Home2017October

October 2017

Business owners will want to take note of the all-new PIXMA line-up. The PIXMA TS9170, TS8170, TS5170 photo all-in-one printers and the PIXMA TR8570 office all-in-one printers introduce a unique feature that marries technology with a human touch, bound to delight home and business users alike.

Message in a Bottle Photo

Businesses can now convey their season’s greetings to their customers beyond just a graphic print or a photo. The new Message in Print app enables messages to be embedded within photos, enabling a digitally immersive experience to printed material.

This is more than just a simple text overlay customization – photos can now carry voices, sounds and animations by embedding them through the app. Recipients simply have to view the photo via the Message-in-Print app, and experience a whole new way of interacting what was previously a static medium.

Maximising Work Productivity with the PIXMA TR8570

The PIXMA TR8570 helps businesses work more efficiently and cost-effectively. With the ability to load paper in two directions (rear tray and cassette tray), users can switch easily between two paper types.

Those that do need to print a large number of documents can fill both trays with A4 plain paper for a combined paper capacity of up to 200 sheets. The PIXMA TR8570 features a time-saving Automatic Document Feeder that can load up to 20-sheets of documents for scanning or copying purposes.

Moreover, businesses can now enjoy lower costs of print by using the XL cartridge on the PIXMA TR8570 office printer.

The Document Removal Reminder

The Document Removal Reminder function helps remind business users print safely and securely. When a document is left on the scanner glass after a scan or copy, a notification on the LCD panel along with an audio alert prompts the user to them.

This helpful function minimizes unwanted information from being left unattended on the printer, compromising the security of the company.

Vivid and Vibrant Colours

For businesses that require accurate colour reproduction, Canon’s new 6-ink system delivers a precise, expanded colour gamut. With the new Photo Blue ink in the 6-ink systems for the PIXMA TS9170 and TS8170, graininess is minimised, while the finer details are revealed.

The end result is a vibrant, stunning print that matches what users have on-screen – perfect for companies such as advertising or graphic design agencies that require accurate output.

Seamless Connectivity

With Bluetooth Low Energy (BLE) technology, users can stay connected to PIXMA printers via the Canon Print Inkjet/SELPHY app.

Besides enjoying the convenience of printing on-the-go, users can now receive status alerts — such as low-ink notifications or when the paper tray needs filling up — once they are within the printer’s Bluetooth discoverable range.

With the increasing use of mobile smartphones as a business communications tool, such seamless connectivity will help streamline operations in the office.


To purchase the PIXMA TS9170, TS8170, TS5170 or TR8570, visit the Canon eShop. In addition, follow Canon Singapore on LinkedIn for more business-related solutions and insights!

Human oversight is one of the leading causes of data and information breaches, and that extends to businesses as well. Employees belonging to the following departments could be vulnerable to hackers looking to intercept and steal corporate information.

1. C-Suite

C-level executives are said to be at the most at risk for cyber attacks. Given their authority, they have more access to classified information and can sign off wire transfers without secondary approval. This makes them attractive targets for phishing, in which falsified emails are sent as an attempt to obtain confidential information under the pretense of legitimate reputable companies.

“Whaling” is one such form of phishing that C-suites might fall victim too. These are highly personalized, legitimate-looking emails specifically aimed at top-level executives. With most C-level executives breezing through emails, in part due to their busy lifestyles, they may not exercise the necessary caution in opening attachments.

Besides, public Wi-Fi is readily available at hotels and airports which the executives frequent for constant travels. This exposes them to greater chances of data breaches as they surf the web with an unsecured connection.

To protect themselves from cyber attacks, C-level executives should implement stricter verification measures like two-factor authentication for logins and transactions. Having unique passwords for various accounts would help reduce the risks of being hacked too. In addition, Virtual Private Networks (VPNs) should be used whenever possible instead of public Wi-Fi.

