Results (
English) 3:
[Copy]Copied!
Alarm deal security cyber epidemic
.Cyber attacks occur widely. After seeing the weakness of network organization. The defects of the infrastructure of each. To cope with the threat that step. The attack a specific target organizations.In the stage of the CLOUDSEC 2015 has organized a seminar on know in time, lean to know or Expect The Unexpeced in order to cope with disasters. The new threat that all over the world should be careful and be adapted to benefit fully from protect data
.Tons, Gaia thag garde director of Asia Pacific Company, Trend Micro, who provides the software safety, said. At present, mobile phone becomes the center attack. It must be set properly.The deep down in biological level of the individual. To set in with a problem to epidemic in the future!Blue lotus finance director of complete business management IT security, AIS, indicating that the situation cyber threats have obvious changes in 2563 due to ประชากรมากขึ้น.And most are middle class, a good income, life to access digital life. Each digital device with not less than 10 pieces. Everything will be involved in all digital systems such as refrigerator and washing machine.To have the processing of user information. Also known as the Internet of think, which will be benefit to drive economy
.FillingSiripong consciousness mul. Commanders committed crime suppression division technology. Police investigation, said box in the cyber world currently threatened hard with the financial institution.From both institutions. The user or account holder. Individual agencies including the third joined the development system. The protection cycle
.Lance to Khun thot director of the office of electronic government (public) or EGA. Said Lee Ji ah are between the standard application of the government. To be adopted in 2559 so as standard.The private sector can lead to development of guidelines available through www.Apps.go.th
.
Being translated, please wait..
