Know the Phishing Term and How to Avoid Attacks

Know the Phishing Term and How to avoid attacks

Phishing, which is a form of cyber-attack based on social engineering, is a top security risk for organizations today. Phishing techniques range from mass blasting emails and text messages to targeted attacks against individuals with very valuable information. Phishing attacks can be via email, text messages, social media posts, voice communications, and other media. Often, the content contains links to fake websites designed to trick into revealing sensitive information such as usernames, passwords, account numbers, banking details, and credit card details.

Fake websites play an important role in phishing exploits, impersonating legitimate websites of trusted companies to instill trust in potential victims. Almost all organizations that use email, SMS, instant messaging, social media, or even voice communication are potential victims of phishing. In the past, attackers sent thousands or millions of phishing emails in hopes of ensnaring a few victims. The last few years have seen a shift to more targeted techniques such as spear phishing and voice phishing (vishing).

Today, phishing attacks are increasingly targeting executives, both because their contact information is often publicly accessible, and they tend to have valuable data. Cybercriminals then use stolen email credentials from executives to send seemingly authentic messages asking their staff or employees to transfer some money to offshore accounts or commit other types of fraud. This is one example of the modus operandi of phishing need to include three main components:

  1. Cybersecurity awareness and training, or training and awareness of cybersecurity
  2. Email security or email security
  3. Web address filtering, or filtering website addresses.

To prevent successful phishing attacks, the following actions are strongly recommended:

  • Conduct programs for security awareness and cybersecurity training for employees and continue to measure their effectiveness.
  • Security with Secure Web Gateway (SWG) devices that can detect web attacks with URL filtering techniques, visibility, and inspection of data traffic both Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
  • Ensure that email security systems are validated by independent third party testers
  • Inform employees immediately upon detection of a specific phishing exploit
  1. Cyber security awareness and training

Are some of the main areas that security leaders need to evaluate in evaluating their cyber security awareness program, including:

  • Define metrics for behavior change such as number of help-desk tickets related to security issues and users experiencing phishing schemes
  • Surveys or quizzes on employees to measure motivation, abilities, and triggers to find out what employees actually know and how much they tend to act on that knowledge.
  • Repeat surveys periodically to measure trends

     2. Email Security

Email security tools must provide three basic capabilities to stop phishing attacks:

  • Ability to cope with the risks posed by the ever-changing and accelerating threat landscape
  • Ability to help organizations move from a reactive security posture to a more proactive security posture
  • Provides measurable Return on Investment (ROI) information

3. Web Address Filtering (WAF)

With Web Address Filtering (WAF) or website address filtering, it will limit access to web addresses based on a database of known information about a particular website. The WAF solution will allow access to sites that are known to be safe (white-list) or prohibit access to sites that are dangerous because they contain phishing and malware attacks (black-list). And because of the dynamics of malicious websites, the solution from top-tier WAF tools of course uses machine learning methods and threat intelligence subscription services to stay up-to-date.

Increase Efficiency & Effectiveness of Your Company’s Performance with AUTO-ID Solutions

In facing increasingly competitive business competition, the development of information technology has a huge impact on competitiveness with other companies. So that the company can compete, the company must constantly follow the development and advancement of information technology. One of the advantages of company competitiveness is effectiveness, efficiency and productivity. The purpose of implementing information technology for companies is to obtain a value chain from information technology that is useful in all aspects of the business oriented towards increasing the effectiveness, efficiency and productivity of employees and the company.



Employees / workers are valuable assets and resources for every company where they work. Managing human resources in the right way is very important to carry out the company’s operational activities. How can workers in the field work more productively? Of course they need to be equipped with technology that can support their performance.

One of the information technologies that support their performance in the field is Auto-ID technology and the Auto-ID solutions include BarCode, RFID (Radio Frequency Identification) solutions to Mobile Computers/Handheld Computer/Portable Computer (Handheld Computers). With a handheld computer, it allows someone to work in accessing data and information from anywhere and anytime.

Autojaya together with Zebra Technologies is a company that has decades of experience in providing the appropriate AUTO-ID technology for many companies.


One of the auto-id products that are used to support these demands for efficiency and effectiveness is the Zebra TC21/TC26, a product with the right business features, which can help your workers capture and access the data they need quickly and efficiently.

One of the auto-id products used to support these efficiency and effective demands is the Zebra TC21/TC26, a product with the right business features, which can help your workers capture and access the data they need quickly and efficiently.