2. Human Resource Team

One of the HR department’s roles is to screen potential staff. This renders them more vulnerable to phishing attacks when they receive resumes which might turn out to be malware. As they are also highly connected with other departments of the company, hackers can easily gather all of the employees’ personal credentials and valuable data from relevant departments in one swift operation.

For enhanced cybersecurity, employers can consider investing in antivirus software to scan documents for viruses before they are opened. As for the HR team, they should do their part by constantly watching out for dubious file names and types, as well as inconsistencies in the emails that they receive. Another good practice is to confirm the validity of sensitive requests like confidential data transfer in person first before carrying them out online.

3. Salespeople

In order to obtain and maintain good client relationships, the salespeople are required to interact with business associates frequently. Coupled with their strong desire to clinch the next big deal, they may lower their guard in terms of obliging to requests from strangers online or reviewing online documents when threats are disguised as prospective business opportunities. Moreover, their personal details are usually posted on the web for convenient contact, lowering barriers for hackers to pick them as phishing targets.

Hence, it is crucial for salespeople to err on the side of caution, and remain wary of any suspicious links or files that they receive. Likewise, they should also keep an eye on what they reveal about themselves online.


Cybersecurity recommendations tend to focus on employing preventive software that builds up defense walls around an organisation’s system. However, it is very easy to bypass those barriers and target the employees who are largely unfamiliar with cybersecurity yet deal with highly sensitive data every day. Employees should stay vigilant in their daily work operations and if possible, receive proper training on cybersecurity.

For more business insights, follow Canon Singapore on LinkedIn.

 

Despite technology becoming a ubiquitous presence in modern society, many users still remain unaware of cybersecurity threats, even dismissing their individual responsibility in enforcing cybersecurity. Here are some misconceptions commonly held regarding cybersecurity practices.

Myth #1: Cybersecurity Is Solely The Responsibility Of IT Staff

In most companies, the IT department is in charge of installing technical controls to safeguard company data. But with critical information digitised and accessible to other staff members, cybersecurity extends over all departments, designations, and even devices.

Even with technical controls set in place, human error can also result in cybersecurity breaches – a study by CompTIA showed that human error accounted for over half of security breaches in 2015. With this in mind, all employees should be vigilant in identifying and avoiding potential security threats, such as suspicious email attachments.

Myth #2: Threats Only Come From The Web & Email

An increasing number of devices and their corresponding processes are now controlled digitally, unintentionally providing entry points for cyberattacks. The Internet of Things brings about immense convenience in allowing electronic devices to be controlled remotely across network infrastructure, but that also means that threats can now come from anywhere, from Smart TVs to surveillance cameras to printers.

To address the growing threat of process end-points being compromised in a cyberattack, all Canon Multi-Function Devices come equipped with security features. Rather than dispensing printouts automatically, print jobs on Canon Multi-Function Devices are only released after document owners authenticate themselves at the printer. Our imageRUNNER ADVANCE series also comes installed with hard disk drive security, automatically erasing printer data as soon as the job is complete – the risk of data interception is hence completely eradicated.

Myth #3: Small & Medium Businesses Are Safe From Cyberattacks

From credit card information to personal details, data of all types is becoming increasingly valuable. Unsurprisingly, cyber-crime has become a lucrative business to hackers. In 2015, PwC’s Information Security Breaches survey revealed that 74% of SMEs reported having faced at least a security breach within the year, indicating that businesses of all scales can now become a target of hacking. In fact, smaller businesses might even be more appealing to hackers, often lacking the due diligence in exercising stringent data security measures.


Misconceptions about cybersecurity have contributed to an attitude of complacency, putting us at greater risk of becoming victims of cyberattacks. Companies and individuals can and should be more informed about, in order to develop an appropriate strategy to counter potential threats.

For more business insights, follow Canon Singapore on LinkedIn.

In today’s information-dependent age, lies an increasing vulnerability to the data we store online. Once set in motion, technology advances at a rapid rate, causing software requirements to grow constantly. This results in key infrastructure becoming obsolete at a speed too breakneck for corporations, institutions or governments to keep up with.

