Tag Archives: Data Security

Making Digital Safe for Kids – The Big Challenge of Marrying Features and Safety

There’s no denying that our world is becoming increasingly digital. We have graduated from writing letters and licking envelopes to writing short messages and video calls. What’s more, we have TV shows that we can watch on demand rather than wait for a scheduled time of day. But, we’ve never thought of how our children will redefine what it means to be digital natives.

pexels rethaferguson 3825569
Photo by RF._.studio on Pexels

Once upon a time, it was cool to be that generation who grew up with iPads, iPhones, laptops and more. However, now, after years of academic fear-mongering and negativity, we find ourselves at a crossroads of understanding how these gadgets can be more than just causes for concern, but also tools for learning and channelling the creative curiosity that is so innate in children. We are now looking for ways to make sure our children are ahead of the curve with an inherent curiosity and understanding of technology and gadgets.

However, with all the options available from iPads to Samsung tablets, parents are either at a loss on how to cater for children with gadgets or they are simply overwhelmed by the choices. Then, you have emerging companies like myFirst that are looking at creating gadgets specifically for children with inherent features and guard rails so parents. It’s an emerging niche in tech that we love to call kiddie tech.

Feature-rich Gadgets that are Inherently Safe for Kids

Kiddie tech isn’t as childish as the moniker may allude to. Instead, companies like myFirst are looking to create child-safe devices that address both the child’s needs and parental concerns. However, they are not in the business of dumbing down tech for kids either. Instead, the products being developed for children are very much up-to-date devices with all the bells and whistles we’d expect to see in a regular tablet or smartwatch.

myFirst new product collection

Take, for instance, the myFirst Camera lineup. This lineup of cameras allows kids to explore and express themselves through the camera lens. What’s more, it’s not a make-believe camera – no – it’s a fully functional digital camera that children can use with an SD card to capture what they see. Yes, it’s a digital camera, something we adults have left in the past. However, with devices like the myFirst Camera, parents are allowed a small window into their children’s point of view as they capture what is most important to them. Paired with items like the myFirst Frame Live, these perspectives can be shared with loved ones beyond just the nuclear family.


G Jay Yong myFirst
Source: myFirst

“Kids also just want to have fun. For our wearable smartphones (WatchPhones), it would have been too easy to include games to keep the kids entertained, but we don’t have games in our watches because we want kids to be able to focus on the fun element of being social with communication, not glued to a screen on games all day.”

G-Jay Yong, Founder of MyFirst


These fully functional devices not only allow us to interact more meaningfully with kids, it also allow the children to become familiar with technology in a more guided manner. Things are sandboxed to an experience that is very specific and enriching for the children. When was the last time you went to the beach or a family dinner and set your child off on a photo journey? Did you learn anything from their unique perspective?

Addressing Parental Concerns Both Digitally and In Real Life

It’s not just about perspective when it comes to gadgets, parents are concerned. We are constantly bombarded by the media about kidnappings, dangerous online interactions and more. These situations not only strike fear in parents but also create a sense of dread when devices are passed to our kids. But, what if there was a way to alleviate your fears with a device?

Leya Myfirst R2 1

Devices like the myFirst Fone R2 have been built to alleviate these fears. The 4G-enabled watch allows you to know where your child is even without a smartphone. It also gives them the ability to contact you if anything were to get a little awry. Yes – it is a smartwatch with a camera on it but it does come with guard rails. These guard rails allow the experience to be unique for each child but also safe.

Speaking of, when it comes to data privacy, parents can rest at ease with companies like myFirst. They have a robust system to ensure that data is stored privately and securely. MyFirst clarified, “When a family onboards to myFirst, the KYC is done on the parent. The parent then creates a kids sub-account for each kid. This way, myFirst only has personally identifiable information of the parents, and no personally identifiable information of the kids whatsoever.”  Of course, if it’s our data on the internet, we want it to be safe too. We’ve been assured that myFirst also takes every precaution when it comes to that.

