How Velocity Helped Hugill & Ip Crack the Code on Microsoft Teams for Telephony in Hong Kong

  Discover how Velocity helped HK law firm Hugill & Ip adopt Microsoft Teams for telephony-helping them consolidate their communications and significantly boosting their efficiency and cost savings.   Founded in 2018 by Adam Hugill and Alfred Ip, Hugill & Ip provides client services and bespoke legal advice to individuals and corporations in Hong Kong… Continue reading How Velocity Helped Hugill & Ip Crack the Code on Microsoft Teams for Telephony in Hong Kong

Case Study: Implementing New Technology for Leading Hong Kong Law Firm Hugill & Ip

  Find out how Velocity helped Hugill & Ip accelerate their growth implementing cloud-first technology to establish a secure, modern workplace.   Established in 2018, Hugill & Ip has been providing bespoke legal advice and exceptional client services to individuals, families, and businesses in Hong Kong and internationally. The firm’s dedicated practice areas include dispute… Continue reading Case Study: Implementing New Technology for Leading Hong Kong Law Firm Hugill & Ip

Google Failed to Protect Its AI Trade Secrets – You Can Avoid that Mistake

  Failure to safeguard your IT infrastructure exposes your organisation to all kinds of internal and external threats. As highlighted in a recent high-profile case involving Google, these threats include data breaches and intellectual property theft.   On March 5, 2024, the United States Department of Justice charged a Chinese national with stealing artificial intelligence… Continue reading Google Failed to Protect Its AI Trade Secrets – You Can Avoid that Mistake

Stamping Out the Bad Actors: Zero Trust Architecture Explained

  In the business world where connectivity knows no bounds, the concept of ‘circle of trust’ is obsolete. Bad actors are already inside the network.   Zero Trust Architecture isn’t just a buzz-phrase; it’s a philosophy reshaping the way organisations approach data integrity and cybersecurity.   In today’s hybrid work environment, data lives in the… Continue reading Stamping Out the Bad Actors: Zero Trust Architecture Explained

DocuSign Phishing Emails are on the Rise – Can Security Training Help?

  In our remote-first world, tech tools have gained greater prominence since they allow people to collaborate without face-to-face interactions. Tech platforms like DocuSign. are convenient since they allow users to electronically sign documents and agreements in a secure and legally binding way.    Unfortunately, there has been a concurrent rise in the number of phishing attacks… Continue reading DocuSign Phishing Emails are on the Rise – Can Security Training Help?

Malware Was Found Pre-installed in Mini PCs: Is Your Business at Risk?

  Are you purchasing new computer software and hardware for your business? Procuring software and hardware from disreputable vendors could expose your business to all types of risk – including malicious spyware and phishing attacks.   Case in point is the recent line of mini PCs from AceMagic. Jon from the popular YouTube channel The… Continue reading Malware Was Found Pre-installed in Mini PCs: Is Your Business at Risk?

LockBit Ransomware’s Take Down Might Be Temporary – Your Cybersecurity Shouldn’t Be

  In February 2024, the US Department of Justice (DOJ), together with the UK’s National Crime Agency (NCA) and other international law enforcement partners, announced that they had disrupted the notorious LockBit ransomware group.   LockBit is a cybercriminal group that provides ransomware as a service (RaaS). The group has targeted over 2,000 victims worldwide… Continue reading LockBit Ransomware’s Take Down Might Be Temporary – Your Cybersecurity Shouldn’t Be

Cybercriminals are Using AI Tools to Target their Victims – Are You Prepared?

  On February 14, 2024, OpenAI (which owns ChatGPT) and Microsoft Threat Intelligence announced that they had jointly disrupted five state-affiliated threat actors that had sought to use AI services to support their malicious cyber activities.   According to OpenAI’s official announcement, these five state – affiliated malicious actors are:   ● Two China-affiliated threat… Continue reading Cybercriminals are Using AI Tools to Target their Victims – Are You Prepared?

Learning from Air Canada’s Mistakes – Why Your Business Might Not Be Ready For AI

  While many businesses are eager to harness the latest AI technologies to improve their processes, reduce costs, and enjoy other benefits, rapid adoption without establishing the proper IT infrastructure and other guardrails could expose businesses to numerous risks.   Case in point is the tribunal case involving a faulty chatbot (owned by Air Canada) and… Continue reading Learning from Air Canada’s Mistakes – Why Your Business Might Not Be Ready For AI

Cyberattacks are Growing More Sophisticated – Has Your Cybersecurity Evolved?

  Has your business made adequate investments in cybersecurity? If you’ve let your guard down, know that the cybercriminals have been busy developing ever more sophisticated attack vectors.   Keeper Security, a Chicago-based tech company that offers password management services, recently commissioned an independent research firm to survey over 800 IT security leaders globally about looming… Continue reading Cyberattacks are Growing More Sophisticated – Has Your Cybersecurity Evolved?