<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.jp/blogs/tag/finance-industry/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Finance Industry</title><description>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Finance Industry</description><link>https://www.brocent.jp/blogs/tag/finance-industry</link><lastBuildDate>Mon, 20 Oct 2025 20:24:48 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Protect Organization Data against Adrozek]]></title><link>https://www.brocent.jp/blogs/post/adrozek_protection</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/it security/ADROZEK_DISTRIBUTION.png"/>Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020;]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_kG2O2-KwS2--LX0VqLmbxA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_z30tSiQeQfSah0AdBArsDA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_v7PE9fmGSZeI4lg7Oc_ETw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_P9tiKwyBSu2WXLPvPeVIXg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;"><span style="font-size:36px;">Protect Organization Data against Adrozek</span></span></h2></div>
<div data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_GJ91LFh1T3e6Iy8nWhK2ZQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:18px;">Adrozek is a malicious browser modifier that, when installed on users’ machines, infects them with adware. This particular strain of malware has been making rounds since May 2020; according to Microsoft, it was at its peak in August, when as many as 30,000 computers were affected per day. Although classified as adware, Adrozek is also designed to collect information extracted from browsers by modifying browser settings and extensions. It affects Google Chrome, Microsoft Edge, Mozilla Firefox, and the Yandex browser. Considering the risks Adrozek poses to organizations, IT admins need to take some preemptive measures to ensure security.</span></span><br></p></div>
</div><div data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_Xy8kp3p0ThpCf5Epch7qzw"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/it%20security/ADROZEK_DISTRIBUTION.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_Ak5QMzYKRPJnWsjNX4iMNg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How does Adrozek affect your organization?</span></span></h2></div>
<div data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_PkVv9qoQ1E50xF8n20tGvg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="text-align:justify;"><span style="color:inherit;"><span style="font-size:18px;">Adrozek is being distributed through drive-by attacks, where users are tricked into installing the malicious software, often bundled with or disguised as legitimate software. Once installed, it makes a number of modifications to browser settings and extensions. Adrozek disables browser updates and turns off Safe Browsing, which is a feature designed to prevent users from landing on malicious websites. It then installs and activates new browser extensions that run in incognito mode; these extensions run without explicit user permissions, and are hard to notice since they aren’t displayed in the toolbar. These modifications help the malware inject users’ search engines with ads. In certain browsers, the malware further steals users’ credentials. When users access enterprise web applications on the infected browsers, the organization’s data security is at risk.</span></span><br></p></div>
</div><div data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_KezIhUphVG5WGWnxbc_ZOg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><span style="color:inherit;"><span style="font-size:18px;font-weight:700;">How to protect your organization against Adrozek</span></span><br></h2></div>
<div data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_2fU12Q6mLG0kHU28b4rZxQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p style="margin-bottom:30px;font-size:18px;">It’s always better to be safe than sorry. IT admins can implement a stringent yet foolproof, three-step preventive mechanism to help secure their organizations against Adrozek.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Restrict users’ access to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">Implement URL filtering software to prevent users from accessing websites that are unauthorized by the IT teams. This ensures that users don’t land on infected websites, preventing the installation of malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Limit downloads to trusted websites</em></span></p><p style="margin-bottom:30px;font-size:18px;">While step one eliminates the chances of users installing the malware, limiting downloads to trusted websites creates an additional layer of security, preventing it from being downloaded in the first place.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>3. Restrict execution of untrusted applications</em></span></p><p style="margin-bottom:30px;font-size:18px;">Restricting the execution of untrusted applications will prevent Adrozek from running if it’s present in the enterprise network. This final step creates a fortified boundary, preventing the execution of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="color:rgb(0, 0, 0);">BROCENT Managed IT Security Service (MSS) to implement these three-fold preventive measures. In case users’ machines are already infected with Adrozek, IT admins can implement a few best practices to limit the damage.</span></p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>1. Deploy browser configurations to users’ browsers</em></span></p><p style="margin-bottom:30px;font-size:18px;">Browser configurations and behavior can be managed from a central location with the managed antivirus console. Configurations deployed&nbsp; cannot be overwritten by users, nor by Adrozek. For example, deploying a configuration to enable browser updates will prevent the malware from modifying the setting. Similarly, BROCENT support center can enable the Safe Browsing configuration, ensuring that Adrozek cannot disable it. This will minimize the impact of the malware.</p><p style="margin-bottom:30px;font-size:18px;"><span style="font-weight:700;"><em>2. Restrict installation of new browser extension and add-ons</em></span></p><p><span style="color:inherit;"></span></p><p style="margin-bottom:30px;font-size:18px;">IT admins can restrict the installation of new extensions and add-ons. This will prevent the malware from installing new extensions capable of injecting ads and stealing credentials. To prevent loss of productivity that could arise from lack of extensions, mission-critical extensions and add-ons can be distributed to users’ browsers BROCENT managed network behavior management console.</p></div>
