Skip to main content

Posts

Showing posts from April, 2022

Philippine telcos blocking entire SMS text with internet addresses in it

If you are sending SMS texts to your friends, family or colleagues and they contain internet or web address including IP and email addresses, and even a period or dot separating, regardless of, your words and numbers, they are automatically blocked and not going to be received by your waiting recipient. Cooler heads must prevail here especially if an important message is urgently being expected. IP version 6 address is fine. However, an IPv4 including localhost address (given automatically to every computers and network interfaces as their own alone designed for troubleshooting purposes), and your money in the billion figure using dot as separators would be blocked.  If you send "local.business, naman.naman etcetera" or any words that made you use dot in between them, as part of the text, they will be blocked. There are some, that isn't blocked in this category. Like check.iclassed, some.ent, whatever.local etcetera, that is because they do not form any domain name at all

Basic idea of strategy in the 𝖎* of 𝖎𝖈𝖑𝖆𝖘𝖘𝖊𝖉, cyber and TICO as a whole

Organization can impress upon with different tasks and responsibilities being attended to regularly by its stakeholders thereby gaining the upper hand in its production relative to smaller ones or individuals with limited workforce, and in a relentless aim a strategy of smaller entities cannot even be subdued, as history would suggest, by the greater ones. Productions caused by technology may not be affected by the number in human resources running it for a very good reason. It is entirely dependent on technology capacity with a leaders’ know-how on the business objective. With strategy, which can be mustered differently in many situations and environment and where the size of the organization is necessarily not a repute is especially true in TICO, most evidently in the area of operational technology with its increasing reliance on data especially nowadays. This is apprehended by those who has organization’s or top decision-maker's responsibility, mostly with leadership position se

How do we see security and privacy in the enterprise

Enterprise system, infrastructure, data, services, distinct roles, operating functions and management controls have built in basic security and privacy capabilities. Whether or not it is a mandate, which is usually assured and backed by business conduct and applicable policies, security and privacy have to be utilized and configured correctly to suit the needs of the entire organization not just a particular scope or business unit. Security and privacy attack vectors and velocity have never been so dynamic and logistical opportunity is not a burden at all nowadays. There has to be an unwavering disposition on security and privacy initiative. Regardless of industry setting, security and privacy must remain a foothold mechanism by the technology at large. Security can be designed and deployed to prevent incidents and malicious intents toward technology and data. Technology and data are complementary on purpose and they can be tightened, not restricted, not only by making sure their built