Striking A Balance of Safety and Fun

There is no denying that children want to be engaged in an entertaining way. More often than not, digital experiences trump the experiences we can provide them, especially with the limited time and space we may have. So, it’s not just about making things safe and secure, it’s about striking that balance between safe and fun.

pexels august de richelieu 4260323
Photo by August de Richelieu on Pexels.

In the words of G-Jay Yong, Founder of myFirst, “myFirst is built from the ground up for kids so we build in the pros, and build out the downsides, so it’s safe and suitable for kids and the family.” He emphasizes that “[myFirst devices] serve as the kids’ first tech devices so they can benefit from all the good that technology can bring to our lives like communication and being sociable, without all the bad stuff usually associated with technology.”

This sentiment on utilizing technology for the benefit of Children is growing in today’s society. Parents are looking to stimulate their children without creating gadget addicts. This comes with a heavy responsibility of keeping an eye on interactions, apps and even websites that your children could interact with. However, devices built for children have created a safe sandbox where parents can rest at ease as their children grow, explore devices and express their curiosity.

Why Small Businesses Don’t Backup: Exploring Limitations and Solutions for Data Protection

This article is contributed by Joanne Weng, Sales Director at Synology

In today’s digital age, backup solutions are more critical than ever before. Businesses of all sizes must ensure that their data is secure and easily recoverable in case of data loss or cyberattacks. One of the most commonly cited backup rules is the 3-2-1 rule, which suggests having at least three copies of data stored in two different formats, with one copy stored offsite. While this serves as a solid foundation for a backup strategy, it may not always be practical or feasible for all businesses.

Should we follow the golden rule of 3-2-1 backup?

The golden rule has its limitations, especially for small businesses with limited resources. Implementing a complete backup solution can be costly, as it requires additional hardware and offsite storage solutions. According to a 2021 report from Databarracks, “implementing the 3-2-1 backup rule is becoming more expensive, with the cost of storage and cloud services rising by around 10% over the past year” (Source: TechRepublic).

b13a809a 5189 4860 9724 22e4c773595a

For SMBs, prioritizing practicality in your office’s data protection plan is crucial, and identifying a suitable solution for your business is paramount. According to a survey by ITProPortal, 40% of small businesses do not have any data backup solution in place. Moreover, 34% of businesses have experienced data loss due to hardware failure or human error, and 25% have experienced data loss due to cyberattacks. Hence, the primary concern here is to implement this data protection strategy seamlessly and initiate it as swiftly as possible.

Reasons why small businesses don’t backup

Let’s delve into the reasons why SMBs often lack proper backup solutions. As previously mentioned, one of the primary limitations of backup is its cost. Budgetary constraints are consistently a major concern for most businesses. Backups might be perceived as both time-consuming and expensive due to hardware costs, recurring software license fees, and maintenance expenses.

Furthermore, constructing and managing a robust backup solution also demands significant effort, which many SMBs are unable to allocate. A dedicated IT team for setting up the necessary infrastructure is often lacking, leading to the outsourcing of such tasks.

Lastly, the recent adoption of hybrid working has resulted in office data scattered across different platforms and devices. This situation makes data centralization and management initially cumbersome. Additionally, data migration in such cases can give rise to security risks.

Backup solution with compatibility, capacity, and value cost

To overcome these challenges, small businesses need a data protection solution that facilitates scalable backup appliances, simplifies IT deployment and maintenance, as well as offers flexibility and secure integration across various platforms and devices.

Synology backup solutions are ideal for businesses, offering both on-premise and cloud-based backup solutions to cater diverse business needs. These solutions come with three key advantages: compatibility, capacity, and value cost. Unlike traditional backup appliances, there is no need to select corresponding backup software based on varying endpoint requirements and software compatibility. Synology’s hybrid-cloud provides a centralized backup appliance that spans across platforms, along with scalable storage. Utilizing enterprise-grade technologies such as global deduplication and changed block tracking (CBT), maximized storage efficiency with simplicity.

Moreover, the backup software licenses cover everything, from folder-level and bare-metal backups to VM and SaaS backups, and all of this is available at no cost—100% free. Synology’s public cloud backup service adopts a pricing method that only calculates storage space, instead of the number of devices or employees. This transparent pricing approach ensures there are no hidden costs associated with the backup package, setting it apart from other solutions available in the market.

