{"version":3,"file":"component---src-pages-index-js-962ebc783e189872ef0c.js","mappings":"uHA8BA,IA5B0BA,IAElBC,EAAAA,cAAA,WAASC,UAAU,qCACfD,EAAAA,cAAA,OAAKC,UAAU,aACXD,EAAAA,cAAA,OAAKC,UAAU,OACXD,EAAAA,cAAA,OAAKC,UAAU,YACXD,EAAAA,cAAA,UAAI,kCAERA,EAAAA,cAAA,OAAKC,UAAU,wBACfD,EAAAA,cAAA,UACQA,EAAAA,cAAA,UAAIA,EAAAA,cAAA,KAAGE,KAAK,6CAA6CC,OAAO,UAASH,EAAAA,cAAA,KAAG,aAAW,WAAWC,UAAU,sBAE5GD,EAAAA,cAAA,UAAIA,EAAAA,cAAA,KAAGE,KAAK,oCAAoCC,OAAO,UAASH,EAAAA,cAAA,KAAG,aAAW,UAAUC,UAAU,yB,gFCR9H,MAAMG,EAAS,CACX,CACIC,GAAI,EACJC,MCTO,IAA0B,iGDUjCC,SAAU,4GAGd,CACIF,GAAI,EACJC,MEfO,IAA0B,uFFgBjCC,SAAU,uGAGd,CACIF,GAAI,EACJC,MGrBO,IAA0B,+FHsBjCC,SAAU,kEAGd,CACIF,GAAI,EACJC,MI3BO,IAA0B,6FJ4BjCC,SAAU,sFAqClB,MA/BmBC,IAGXR,EAAAA,cAAA,OAAKC,UAAU,YAAYI,GAAG,OAAO,uBAAqB,QACtDL,EAAAA,cAAA,OAAKC,UAAU,2DACXD,EAAAA,cAAA,OAAKC,UAAU,sEAAsE,aAAW,qEAC/FG,EAAOK,KAAIC,GACRV,EAAAA,cAAA,OAAKW,IAAKD,EAAMJ,MAAOL,UAAU,8CAC7BD,EAAAA,cAAA,OAAKC,UAAU,sBAAuB,UAASS,EAAMJ,QACrDN,EAAAA,cAAA,OAAKC,UAAU,YACfD,EAAAA,cAAA,OAAKC,UAAU,kBACXD,EAAAA,cAAA,MAAIY,wBAAyB,CAAEC,OAAQH,EAAMH,YAE7CP,EAAAA,cAAA,OAAKC,UAAU,kBAM3BD,EAAAA,cAAA,OAAKC,UAAU,0BAAyBD,EAAAA,cAAA,KAAGC,UAAU,uBACrDD,EAAAA,cAAA,OAAKC,UAAU,0BAAyBD,EAAAA,cAAA,KAAGC,UAAU,wBACrDD,EAAAA,cAAA,OAAKC,UAAU,8BAEnBD,EAAAA,cAAA,OAAKC,UAAU,mBACXD,EAAAA,cAAA,YAAM,eAAkBA,EAAAA,cAAA,YAAM,eAC9BA,EAAAA,cAAA,KAAGE,KAAK,gCAAgCC,OAAO,SAASF,UAAU,2BAA0B,iC,8BK3D5G,GCAe,ICAA,ICAA,ICAA,ICAA,ICAA,ICAA,ICAA,IRAA,IAA0B,kDSazC,MAAMa,EAAW,CACf,CACET,GAAI,EACJU,KAAM,4BACNC,MAAO,iFACPV,MAAOW,EACPC,YAAY,s/KAwEd,CACEb,GAAI,EACJU,KAAM,4BACNC,MAAO,8BACPV,MAAOW,EACPC,YAAY,mvEAiBd,CACEb,GAAI,EACJU,KAAM,2BACNC,MAAO,oCACPV,MAAOW,EACPC,YAAY,4wSAmGd,CACEb,GAAI,EACJU,KAAM,4BACNC,MAAO,+DACPV,MAAOW,EACPC,YAAY,shDASd,CACEb,GAAI,EACJU,KAAM,4BACNC,MAAO,gCACPV,MAAOW,EACPC,YAAY,g6KAmFd,CACEb,GAAI,EACJU,KAAM,4BACNC,MAAO,2DACPV,MAAOW,EACPC,YAAY,slMAwFd,CACEb,GAAI,EACJU,KAAM,4BACNC,MAAO,6BACPV,MAAOW,EACPC,YAAY,iwEA0Bd,CACEb,GAAI,EACJU,KAAM,yBACNC,MAAO,8BACPV,MAAOW,EACPC,YAAY,65EAwBd,CACEb,GAAI,EACJU,KAAM,6BACNC,MAAO,4BACPV,MAAOW,EACPC,YAAY,0zLAiEd,CACEb,GAAI,GACJU,KAAM,8BACNC,MAAO,yDACPV,MAAOW,EACPC,YAAY,wxFAgDd,CACEb,GAAI,GACJU,KAAM,0BACNC,MAAO,8CACPV,MAAOW,EACPC,YAAY,u8BAed,CACEb,GAAI,GACJU,KAAM,wBACNC,MAAO,gDACPV,MAAOW,EACPC,YAAY,22CAoBd,CACEb,GAAI,GACJU,KAAM,0BACNC,MAAO,oCACPV,MAAOW,EACPC,YAAY,0wCAmBd,CACEb,GAAI,GACJU,KAAM,0BACNC,MAAO,uCACPV,MAAOW,EACPC,YAAY,u+BAoBd,CACEb,GAAI,GACJU,KAAM,wBACNC,MAAO,gCACPV,MAAOW,EACPC,YAAY,o/CAad,CACEb,GAAI,GACJU,KAAM,wBACNC,MAAO,iBACPV,MAAOW,EACPC,YAAY,wyBA+EhB,MAlEiBC,KACf,MAAM,EAACC,EAAkB,EAACC,IAAwBC,EAAAA,EAAAA,UAAS,MAGrDC,EAAgBlB,IACpBgB,EAAqBD,IAAsBf,EAAK,KAAOA,EAAG,EAItDmB,EAAsB,SAACN,EAAaO,QAAK,IAALA,IAAAA,EAAQ,GAEhD,OADmBP,EAAYQ,MAAM,QAAQC,MAAM,EAAGF,GAAOG,KAAK,OAEpE,EAEA,OACE5B,EAAAA,cAAA,WAAS,uBAAqB,OAAOK,GAAG,YACtCL,EAAAA,cAAA,OAAKC,UAAU,4BAA4B,gBAAc,wCACvDD,EAAAA,cAAA,YAAM,MAAS,SAGjBA,EAAAA,cAAA,WAAS,uBAAqB,OAAOK,GAAG,OAAOwB,MAAO,CAAEC,QAAS,WAC/D9B,EAAAA,cAAA,OAAKC,UAAU,wBACbD,EAAAA,cAAA,OAAKC,UAAU,yBAAyB4B,MAAO,CAAEE,UAAW,SAC1D/B,EAAAA,cAAA,OAAKC,UAAU,kBACZa,EAASL,KAAIuB,GACZhC,EAAAA,cAAA,OAAKW,IAAKqB,EAAQ3B,GAAIJ,UAAU,kBAC9BD,EAAAA,cAAA,OAAKC,UAAU,qBACbD,EAAAA,cAAA,KAAG6B,MAAO,CAAEI,SAAU,OAAQC,cAAe,YAAYC,WAAW,SAAWH,EAAQjB,MACvFf,EAAAA,cAAA,MAAI6B,MAAO,CAAEI,SAAU,OAAQC,cAAe,YAAaE,cAAe,SACvEJ,EAAQhB,OAIXhB,EAAAA,cAAA,KAAG6B,MAAO,CAAEI,SAAU,OAAQC,cAAe,YAAaG,UAAW,YACnErC,EAAAA,cAAA,QAAMY,wBAAyB,CAAEC,OAAQO,IAAsBY,EAAQ3B,GAAK2B,EAAQd,YAAcM,EAAoBQ,EAAQd,iBAI/HE,IAAsBY,EAAQ3B,IAC7BL,EAAAA,cAAA,UACEsC,QAASA,IAAMf,EAAaS,EAAQ3B,IACpCwB,MAAO,CAAEE,UAAW,OAAQQ,gBAAiB,MAAOT,QAAS,aAC9D,UAKFV,IAAsBY,EAAQ3B,IAC7BL,EAAAA,cAAA,UACEsC,QAASA,IAAMf,EAAaS,EAAQ3B,IACpCwB,MAAO,CAAEE,UAAW,OAAQQ,gBAAiB,MAAOT,QAAS,aAC9D,oBAWT,ECxuBd,MAjCkBU,IAEVxC,EAAAA,cAACyC,EAAAA,EAAM,CACHC,UAAU,+BAEV1C,EAAAA,cAAA,OAAKK,GAAG,WACJL,EAAAA,cAAA,OAAKC,UAAU,2BACXD,EAAAA,cAAA,OAAKC,UAAU,oBACXD,EAAAA,cAAA,OAAKC,UAAU,UACXD,EAAAA,cAAA,OAAKC,UAAU,cAEnBD,EAAAA,cAAA,YAAM,iBAKdA,EAAAA,cAACQ,EAAU,MAEXR,EAAAA,cAAA,OAAKC,UAAU,WAGXD,EAAAA,cAACmB,EAAQ,MAITnB,EAAAA,cAACD,EAAAA,EAAiB,OAEtBC,EAAAA,cAAC2C,EAAAA,EAAM,O","sources":["webpack://pragicts/./src/components/social-icons-footer.js","webpack://pragicts/./src/components/hero-slides.js","webpack://pragicts/./src/images/hero-images/pragicts-our-perspectives-banner-sharing-knowledge.jpg","webpack://pragicts/./src/images/hero-images/pragicts-our-perspectives-banner-reflect.jpg","webpack://pragicts/./src/images/hero-images/pragicts-our-perspectives-banner-context-matters.jpg","webpack://pragicts/./src/images/hero-images/pragicts-our-perspectives-banner-keep-learning.jpg","webpack://pragicts/./src/images/projects/bg.jpg","webpack://pragicts/./src/images/bg/pragicts-featured-projects.jpg","webpack://pragicts/./src/images/projects/empl.png","webpack://pragicts/./src/images/projects/mybiz.png","webpack://pragicts/./src/images/stack_logo/html.png","webpack://pragicts/./src/images/stack_logo/css.png","webpack://pragicts/./src/images/stack_logo/aws.png","webpack://pragicts/./src/images/stack_logo/google.png","webpack://pragicts/./src/images/stack_logo/js.png","webpack://pragicts/./src/components/projects.js","webpack://pragicts/./src/pages/index.js"],"sourcesContent":["import React from 'react'\r\n\r\nconst SocialIconsFooter = () => {\r\n return (\r\n
\r\n
\r\n
\r\n
\r\n

