backup system. I recommend first sitting down with your management team and identifying essential company data. What data could you not afford to be without for even a day? Most of that will be financial and customer data, but it depends on the nature of your business.

The most appropriate choice of hardware and software will depend on the volume of data your company generates. For a small business that could mean something as simple as an external hard drive. If your business uses 25 to 100 computers, you are probably looking at more sophisticated tape drive or real-time systems that can cost hundreds of thousands of Baht to install and maintain.

The ongoing maintenance costs, including dedicated personnel, can be substantial. Also look into outsourcing your data backup.

Want to know more?