Backup is not that hard: Deployment sizing recommendations for different usages

So, considering all the mentioned benefits, let’s focus on practicality: What is the ideal backup setup for small to medium businesses? Here are three recommended sizing for different segments of usage scenarios.

Smaller-sized businesses and startups

Starting from smaller-sized businesses, such as startups with around 30 employees. These companies require endpoint and SaaS backup capabilities to safeguard the data of their remote-working staff. Additionally, they might require storage scalability to accommodate future needs. Given that these businesses often lack dedicated IT personnel to formulate a comprehensive backup strategy, Synology’s Plus Series 4-bay or above model with cloud storage backup will be the most suitable solution.

Synology Advertorial Pic 1

For this context, the best approach is to employ Synology’s Active Backup for Business. This tool enables the automatic backup of office data from PCs, servers, and SaaS accounts (like Microsoft 365) to centralize all the data on the NAS. To further enhance the layers of protection for this centralized data, Hyper Backup can be adopted. This solution facilitates backing up the NAS, along with all its configurations, to options such as external hard drives, public clouds, or another Synology NAS device.

What’s more, the user-friendly intuitive UI, coupled with the setup wizard, allows the staff to easily set up the system. The powerful hybrid protection strategy comes at a cost comparable to that of protecting a set of individual PCs, making it undeniably a cost-effective backup plan.

Medium-sized businesses

Synology Advertorial Pic 2

Moving on, for a company size of around 200 employees, the deployment approach remains comparable to the one previously mentioned; however, a larger company size introduces additional factors, such as the need to back up virtual machines and the necessity for faster access speeds and greater storage capacity due to the increased scale.  Normally, businesses of this size would have an IT team for handling backup tasks, Yet, given the larger number of devices to be backed up, challenges arise in terms of cross-platform deployment and ongoing maintenance.

This is where Synology’s comprehensive backup software setups in to provide assistance. It not only supports almost all the common platforms in SMBs IT infrastructure but also provides a central management portal. Thus, Synology emerges as the most fitting choice for SMBs.

Similar to the Startups package, here we would recommend 8-bay or above Plus Series models along with C2 Storage for the data protection plan. This package could cover all the backup-needed platforms, and the storage can be easily expanded by providing flexibility in expansion in the future.

SMEs or Larger-Scale Corporations

Lastly, when considering larger companies, such as SMEs with approximately 1000 employees, the pain point would be similar to what SMBs face, but enterprises would require more complicated management due to the significantly larger number of devices. Furthermore, these enterprises would need more immediate recovery to minimize downtime. To meet the critical requirements in enterprises require, we can provide the corresponding one-stop backup solution with multiple-layer protection.

Synology Advertorial Pic 3

The highly scalable 2U rack models paired with Cloud backup prove to be an optimal choice. and in consideration of the recovery time requirement, it would be great to have another on-prem NAS for disaster recovery solutions so that enterprises can utilize Snapshot Replication for instant recovery. Even for large-scale enterprises, Synology would still become the best choice with flexible data protection deployment, including on-prem, cloud, and an extra DR site.

In conclusion, while the 3-2-1 backup rule is an essential starting point, it may not be enough to meet all business backup needs. Synology offers flexible backup solutions that can help businesses achieve reliable and cost-effective backups that suit their unique needs and risks. By taking a holistic approach to backup and regularly testing backup systems, businesses can ensure that their data is secure and easily recoverable in case of data loss or cyberattacks.

Unlocking Cost-Effective Data Management Solutions with Synology

This article is contributed by Ms. Joanne Weng, Sales Director at Synology

In today’s business landscape, managing extensive amounts of data has become crucial for enterprises across various industries. Whether optimizing manufacturing operations, analyzing consumer behaviour in retail, safeguarding financial data, or dealing with rapid data growth in the media sector, the challenges of data management persist. To address these challenges effectively, businesses must seek cost-efficient solutions that offer scalability, ease of use, and robust security measures.

