src='https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2513966551258002'/> Rightways: malware Infolinks.com, 2618740 , RESELLER

Pages

Share This

Showing posts with label malware. Show all posts
Showing posts with label malware. Show all posts

Thursday, August 1, 2024

SAFEGUARDING DATA IN M’SIA’S NEW ERA OF E-INVOICING

Vast potential: Digitalisation boosts growth and efficiency, but adopting strong cybersecurity measures and secure software can protect data, systems and customers. Image: Blake Wisz / Unsplashed

AS THE roll out for Malaysia’s e-invoicing mandate draws near, small businesses around the country are embarking on their digital transformation journeys.

In doing so, they unlock numerous benefits such as increased efficiency and productivity and improved customer engagement, while becoming more competitive and resilient.

This digital shift however, can also introduce significant data and security risks.

Understanding these risks is crucial to protect businesses, their data and their customers.

Data breaches and other online crimes, including hacking and financial fraud, can have disastrous effects on businesses, such as the exposure of sensitive customer information, intellectual property theft and the disruption of business operations.

These breaches in security can result in significant losses for companies, sometimes amounting to millions of ringgit.

Additionally, small businesses, often the targets of cyber-attacks because they are seen as more vulnerable, may lose valuable consumer trust and potential opportunities.

Ahead of the phased mandate launch in August, business owners can ensure they are fully prepared by understanding the key advantages and risks of e-invoicing, and take proactive measures to safeguard their business.

Security first: Cyber threats are increasingly complex and widespread. Small businesses can protect sensitive data by choosing reputable software with strong security.Security first: Cyber threats are increasingly complex and widespread. Small businesses can protect sensitive data by choosing reputable software with strong security.

Security benefits and e-invoicing considerations

Despite the risks, the shift towards e-invoicing is certain to offer businesses numerous immediate and tangible benefits.

Enhanced efficiency, reduced errors and improved transparency in financial transactions make e-invoicing more secure than manual handling and traditional invoicing practices.

With oversight from the Malaysia Digital Economy Corporation (MDEC), e-invoicing is tracked through the Peppol framework and verified in real-time, providing an additional layer of security and accountability.

Verification through Peppol ensures that invoices are authentic, preventing fraud and alterations.

This standardised network facilitates the secure and efficient exchange of electronic documents, protecting them from cyberattacks and potential data breaches.

Choose a reputable software provider

As Malaysian businesses look to adopt solutions that will enable them to comply with the upcoming mandate, prioritising reputable software providers to ensure data, privacy and security protection cannot be overstated.

In today’s digital landscape, cyber threats are pervasive and increasingly sophisticated, targeting vulnerabilities in businesses of all sizes.

By choosing established software providers known for robust security measures, small businesses can protect sensitive customer information and internal data from breaches and theft.

Reliable software providers offer regular updates, advanced encryption and compliance with regulatory standards, ensuring that businesses remain resilient against evolving cyber threats.

Additionally, this proactive approach fosters customer trust, as clients are more likely to engage with businesses that prioritise their privacy and data security.

Xero, for example, adheres to stringent security standards and compliance requirements to effectively safeguard user data.

By incorporating multi-factor authentication (MFA), user accounts and financial data remain secure and protected while Xero’s encryption protocols prevent unauthorised data access, safeguarding it from cyber threats.

With a global presence, including in countries such as the United Kingdom, United States, Singapore, Australia and New Zealand, Xero maintains a high level of cybersecurity features and compliance measures to meet regional and international standards.

The accounting platform currently supports many local businesses in streamlining processes and improving data security.

Additional precautions

In addition to leveraging the security features of cloud accounting software like Xero, Malaysian businesses can take extra precautions to safeguard their accounting data. This includes:

> Paying attention to security notices: staying informed about security alerts and notices from software providers to promptly address emerging threats.

> Reporting unusual activity: encouraging employees to report any suspicious or unusual activity related to accounting data to prevent potential security breaches.

> Deploying antivirus and anti-malware solutions: installing reputable antivirus and anti-malware software on their devices to protect against potentially malicious software.

There is no question that digitalisation presents enormous opportunities for growth and efficiency for small businesses, but with that, come some critical security risks.

By adopting cybersecurity measures and choosing software with robust protection features, small businesses can safeguard their data, systems and customers.

Proactive security management not only protects against financial losses and reputational damage but also builds trust with customers, fostering long-term business success.