</div><div data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_FErr3wMguDa9CVXOA3y-RQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/it%20security/adrozek_cn.png" size="original" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 17 Feb 2021 04:00:28 +0000</pubDate></item><item><title><![CDATA[Smart Hand? Yes, Quality IT Support in Hong Kong]]></title><link>https://www.brocent.jp/blogs/post/Smart-Hand-Yes-Quality-IT-Support-in-Hong-Kong</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/Photoset/pexels-cleyder-duque-3821384.jpg"/>Hong Kong team completed one more SMART work -- Deployment of Palo Alto firewalls. Stack &amp;Rack, Cable connection &amp;Dressing, Configuration and ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_ZFdzrpwjSh2m6MkwL1uMgg==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ORYCk5TrRdSQfIT3G75Llg==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_6m3HXnD9TtKpM24JK2yUQQ==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ZmKfjJqwSca7m7A6jF5jmg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif" size="3">Hong Kong team completed one more SMART work -- Deployment of Palo Alto firewalls. Stack &amp;Rack, Cable connection &amp;Dressing, Configuration and Change-over. At this moment, we had both Speed and Quality. Congrats to the team!!</font></p></div></div>
</div><div data-element-id="elm_xK9IHel0P4L4RBRHYRV8-w" data-element-type="box" class="zpelem-box zpelement zpbox-container zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_xK9IHel0P4L4RBRHYRV8-w"].zpelem-box{ border-radius:1px; } </style><div data-element-id="elm_jYvkYKND7dzslwVTYgNlpQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_jYvkYKND7dzslwVTYgNlpQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-medium zpimage-tablet-fallback-medium zpimage-mobile-fallback-medium hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/network.png" size="medium" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 13 Nov 2017 13:58:23 +0000</pubDate></item><item><title><![CDATA[IT Services Market Research Report CHINA 2015]]></title><link>https://www.brocent.jp/blogs/post/IT-Services-Market-Research-Report-CHINA-2015</link><description><![CDATA[Industry Analysis &amp; Industry Trends Driven by the growth in IT investment and of China's information sector, revenue for the IT Services industry h ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_2WZ7b4TxQ0uX85el4h9IoA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_XP5_REgTSZ-llCzYUgIAYQ==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_uhQynznjSBufzdaq2K1W8A==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_xw2WrADRSsSfs7Qxf6X4uQ" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Snip20151116_7.png" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_jNGOdQsyRomkphJcsILuKA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><span></span></p><div style="font-size:12px;"><div style="font-size:10pt;font-weight:bold;margin-bottom:5px;">Industry Analysis &amp; Industry Trends</div><p style="font-size:10pt;margin-bottom:10px;width:613px;">Driven by the growth in IT investment and of China's information sector, revenue for the IT Services industry has been growing at an annualized rate of 6.3% over the past five years. In 2014, revenue is expected to total $111.7 billion, up 7.1% from 2013.</p><p style="font-size:10pt;margin-bottom:10px;width:613px;">Although the IT services industry in China has a short history, it has been expanding quickly. However, it still only absorbs about 20.0% of China's total IT investment; in most developed countries the share is about 40.0%. That means there remains significant growth potential.</p><p style="font-size:10pt;margin-bottom:10px;width:613px;">The industry's outsourcing and offshoring service segment experienced the fastest growth in the past five years, bolstered by strong government support.</p></div><div style="font-size:12px;"><div style="font-size:10pt;font-weight:bold;margin-bottom:5px;">Industry Report - Industry Products Chapter</div><p style="font-size:10pt;margin-bottom:10px;width:613px;"><b>System integration</b></p><p style="font-size:10pt;margin-bottom:10px;width:613px;">System integration services are the largest sub-segment within the professional services segment, generating an estimated 27.0% of industry revenue in 2014. Due to China's rapid economic development, system integration services grew rapidly in the years prior to 2005. Since 2006, however, growth has slowed due to declining prices and weaker demand from the financial sector.</p><p style="font-size:10pt;margin-bottom:10px;width:613px;"><b>Network services</b></p><p style="font-size:10pt;margin-bottom:10px;width:613px;">Network services are offered to enterprises of various sizes and include setting up local networks, website design and e-mail services. Demand for network services from small and medium enterprises has been steadily increasing in the past five years. Revenue in this segment accounts for about 30.0% of industry revenue</p></div><p></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 16 Nov 2015 14:00:55 +0000</pubDate></item></channel></rss>