Banner

Synology, a leading provider of data management solutions, presents a comprehensive approach to addressing the demands of data storage and protection. Leveraging insights gained from serving over 150,000 clients worldwide, Synology offers tailored solutions that precisely meet the needs of businesses in Malaysia. Here are three crucial aspects for evaluating costs when implementing massive storage solutions:

1. Scalability: Anticipate Data Growth Patterns

Businesses must assess their current storage needs and anticipate future growth to select appropriate hardware without overspending. Synology identifies two main types of companies—those with substantial existing data or clear estimates of future storage needs for the next 3-5 years, and those with limited current data and uncertain growth rates, requiring gradual capacity expansion based on actual needs.

2. Ease of use: Prioritize Ease of Management and Software Integration

After selecting hardware to accommodate future data growth, businesses must also assess software compatibility and user-friendliness for both current and prospective IT operations and maintenance.

Synology Products

Numerous businesses opt for large-scale storage devices as their file servers or centralized data repositories for endpoint protection. These solutions necessitate diverse management features, login mechanisms, and platforms for user access or backup services. Nonetheless, not all solutions seamlessly integrate hardware and software, and some may incur additional licensing or subscription expenses, which can accumulate over time.

Synology tackles this challenge by crafting user-friendly data management and protection software applications, specifically designed to streamline the learning process for IT professionals. Furthermore, these applications come bundled with Synology’s hardware purchase, offering both budget flexibility and alternative deployment options for businesses.

3.  Robust security measures: Ensure Comprehensive Data protection

Lastly, when storing large and critical data volumes, businesses must ensure the security mechanisms to prevent breaches or loss due to accidents or malicious attacks. Synology emphasizes two key aspects: hardware availability and data protection measurements.

Businesses should consider whether the solution offers high availability mechanisms, multi-path redundancy, and support for Out-of-Band Management for remote access. Additionally, comprehensive backup solutions and advanced security features like Synology offers, Write Once Read Many (WORM) and immutable backup technology, are imperative to meet evolving cybersecurity requirements.

Toyota Motor Vietnam Selects Synology As Its Data Management Partner

The partnership between Toyota Motor Vietnam (TMV) and Synology serves as a testament to the highlighted benefits of implementing Synology’s solutions. By upgrading its data storage system to a petabyte scale, TMV enhances operational efficiency, data recovery capabilities, and system stability while significantly reducing data protection costs.

Toyota Selects Synology

“Synology’s storage solution has increased our business resilience” Mr Bui Ta Hoan, Head of Information Technology at TMV, attests to the effectiveness of Synology’s storage solution in enhancing operational efficiency and data protection. Through Synology’s technology, TMV ensures continuous production line operation, secures sensitive data and achieves substantial cost savings.

In an era driven by data, businesses in global as well as Malaysia require robust and cost-effective solutions to manage their expanding data volumes efficiently. Synology offers a comprehensive suite of solutions tailored to address the unique challenges faced by enterprises across various sectors, empowering them to thrive in the digital age.

Recognizing Third-Party Risks & Addressing the Gaps with Identity-Based Security

Enterprises and businesses are well into their digitization journey. Many have adopted digital strategies and tools that align with their businesses and goals. However, in their swiftness to adopt software and tools that enable them to be agile, many may have overlooked one of the most crucial aspects of their data security – third-party access and control. The issue arises as a result of the adoption of multiple diverse tools and technologies needed for digitization, the acquisition of contract talent, consultants and third-party support. This rings true even for Financial Service Institutions (FSIs). In a recent report, Gartner stated that 59% of organizations experienced a data breach due to third parties and only 16% of them say they are equipped to manage these risks.


Boey’s Headshot 1x1

“Today, organizations can manage up to thousands of identities which means more access points that may present significant risks. In order to mitigate the risks of breach and protect digital identities, data and resources, enterprises need a comprehensive identity security solution for complete visibility into all user types and their related access, including all entitlements, roles, and attributes, to ensure employees receive the right access to the right resources to do their job.”