Source link 

E-invoicing system set to go


PETALING JAYA: With two days to go, most of the 5,000 companies under Phase 1 of the e-invoicing rollout are raring to go and looking at a smooth takeoff, say stakeholders.

Associated Chinese Chambers of Commerce and Industry of Malaysia treasurer-general Datuk Koong Lin Loong said these companies, with an annual turnover of RM100mil and above, should not face any major hiccups when transitioning to e-invoicing on Thursday.

“They will be able to cope with the transition as these companies have the resources to do so,” he said when contacted yesterday about worries some businesses have expressed about beginning the e-invoicing process.

Asked if accounting firms acting for these companies are facing pressure in switching to e-invoicing, Koong, who is a practising auditor and licensed tax agent, said that it is unlikely.

ALSO READ: How e-invoicing affects you

“There is some misunderstanding that e-invoicing is like the Goods and Services Tax (GST), which required some companies to change their entire accounting system.

This is not the case with e-invoicing because companies are already generating invoices through email and their existing computing systems. The only difference is that their invoices will now be digitised and linked to the Inland Revenue Board (LHDN),” he added.

Koong also said that it is quite normal for businesses to express worries whenever a new system is introduced, like mobile phone and QR code payments, for instance.

ALSO READ:‘There’s time for smaller companies to learn the new system’

“There would have been a lot of complaints prior to the Covid-19 pandemic (in 2020) if businesses had been asked if ewallets could be used to make payments. They were practically non-existent.

“But nowadays such payments are widely accepted even among smaller businesses and hawkers,” he said.

Experts say the pandemic greatly sped up digital payments globally, as, for a few years, people were living mostly online.

ALSO READ:LHDN announces six-month grace period for einvoicing implementation

When it comes to e-invoicing, the driving force is efficiency in collecting taxes and stopping leakages to increase the government’s tax revenue. To further ensure a smooth transition, Koong said the LHDN has announced some flexibility and relaxation of e-invoicing regulations.

For instance, there will be no prosecution action under Section 120 of the Income Tax Act 1967 for non-compliance with e-invoicing rules, provided the business complies with consolidated e-invoicing requirements.

This means the supplier can gather all statements or bills issued and then issue a consolidated einvoice as proof of the supplier’s income, according to einvoicemalaysia.my.

ALSO READ:Are you ready for e-invoicing starting Aug 1?

Koong added that the LHDN is planning to roll out an e-invoicing mobile app and e-POS (electronic point-of-sale) system by the end of this year, free of charge for businesses to download.

Phase 2 of the e-invoicing system will be implemented on Jan 1, 2025, for companies with a turnover of below RM100mil and up to RM25mil, while full implementation under Phase 3 will begin on July 1, 2025, for businesses with an annual turnover of above RM150,000.

Malay Chamber of Commerce Malaysia secretary-general Ahmad Yazid Othman said most Phase 1 companies are ready, although some may still be facing some difficulties, especially smaller businesses that serve the larger companies under the Aug 1 rollout.

He added that companies are expecting to run into teething problems just as they did when the GST was first implemented in April 2015.

ALSO READ:The e-invoicing dilemma

“The LHDN has given its assurance of some flexibility and relaxation of regulations during the initial implementation period, and this is most welcome.

“We hope that companies will not delay implementing e-invoicing with these assurances, which will at the same time motivate other companies to speed up the transition process when their turn comes,” he said.

Ahmad Yazid, who is also a senior fellow with the Malay Economic Action Council, said the experience gained from Phase 1 of the e-invoicing process will be helpful for both the LHDN and businesses to better prepare for the coming phases next year.

Source link 

Related stories:

How e-invoicing affects you

‘There’s time for smaller companies to learn the new system’

LHDN announces six-month grace period for einvoicing implementation

Are you ready for e-invoicing starting Aug 1?

Microenterprises unprepared for e-invoicing, says Wee

The e-invoicing dilemma

Navigating e-Invoicing for SMEs

Over 5,000 applications for MyInvois access ahead of Aug 1 rollout, says LHDN

New accounting software not needed for e-invoicing

Related posts:

Planned e-invoicing will be troublesome


The e-invoice conundrum dilemma

Wednesday, August 30, 2023

When malware strikes


Knowing what to do can be the difference between a costly trip to the repair shop and a diy fix at home.

MANY of us have been there before – an accidental click or file download that leaves us worrying about whether our passwords have been stolen or our webcam has been compromised.

Or maybe it’s the system becoming slow, erratic, freezing, or crashing, which may hint that something strange is going on with your machine.

