<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.jp/blogs/tag/retail-industry/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Retail Industry</title><description>Managed IT Services ASIA - China, HK, Singapore, Taiwan, Japan | Break Fix, Remote Support - Blog #Retail Industry</description><link>https://www.brocent.jp/blogs/tag/retail-industry</link><lastBuildDate>Mon, 20 Oct 2025 20:24:46 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Nation wide IT Field Service Dispatching China]]></title><link>https://www.brocent.jp/blogs/post/Enter-your-post-title4</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jp/files/kwun%20tong.JPG"/>Daily journey - Dispatching &amp;Delivering Field Service in 6 Cities. It starts with a busy day, believe the whole team will run till midnight today. ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_gbaJIG49TKyPG7ZinFjznQ==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_GMtlozjpRTqZSSAoAxMRpQ==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Qz3IS97xTYOWPmjQAhXvPA==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_hNepwAjZR-uHJ1H7yKJsHw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif">Daily journey - Dispatching &amp;Delivering Field Service in 6 Cities. It starts with a busy day, believe the whole team will run till midnight today. Wish all the best to all zone team members</font></p></div></div>
</div><div data-element-id="elm_6u4ycToGQwe2VEoShYTR5g" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif"><b>09:00 A.M - Hong Kong, Kwun Tong | Troubleshooting on Server Controller</b></font></p></div></div>
</div><div data-element-id="elm_WY9Flm1GQYa3UqjT08dMYA" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/kwun%20tong.JPG" size="original" alt="IT Support in Kwun Tong" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_Nuo4vkT_RqqGWBLBPuaOvg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif"><b>11:30 A.M - Changchun City | UPS Survey</b></font></p></div></div>
</div><div data-element-id="elm_Ap-SQQodQzeeQiIbr1ii2g" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Capture%20(2).JPG" size="original" alt="Changchun IT Support" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_X2Jx-Zd4RrW7OsaURb6lAA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><b><font face="Arial, Helvetica, sans-serif">12:20 A.M - Nanning City, Guangxi Province | UPS Survey</font></b></p></div></div>
</div><div data-element-id="elm_M9saThLER6O74fm3e9USEw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><b><font face="Arial, Helvetica, sans-serif">13:20 P.M - Shanghai City, Network troubleshoot in Data Center</font></b></p><p><b><font face="Arial, Helvetica, sans-serif"><br></font></b></p></div></div>
</div><div data-element-id="elm_E3GEgvsDSaOaXOWtmwWW1w" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Capture%20(3).JPG" size="original" alt="Shanghai IT Support" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_CTSSRDb3RBi6nee7eJFRQg" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif"><b>14:10 P.M - Beijing City, Fortigate Firewall Power Adapter Replacement</b></font></p></div></div>
</div><div data-element-id="elm_R9lfAb7fSgSxvG0H4V5UKw" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Capture.JPG" size="original" alt="Beijing IT Support" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_IL3KiP8HS3C0p6LlRLUEPw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><b><font face="Arial, Helvetica, sans-serif">14:12 P.M - Guangzhou City, Installation of new Network Device</font></b></p></div></div>
</div><div data-element-id="elm_gzljxytuTb6ER_FmUVkxXg" data-element-type="image" class="zpelement zpelem-image "><style></style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/Capture%20(1).JPG" size="original" alt="Guangzhou IT Support" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div><div data-element-id="elm_lwWJbimDRpaD_aX0QGMpMQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p>Your content goes here...</p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 14 Nov 2017 06:44:05 +0000</pubDate></item><item><title><![CDATA[Application Resumed Within one Hour]]></title><link>https://www.brocent.jp/blogs/post/Application-Resumed-Within-one-Hour</link><description><![CDATA[Client - A famous Sports Wear Manufacturer reported &quot;System Down&quot; and requested for an immediate onsite intervention to rectify the halted s ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_o-V1gZhFR_ChFYQK0PUsNA==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_i-iY9m2nQQSIfK7dVwX_mg==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_HhL74oRgTrCPRbIkaUkVwA==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_CNSUfi65QWSsZBpfirucOA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align- " data-editor="true"><div><p><font face="Arial, Helvetica, sans-serif">Client - A famous Sports Wear Manufacturer reported &quot;System Down&quot; and requested for an immediate onsite intervention to rectify the halted system. The CCNP certified engineer from Brocent hypercare team is dispatched to the site, and again incident was resolved within 15 mins.... Not a problem from switch, or router but copper cable was disconnected mistakenly on patch panel by end user...</font></p><p><font face="Arial, Helvetica, sans-serif"><br></font></p></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 12 Nov 2017 14:01:40 +0000</pubDate></item><item><title><![CDATA[Security rules for SMBs to follow]]></title><link>https://www.brocent.jp/blogs/post/Security_SMB</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.jphttps://images.unsplash.com/photo-1521737711867-e3b97375f902?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MXw0NTc5N3wwfDF8c2VhcmNofDE2fHxvZmZpY2V8ZW58MHx8fA&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=1080"/>While small businesses lack the big budgets of their enterprise counterparts, that doesn’t make security any less of an issue for SMBs. In fact, small and medium businesses are more and more often the target of cyber criminals precisely because they generally have fewer security measures in place.