Chern-Yue Boey, Senior Vice President, Asia-Pacific, SailPoint


While it can seem like a daunting task for IT departments and CIOs to get a handle on the issue, the truth is that it’s a simple task of managing access on a “just-in-time” and/or “as-needed” basis. With an increasing number of such instances, it becomes a conundrum of how to dynamically manage these permissions. One emerging approach is to manage these permissions or instances as “identities”. Using this approach, it’s a matter of mapping these identities and the data they have access to. Essentially, a holistic view of who (identities) can access what data (what), is needed. While it can be a little complicated to administer this on a dynamic level, companies like SailPoint provide turn-key solutions fortified with artificial intelligence (AI) that allow just that.

An Increasing Concern for Financial Service Industries (FSIs)

As banks and other FSIs start embracing digitization and move towards becoming digital services, we’ve seen an increasing emphasis on data security and privacy particularly when it comes to user data. However, like many other enterprises, the digital infrastructure and tools that they have in place may pose a risk when it comes to data security. What’s more, when it comes to FSIs, the consequences of poor security can result in millions of dollars of loss for both the client and the institution itself.

hands holding a smartphone with data on screen
Photo by Tima Miroshnichenko on Pexels.com

In Malaysia alone, we’ve seen an increasing number of scams and data breaches in the past 5 years. This seems to have skyrocketed during the pandemic and is not showing any signs of slowing down. In fact, in the past year alone, we’ve had breaches of large service providers like Telekom Malaysia and Maxis. More worryingly, we’ve had breaches of FSIs like Maybank and iPay88. Of course, under the watchful eye of regulators, these issues are constantly being investigated and fines are dolled out for mismanagement.


Boey’s Headshot 1x1

“The reality is a large majority of cyber security breaches today occur as a result of non-employee identities. According to a research by Ponemon, 59% of respondents confirm that their organizations have experienced a data breach caused by one of their third parties and 54% of these respondents say it was as recent as the past 12 months”

Chern-Yue Boey, Senior Vice President, Asia-Pacific, SailPoint


That said, it’s important that these institutions move from a reactive approach to a more preventative and proactive one. This change has to happen with both policy and adoption of security technologies which give CIOs and data security experts a clear view of who is accessing what data and why.

Creating A Data Secure Environment for Business

FSIs like Maybank and iPay88 may point to their apps with features like SecureKey and their implementation of one-time pins (OTPs) as potent security measures. However, as Chern-Yue Boey, Senior Vice President at SailPoint puts it, “Authentication is like giving someone the keys to your front door, but identity security is where you can control whether this person can have access to your rooms and other aspects in your home.”

What’s needed is a system that can cross-check and verify if access to the information is allowed. Mr. Boey weighs in on this, “A complete identity security strategy involves understanding, controlling, and managing user identities and access to all resources holistically, in line with authentication methods. This means building an identity security foundation to enable authentication and comprehensive identity governance.”.

close up view of system hacking
Photo by Tima Miroshnichenko on Pexels.com

Identity governance will entail creating unique profiles to manage access to data. This also entails structuring data so that it can be accessed on an “as-needed” basis. While many systems for cybersecurity do include options for Zero Trust environments, the implementation of identity management ups the ante and creates an environment where small silos of data can be made available to external users and contractors. This will enable access to data on a restricted basis and allow CIOs and IT Departments to manage data based on job function, role and levels of access.

Mitigating Risk with Identity-based Security

This is where Identity Security can play a huge role for FSIs and even other corporations. The creation of these identities limits the potential exposure even if a breach occurs. That said, in order to mitigate the risk, it falls to the C-suite executives – particularly the CIO or CSO – to understand which job functions should have access to what data. Only with this understanding can they deploy solutions like SailPoint effectively.

Having this understanding – which can be fostered at every level of management – will help mitigate risks associated with third-party workforces. In fact, it helps with a key risk: unauthorized access to sensitive data. As access becomes limited, so too do the entry points for bad actors.

person paying using her smartwatch
Photo by Ivan Samkov on Pexels.com

That said, understanding is only one part of the equation, FSIs and other organizations will need better oversight over the identities in their system and the data being accessed across the entire distributed IT ecosystem. This includes the ability to grant or restrict access as necessary. Doing this will create a perimeter of security when it comes to pertinent, sensitive data.