But hiring a professional can be an expensive affair, and lugging around an entire desktop computer for troubleshooting is anything but fun, so it’s best to check if you can fix the issue yourself.

Those on Windows 7 or 8 should take note that their operating system (OS) is in end-of-life status, making it especially vulnerable to malware as it no longer receives security updates.

Antivirus 101

One thing to keep in mind is that no antivirus or anti-malware tool is perfect, as one may detect a virus while another misses it completely.

Like seeing a doctor, it’s valuable to have a second opinion in the form of another software scanner. Good options include Malwarebytes, Avast Antivirus, and antivirus programs from Kaspersky.

However, the first thing you’ll want to do is download Rkill (bit.ly/rkill), a handy tool from Bleeping Computer that kills malware still resident in memory and running in the background, also known as “processes”. It will also list them in a text file.

This is vital, as active malware can attempt to trick and hide from antivirus programs.

Then do an antivirus scan – don’t use more than one at the same time, as simultaneous scans can result in the antivirus programs mistaking each other for malware.

If the scans turn up positive, potentially malicious items will be listed, and the antivirus will prompt you on what action to take, such as to quarantine or remove the affected file or folder.

It’s best practice to look up the name listed by the antivirus, as it could be a false positive.

Then switch over to the alternative antivirus tool and run another scan to cover blind spots.

If the antivirus discovered an issue and fixed it, then all is well; otherwise, you will have to get your hands dirty by engaging in a little “digital forensics”.

‘Suite up’, digital detective

Your digital forensics work will require a toolkit to analyse and understand your computer better, especially what’s causing the issue.

Our recommendation is the Sysinternals Suite (bit.ly/sysinternalssuite), a set of utilities from Microsoft that provides a detailed view of what each and every program and process is doing.

Like Rkill, Sysinternals is meant to do the same, except that you will be the one identifying, disabling, and removing the malware manually.

One of the most useful tools it contains is the Process Explorer (procexp64.exe in the Suite folder), which lists all the active processes in a system, one of which could be malware.

In Process Explorer, click on the options tab and enable the options for both “Verify Image Signatures” and “Check Virustotal.com”.

Things to look for here are processes without descriptions or verified image signatures from a third-party vendor to indicate it’s a legitimate program.

The description and signature columns may turn up blank for some Windows processes, so ignore those and focus on the ones labelled “unverified”.

Virustotal.com is a website that collates information from 75 different malware-scanning engines because, you know, who needs a second opinion when you can get 75?

If a process is legitimate, then it should have a proper description, a verified image signature from a third-party vendor (like Microsoft or Adobe), and not be flagged by any of the antivirus engines (0/75).

A side note: users looking to check if a specific file is malware can also upload it directly to Virustotal.com, though the size is limited to 650MB.

Make sure to look up each process to find out more about it before taking action, as there are many different types of malware out there, with some being more difficult to remove. There’s a shortcut to searching online included in the right-click menu to help with this. Process Explorer can also be used to uncover processes that are utilising the resources of your graphic card, RAM, and storage.

For a more granular view of what a process is doing, the Process Monitor (Procmon64.exe) tool includes details like where a process is writing a file and whether it’s making a network connection to upload something.

Do note that it is still not immune to false positives. Two of my legitimate processes are always flagged by Virustotal: Apagent.exe (for an Apple Airport Router that was repurposed as network attached storage) and Gaming services. exe (an official process from Microsoft for its video game platform and store).

When a malicious process is discovered, right-click and view its properties, which will reveal details like how it is being launched and where the file is being stored.

Like with Rkill, you will need to kill the malicious process, though some malware types run multiple processes at once so that they can restart each other as you kill them.

In this case, it’s best to “suspend” the target processes first before terminating them.

Then move on to the Autoruns (Autoruns64.exe) tool to disable it from starting up automatically when the machine turns on.

Avoid deleting the entry right away since it could be a misidentified process; instead, disable it first to confirm it is indeed malware.

Once sure, navigate to the folder hous usually ing the malware – these are “user folders” like Temp or Appdata, as administrative rights are not required for malware to access them – and delete the source file to end your woes.

Though, for more complex malware, manual removal may be difficult or downright impossisure ble, so make to check what is involved.

In the worst scenario, case there’s always the nuclear option of doing a clean install of Windows, but this will wipe out your entire system.

Source link

Related post:

DIGITAL WAVE of deception

DIGITAL WAVE of deception