Find us on social networks :

\r\n
\r\n
\r\n
    \r\n
  • \r\n \r\n
  • \r\n\r\n {/*
  • \r\n
  • \r\n
  • \r\n
  • \r\n
  • \r\n
  • */}\r\n
\r\n
\r\n
\r\n
\r\n
\r\n )\r\n}\r\n\r\nexport default SocialIconsFooter\r\n","import React from 'react'\r\nimport HeroImage1 from '../images/hero-images/pragicts-our-perspectives-banner-sharing-knowledge.jpg'\r\nimport HeroImage2 from '../images/hero-images/pragicts-our-perspectives-banner-reflect.jpg'\r\nimport HeroImage3 from '../images/hero-images/pragicts-our-perspectives-banner-context-matters.jpg'\r\nimport HeroImage4 from '../images/hero-images/pragicts-our-perspectives-banner-keep-learning.jpg'\r\n\r\nconst slides = [\r\n {\r\n id: 1,\r\n image: HeroImage1,\r\n mainText: 'PragICTS Website Dedicated To Share Our
Pitfalls, Learnings, Expertise & Experiences',\r\n \r\n },\r\n {\r\n id: 2,\r\n image: HeroImage2,\r\n mainText: 'Don\\'t Take What Is Shared As Absolute Truths!
Reflect & Derive Your Own Truths.',\r\n \r\n },\r\n {\r\n id: 3,\r\n image: HeroImage3,\r\n mainText: 'Context Matters
For Effective Application.', \r\n \r\n },\r\n {\r\n id: 4,\r\n image: HeroImage4,\r\n mainText: 'Known Is Very Little
Unknown is Beyond Bounds, Keep Learning.',\r\n \r\n },\r\n\r\n]\r\n\r\nconst HeroSlides = () => {\r\n\r\n return (\r\n
\r\n
\r\n
\r\n {slides.map(slide => (\r\n
\r\n
\r\n
\r\n
\r\n