Maximizing Security with Informed Access

This transparency and oversight will allow for better-informed decisions as CSOs and CIOs have access to a central repository of all users – third-party or otherwise – and their relationship to the organization. This includes their job functions and the data they have access to. It helps with managing risk when it comes to third-party access. IT Departments are able to assign risk ratings to individual third-party users based on who they work for, location, access level and other parameters as set by the organization.

It also allows them to better manage the onboarding and offboarding of employees and non-employees as they enter and exit the organization. Essentially, the visibility, relationship data and governance will necessarily give rise to a lifecycle for each identity in the organization. While it may seem like a simple matter of managing the current access of users to the data, it goes further than that with identity management. It gives granular control and visibility to a CIO, CSO and IT Departments allowing them to react effectively and in a timely fashion. It also allows them to automate compliance audits with minimal manual intervention.

A Necessary Measure for Dynamism and Agility

As much as it may seem like an added layer of complications and headaches for IT departments, the shift from managing data based on access vs. through identities is the difference between being reactive and proactive. Managing data access with Identity security is a necessary measure for FSIs and organizations to remain agile in operations as well as respond dynamically to a landscape of uncertainties.

LinkedIn Breached! 500 million Accounts Compromised

It seems like this week is becoming a very worrying week for social media. Earlier this week, news broke of 533 million Facebook users having their data compromised after a data breach. The latest social media network to join the club? LinkedIn.

It looks like LinkedIn has suffered a breach similar to that of Facebook with the data of over 500 million users being compromised. The breach was first reported by CyberNews who has apparently verified the data. However, it is unclear if the data is fresh or aggregated from a breach that occurred back in 2016.

While the date of the data may be uncertain, the leaked data is a cause for concern as, similar to the Facebook data breach, the phone numbers, emails and full names were leaked. It also looks like LinkedIn IDs, links to the social media profiles, work related data and gender information was leaked.

LinkedIn has acknowledged the data leak. In a public statement, the company has said, “We have investigated an alleged set of LinkedIn data that has been posted for sale and have determined that it is actually an aggregation of data from a number of websites and companies. It does include publicly viewable member profile data that appears to have been scraped from LinkedIn. This was not a LinkedIn data breach, and no private member account data from LinkedIn was included in what we’ve been able to review.”

The news of the data breach is surfacing after a warning of possible scams involving job hunters on the social media was issued by cybersecurity experts. The scam involved fraudsters posing as potential employers who would send .ZIP files to victims purportedly containing application files. Instead, the archive contains a fileless backdoor which allowed bad actors to stealthily install malware into the PC.

LinkedIn has not indicated whether they will be contacting individuals who have been affected. However, keep in mind, that Facebook has opted not to do this. It is very likely that LinkedIn will do the same to avoid a potentially messy situation. We’ve outlined how you can check if you’ve been affected by the breach. We also advise some prudence in dealing with your data online.

533 Million Facebook Users’ Data Resurfaces Online from 106 Countries

Facebook seems to be having a row of things recently. The company initially faced humongous backlash on their implementation of data sharing policies between popular messaging app, WhatsApp, and the larger company. Now, it looks like old wounds are reopening for the company as data from a breach that happened in 2019 has surfaced on forums in hacking forums.

The breach involves over half a million users from over 100 countries with data such as their phone number, emails and even birth date. Malaysia is listed in the countries affected with over 11 million users having been compromised. The breach was first reported by Business Insider. Business Insider has also verified the data in the leak by testing password reset requests. A spokesperson for Facebook has confirmed the data breach. The person also confirmed that the data breach occurred due to vulnerability which was identified and patched back in 2019.

https://twitter.com/UnderTheBreach/status/1378314424239460352

While the data is 2 years old, the fact that it is readily available online at this point is a worrying fact. Data like birthdates, phone numbers and emails can be used to socially engineer scams. In fact, due to the phone numbers being leaked and made readily available, the likelihood in getting scams over SMS and phone calls are heightened.