Just this year, we’ve witnessed some of the largest meltdowns in cybersecurity history. Depending on the motive of the hacker, data breaches usually result in millions of personal records and sensitive information stolen. This does not only affect the breached organisation, but also every end user whose private records may have been compromised.

WannaCry

In mid-May, a strain of ransomware called WannaCry infected over 200,000 computer systems worldwide, affecting corporations and public services alike. Most notably, the ransomware caused numerous National Health Service (NHS) hospitals and services throughout the United Kingdom to temporarily shut down, locking patient files and postponing vital operations and procedures.

Closer to home, the WannaCry attack left a few hundred Singaporean IP addresses compromised as well; a reminder that geographical boundaries mean little when it comes to cybersecurity.

Once infected, the viral ransomware scrambles data on computers, demanding a ransom of $300 to $600 to restore access. Spread by various methods, including phishing emails and on systems without up-to-date software, WannaCry increases the payment amount with time, threatening loss of data and creating a sense of urgency among its victims.

WannaCry’s reach came about from a previously leaked Windows vulnerability released by Shadow Brokers. The hacking tool, called ‘Eternal Blue’ gives unprecedented access to all computers running on outdated versions of the Windows Server Software. Microsoft has released a patch for the bug back in March, which many institutions had yet to apply by the time the attack happened. This serves as a crucial reminder to organisations and individuals to have their software updated on a regular basis.

GoldenEye

Just a month after WannaCry brought chaos to computer systems around the world, another global ransomware attack began causing severe disruption at firms in Europe and the US. Companies affected by the malware include advertising firm WPP, food company Mondelez and Danish shipping firm AP Moller-Maersk amongst plenty others. Once a computer is infected, the malware spreads rapidly across an organisation via the EternalBlue vulnerability in Windows PCs or through two Windows administrative tools.

This huge breach was caused by a new strain in their malware known as GoldenEye, which was associated with “EternalBlue” as well. As such, it operated on a more advanced mechanism compared to its predecessor, WannaCry.

Investigators started suspecting that GoldenEye had to be a deliberate, damage-causing attack disguised as ransomware. Having originated from, and having hit Ukrainian infrastructure particularly hard, research suggests that the malware was in fact a targeted cyberattack carried out by Russian hackers, against Ukraine.

Emmanuel Macron Campaign Hack

macaroon_website

A mere two days before the French presidential elections took place, hackers dumped 9GB worth of torrent files on an anonymous publishing site. Purporting to be an archive of leaked emails from Emmanuel Macron’s party, most of the data were obtained several weeks before from many of his campaign staff’s personal and professional email accounts. Subsequently, the Macron party issued a statement claiming numerous fabricated documents were being released among the authentic files and were being disseminated together on social platforms.

With a data dump timed less than 48 hours before the election, it would have been too late to cause a specific shift in the outcome. Yet the timing could have proved strategic. Since French law forbids candidates to address the public two days ahead of an election, Macron would have been unable to tackle any accusations directly, fabricated or not.

While Emmanuel Macron went on to clinch the presidency, the Macron campaign compared the hacking directly to the targeting of Clinton’s campaign. The hackers were far sloppier this time around, but Macron was also far more prepared than Clinton ever was. The breach had been anticipated by French officials and Macron’s staff who had been receiving phishing emails as early as December the year before. Macron’s team took preliminary cautions against by creating bogus documents and fake email accounts, which served to restrain the hackers, holding them off as they became obligated to verify the documents if necessary.


Be it for politics, profit or otherwise, cybersecurity breaches like the examples outlined above serve as a reminder that we live in a world that’s increasingly dependent on systems, network and digital repositories. As challenging as it might be, the future of cybersecurity lies in ensuring infrastructure advances along with its corresponding technology.

For more business insights, follow Canon Singapore on LinkedIn.