Products with the Android 10 platform are designed robustly with IP sealing 67 to withstand splashes of water, dust and capable of producing reliable operation for 10 – 14 hours continuously every day, including in rough/challenging areas.

This product can be implemented in various lines of industry, both in the hospitality/hotel, restaurant, cafe or tourism, retail, warehouse and transportation/distribution sectors.

Areas that can be applied with AUTO-ID technology include activities in warehouses, working areas, production lines, customer service, laboratories, distribution centers, receiving/shipping areas, and other. areas.

Zebra Technologies has a wide enterprise portfolio, such as Scanners, Mobile Computer/Data Capture products, and other product solutions that are appropriate for the Industrial world.

Continue reading

RTLS solution based on RFID in Warehouse & Manufacturing Area

What you cannot see will be detrimental to your business – maybe that’s an expression if you don’t know where your important assets are, you will not be able to achieve maximum operational efficiency and workforce productivity. We have a passive-RFID based RTLS (Real-Time Location System) solution that offers specialized technology to provide visibility to the exact location of all your tagged assets.

With this RTLS solution, you can see where inventory, forklifts, equipment, workers and other tagged assets are located – and not just location, which direction they are moving can also be known. Now, you can identify, search and track assets in real time – as well as receive real time alerts regarding compliance preventing losses.

The result? Simplified operations, minimal costs, and better customer service.

Some of the advantages that exist in this passive-RFID based RTLS solution:

a. Latest state of the art RFID technology
It is a parallel multi-transmit and receive architecture, combining digital beamforming and wide-angle array antennas to provide superior accuracy and location coverage. (Ref: Zebra ATR7000)

b. Beam-Steering for location pinpoints
Electronically directs and processes hundreds of narrow flashlight-style beams simultaneously, providing highly accurate asset location.

c. Superior asset location visibility
With the software ready to use, it includes two main components: RTLS software which allows remote configuration, monitoring and management of devices as well as the Location Analytics engine itself. (Ref: Zebra CLAS)

d. 2x wider coverage zone
The wide angle antenna, which covers 2x the width of similar competitors’ RFID readers, effectively cuts the number of devices and costs required by half, and has a positive impact on Total Cost of Ownership (TCO).

e. Maintenance of tags at no cost
Passive-RFID tags are very cost effective and require no battery or battery management and maintenance. Unlike Active-RFID tags, there is no cost or time lost for monitoring health or replacing batteries, ensuring seamless tag visibility. (Ref: Zebra ZBR4000)


For further information regarding the RTLS solution based on RFID in the warehouse and manufacturing area, you can contact us at +62 21 4205187, 4205408 Ext 315 and 220, Hot line 0812 8222 8691 or visit our website at

Continue reading

Aruba User Experience Insight

Solutions for all industrial sectors; Insight is a diagnostic sensor of WiFi network performance from Aruba’s cloud-based HPE with a web-based administrative dashboard that can be accessed from anywhere. This Insight Sensor can be placed anywhere and is ideal for all enterprises related to network performance, applications and user connectivity. Together with user devices and IoT monitor network performance and connectivity such as DHCP, DNS, authentication, captive portal response, cloud and internal applications.

An understanding of the end user experience is easier – whether you are an expert on the WLAN onsite or not.

Seeing the health of your network from a user perspective doesn’t have to be difficult. An easy-to-use dashboard gives you the information you need when you need it. See the example in the animation below.



Single-Glance Diagnosis



Wi-Fi and App Performance



Zoom In: Rich Hover


Aruba IntroSpect for UEBA and NTA

Solutions for the industrial sector: All industrial sectors. Aruba IntroSpect is a security product for User and Entity Behavior Analytics (UEBA) solutions and Network Traffic Analysis (NTA) solutions, which are designed to analyze the behavior of users and entities in an enterprise network and analyze reliable data traffic networks.

Aruba IntroSpect, has the ability to detect attacks by monitoring changes in the small things in the behavior and habits of users and entities that exist in the network. Aruba IntroSpect integrates advanced AI-based machine learning (ML), with pinpoint visualization that provides forensic insight, so that attacks such as malicious negligent users, systems and devices can be identified and addressed immediately.

Entity360 represents activities that are relevant to the security of an entity in relation to data sources, devices used, or types of activities. This includes a risk score (0 to 100) as well as a full safety profile. Each entity will have a risk score based on machine learning calculations that will explain the key factors.