Acronis Vice President of Cyber Protetction research, Candid Wuest, advises that, in light of the leak, “There is now a higher risk of SMS spam, but also password reset attacks and attacks against other services that use SMS for MFA are now more likely. Users should therefore change from SMS-based MFA service where possible for critical accounts.”

The fact that the leaker has readily made the data available for free can be puzzling. However, according Wuest, “As the leaked data does not contain any passwords or payment card details it is of less value to attackers. Furthermore, at least two third of the data was already available from previous leaks. It is not uncommon to see such data sets being made available for free, as they would not yield much profits on underground site. Such large data sets tend to not stay private for very long anyway.”

The new leak brings into the spotlight the amount of personal data we have available online and especially on social media. It also brings into question Facebook’s privacy policies which govern and protect data stored on their service. What’s even more worrying is the fact that Facebook wasn’t the notifying users, instead, the leak was reported by twitter user Alon Gal who has since been looking at and verifying the data leak. Facebook has only confirmed the occurrence of the breach and has not even notified users that were affected.

Nintendo’s Security Breach Could be Worse than Initially Reported

Earlier in April, Nintendo announced that it had experienced a security breach when it came to user Nintendo Accounts. The breach was initially pinpointed to those who had used their legacy Nintendo Network ID (NNID) to sign in to their Nintendo Switch. In their initial announcement, the company noted that there were about 160,000 accounts that were affected, but, now, weeks later, the number of accounts has nearly doubled to 300,000 accounts. Nintendo attributes this increase to the investigation that it has undertaken in light of the initial detection.

The issue came to light when an increasing number of users on the switch reported that their accounts were being used to make purchases that owners were not aware of. If you have a credit card or Paypal account linked to your Nintendo account, it would be prudent to check the transactions that have been done on the account in the past weeks. Users who have been compromised are also getting sign-in notifications from unknown devices via email.

Nintendo of America tweeted for users to activate their two factor authentication (2FA) for logins out of the blue prior to the initial announcement. However, with the increase in the number of accounts being compromised, it is increasingly more evident that if you have a Nintendo Account, you’d best reset your password and activate 2FA. Otherwise, you’re risking unauthorised purchases via your linked credit card or Paypal account. In addition to unauthorised purchases, sensitive data such as date of birth and more can be viewed by bad actors.

Nintendo’s latest console, the Nintendo Switch, has put the company on the map again as a serious contender in the gaming console market with over 5 million consoles sold to date. The company is sticking to its guns saying that less than 1% of its users are affected. However, with investigations ongoing, users are advised to take precautions.

[Podcast] Tech & Tonic Special : Sitdown with Alex Tan of HID International about Biometrics and Security

In this special, we sat down with Mr. Alex Tan, the Director of Sales for the ASEAN Region for Physical Access Control Systems from HID Global. We had a conversation about some of the emerging trends in the industry on the use of biometrics and security. One of the biggest issues we discussed was the use of biometrics and its implications on personal data privacy and security with the emergence of legislations such as the GDPR (General Data Protection Regulation) in the European Union and Malaysia’s own PDPA (Personal Data Protection Act). The issue brought us to talking about how personal technological devices can be a security risk with how they handle data collected by facial recognition and fingerprint reading technologies.

Mr. Alex Tan heads the strategic developmental and organisational growth of HID Global’s Physical Access Control business within the ASEAN Region. He has been in the security access control industry for about 19 years and has, prior to this, headed the sales and entreprise solutions at another leading access control manufacturer.

HID Global has over two decades of expertise in the security industry. The American company has its roots in radio frequency identification technologies and has over the years become a recognised brand when it comes to premise access and security as well as biometric technologies. You may recognise the company’s logos from the many devices and solutions it provides to buildings and businesses across the world. They may even be responsible for keeping you safe in your apartment building!

Take a listen to the podcast and let us know if you still have any unanswered questions when it comes to biometrics and personal data protection in the comments down below.