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_I3Xdo0KRQ3ihK575r3mToQ==" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_ziZfwZ0FQyyZkIABCePfIQ==" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_eHROTtAfSM68h54s9uDFXQ==" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_JTegZIzNR9i2Yx525Ia_Sg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JTegZIzNR9i2Yx525Ia_Sg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align- " data-editor="true"><p><span></span></p><div><p></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">While small businesses lack the big budgets of their enterprise counterparts, that doesn’t make security any less of an issue for SMBs. In fact, small and medium businesses are more and more often the target of cyber criminals precisely because they generally have fewer security measures in place. So to ensure your business has enough security to stay protected, here are a number of rules every SMB should follow to keep themselves secure.</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Recognize where your most critical data lies</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">Is it in the cloud? Hard drives? Backup disks? Mobile devices? Whether or not you have the budget and resources to adequately secure all of your data, the critical data that your business relies on must be sufficiently secure. If you’re unsure of what that is, ask yourself which data you would need to access within 24 hours of your business suffering a major disaster, in order to ensure your operations remained up and running. Once you’ve answered this question, talk with your IT managers to determine the security measures that need to be implemented to protect your most vital data.</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Learn the basics</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">After you’ve bulletproofed your critical data, it’s time to arm your network with the basics. If you haven’t already done so, ensure that you have anti-malware protection on servers and endpoints, and firewalls for both wireless and wired access points.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">If you have the budget, it’s worth seeking outside counsel from an IT expert fluent in today’s security best practices. They’ll ensure your business is protected from the latest cyber threats. However, if you don’t have the budget, then it’s time to take matters into your own hands. Read up on security trends, join technology networking groups, and ask your fellow business owners about their own IT security policies.</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Cash a reality check</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">Bad things happen to nice people. Tornadoes, fires, thieves, and faulty technology couldn’t care less about how your business donates to local charities and supports your community’s youth sports clubs. What’s more, hundreds of small businesses across the country suffer severe data loss each year. Ignorance and turning a blind eye will not protect you, so make a wise decision and automate your data to be backed up daily. This allows your business to remain in operation if you’re hit by a security breach.</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Dispose of old technology properly</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">Whether it’s a computer, server or tablet, any device that stores data on it must be properly disposed of when it conks out. Specifically, the hard disk must be destroyed completely. And remember, proper data disposal is not only limited to technology, as critical information is also revealed on paper files. So if you’re migrating the content of physical documents to the cloud, make sure to shred the paper versions too.</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Mind your mobiles</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">The mobile age is here, and along with it come employees who may access your business’s critical information via their smartphones, tablets and other mobile devices. Recognize that many of these devices have different operating systems that require varying security measures. You and your IT manager should be aware of this, which leads to our last point...</span></p><h3 style="margin-bottom:10px;"><span style="font-size:15px;color:rgb(0, 0, 0);">Think policy</span></h3><p><span style="font-size:15px;color:rgb(0, 0, 0);">Have a policy for all your company’s devices. If you don’t inform your employees they shouldn’t access company information via their phones or tablets, then they’ll likely assume it’s okay to do so. But<i>&nbsp;thinking policy</i>&nbsp;doesn’t pertain only to mobiles. You should also determine acceptable online behavior for your employees, as well as how data should be shared and restricted. Put this in writing, and then have your employees read and sign it.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Of course, it’s not always wise to be overly restrictive. Rather the point is to have policies in place and make everyone in your organization aware of them because if you don’t each staff member will make up their own rules.</span></p><p><span style="font-size:15px;color:rgb(0, 0, 0);">Are you concerned your business’s security isn’t up to par? Need the guidance of a seasoned IT provider who specializes in security? Talk to us today.</span></p><p></p></div><p></p></div>
</div><div data-element-id="elm_96ZNN3dJRa2m-Cf8qpArYQ" data-element-type="image" class="zpelement zpelem-image "><style> [data-element-id="elm_96ZNN3dJRa2m-Cf8qpArYQ"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="size-original" data-size-mobile="size-original" data-align="left" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-left zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/files/it-security-banner.png" size="original" data-lightbox="true"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content"></span></figcaption></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 11 Nov 2015 14:41:08 +0000</pubDate></item></channel></rss>