The visit of the CEO and Vice President of DRIVELOCK to the ACS Group

At present, in the Industry Industry 4.0 (Digital era), the aspect of cyber security is very important and must be considered. The smoothness of business processes, public services, digital information systems, is determined how strong and resistant a digital network is in dealing with cyber crime attacks that continue and occur all the time. DriveLock with its ‘Zero-Trust Platform’ (anti-malware, data loss prevention) can be a choice of appropriate solutions for high-level security at End-Point (end-point protection).

We are PT. Autojaya Idetech, has been appointed as Tier-One-Partner DriveLock in Indonesia and is fully supported by the German DriveLock central management. This was marked by the presence of Anton Kreuzer (CEO of DriveLock) and Martin Mangold (VP Cloud Operations DriveLock) to the head office of PT. Autojaya Idetech in Jakarta on December 3, 2019.

ACS Group RAKER 2019

On November 7, 2019, ACS Group held an annual work meeting. The meeting was attended by both Jakarta staff and branches and took place at the Best Western Plus Kemayoran Hotel – Jakarta. The ACS Group Work Meeting was opened by Stefan Looho as President Director, which was continued by Indra Tjahjadi – Managing Director who explained about the “2020 ACS Corporate Direction & Strategy” which aims to guide all levels of the company so that the company’s activities are in line with the directives, and the strategies submitted can achieve the mutually agreed targets.

Launching Aruba Instant On in Lombok – NTB

ACS Group, together with PT Sistech Kharisma, which is a distribution of Aruba’s HPE and Lombok IT Professional Community (PROFIT) launched Aruba Instant On for the NTB region on October 5, 2019. It is a form of support for tourism development in this area. The presence of Aruba Instant On as a simple and safe WiFi solution for the growing hospitality industry in NTB such as hospitality, restaurants and public facilities. As a tourism area that is frequently visited by foreign and local tourists, the safety and comfort of using WIFI is an absolute requirement that must be met by business people in this industry.

Instant On combines business-class Wi-Fi technology from Aruba with a solution that is simple, easy to implement, and offers flexibility so that it can be continuously upgraded to suit business needs. Aruba itself is a Hewlett Packard Enterprise company that comes with the latest secure and powerful wireless network solutions. “The Aruba Instant On solution is easy to implement, cost-effective, capacity can be continuously improved, and certainly safety.



Case Study: Obsesi Man

Purwakarta, East Java – Obsesi Man is a laundry and rental company owned by Mr. Marwan, an entrepreneur from West Java. Together with Mr. Eddie, General Manager of Obsesi Man, they manage a state-of-the-art washing facility in Purwakarta and deliver clean laundry ranging from bedsheets, clothes, and towels for some of the largest private hospitals in Jakarta on a daily basis.

From its humble beginnings in 2008, capacity and productivity have grown multiple times over. But as many successful businesses could understand, the accounting discipline could become too relaxed during the early growth stage. Because of the sheer volume of orders, Obsesi Man was receiving, operational inefficiency rose and something had to be done. In search of a solution, Mr. Marwan and Mr. Eddie went to a laundry exhibition in Jakarta. They had very specific demands. Thankfully, ACS Group was there offering the right solutions. Opening a very welcoming booth, the ACS Group team met with Mr. Marwan and Mr. Eddie and sought to collaborate.

ACS Group was already developing software called the ACS Laundry Tracking System (LTS). It is a solution based on RFID and it is combined with mobile printing and order-taking features. Hearing this, Mr. Marwan and Mr. Eddie were thrilled. After a few rounds of meetings and many hours of coding, ACS Group was able to deliver custom software based on the LTS platform for Obsesi Man. Would you like to see how the solution works? Are you interested to see Mr. Marwan and Mr. Eddie’s state-of-the-art facilities? Please watch our video case study below which was co-produced by ACS Group and Zebra Technologies (NASDAQ: ZBRA).

[Link Youtube: Case Study: Obsesi Man (RFID Laundry Tracking System)]


Please contact us if you need any solution from ACS Group!

DriveLock Training

All ACS Group engineers both central and branch receive DriveLock pre sales training, where DriveLock is an easy and effective endpoint security solution, with features such as Encryption, Security Awareness, Drive & Device Control, Application Control and Analytics & Forensic. The training activity was delivered by Michael Ooi – APC DriveLock’s Senior Pre-Sales Engineer taking place at the ACS Group Building – Jakarta.