\r\n \r\n
\r\n {/* Let's Start */}\r\n
\r\n
\r\n ))}\r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n 6.9149106 79.9105932 \r\n Based In Colombo, Sri Lanka\r\n
\r\n
\r\n )\r\n}\r\n\r\nexport default HeroSlides\r\n","export default __webpack_public_path__ + \"static/pragicts-our-perspectives-banner-sharing-knowledge-c558748ade586728536d38178ba7a1c3.jpg\";","export default __webpack_public_path__ + \"static/pragicts-our-perspectives-banner-reflect-a07cfbca1622f5cc5d6386a05865e27d.jpg\";","export default __webpack_public_path__ + \"static/pragicts-our-perspectives-banner-context-matters-da138a0ce961df0e3224595a9ae605ef.jpg\";","export default __webpack_public_path__ + \"static/pragicts-our-perspectives-banner-keep-learning-3de07167d8119fc1a8b1ca0c40ccaf5d.jpg\";","export default __webpack_public_path__ + \"static/bg-41d98dc5ff1c3d38987a38087c17fbe2.jpg\";","export default __webpack_public_path__ + \"static/pragicts-featured-projects-39ea75f32b4f09d825370063e768a791.jpg\";","export default __webpack_public_path__ + \"static/empl-a6ae2f8a894962551253287939f34980.png\";","export default __webpack_public_path__ + \"static/mybiz-42ac04b8c7f4e4e2c5bf2de9af3cb080.png\";","export default __webpack_public_path__ + \"static/html-f08f7501a638838b0664563fb1d1375d.png\";","export default __webpack_public_path__ + \"static/css-9d0dad0feff2b8527c5c0911ec1fca61.png\";","export default __webpack_public_path__ + \"static/aws-7dd80bda4160dbcc19e1c9811e22ab7f.png\";","export default __webpack_public_path__ + \"static/google-cf688b832fcbc3a1e12502ceedfc6f00.png\";","export default __webpack_public_path__ + \"static/js-73aae693909126986e3e6a1fe9edfe28.png\";","import React, { useState } from 'react';\r\nimport Layout from \"./layout\";\r\nimport Footer from './footer';\r\nimport BgImage from '../images/bg/pragicts-featured-projects.jpg';\r\nimport empl from '../images/projects/empl.png';\r\nimport mybiz from '../images/projects/mybiz.png';\r\nimport html from '../images/stack_logo/html.png';\r\nimport css from '../images/stack_logo/css.png';\r\nimport aws from '../images/stack_logo/aws.png';\r\nimport google from '../images/stack_logo/google.png';\r\nimport js from '../images/stack_logo/js.png';\r\nimport bg from '../images/projects/bg.jpg';\r\n\r\nconst projects = [\r\n { \r\n id: 1, \r\n date: \"Wednesday, April 03, 2024\",\r\n title: \"Information Technology Infrastructure Library (ITIL), A Must for IT Operations\", \r\n image: bg, \r\n description: `ITIL is a globally recognized framework that standardizes the selection, planning, delivery, and maintenance of IT services within a business. It is a framework designed to standardize IT service management practices, ensuring efficient service delivery aligned with business goals and aims to enhance efficiency, ensure predictable service delivery, and align IT activities with business requirements.

\r\n By adopting ITIL, organizations can transform IT administrators into strategic business partners rather than just support staff.

\r\n \r\n 01 Strategies

\r\n ITIL emphasizes several strategic aspects:

\r\n - Value - ITIL encourages organizations to focus on delivering value to customers and stakeholders.

\r\n - Collaboration - Effective communication and collaboration between IT and other business units are essential.

\r\n - Process Optimization - ITIL promotes continuous improvement of IT processes.

\r\n \r\n 02 Standards

\r\n ITIL provides guidelines to align IT services with business objectives for consistent delivery.

\r\n \r\n 03 Service Lifecycle

\r\n - Service Strategy: Aligning IT services with business objectives.
\r\n - Service Design: Designing effective and efficient IT services.
\r\n - Service Transition: Managing changes to IT services.
\r\n - Service Operations: Ensuring IT services are delivered and supported effectively.
\r\n - Continual Service Improvement: Continuously enhancing IT services to meet evolving business needs.

\r\n \r\n 04 Documentations

\r\n (a) Roles and Responsibilities: ITIL defines roles like Incident Manager, Problem Manager, Change Manager, and Service Level Manager.

\r\n (b) Certifications: ITIL offers certifications validating expertise in IT service management.

\r\n (c) Lifecycle Phases: ITIL includes phases like Service Strategy, Design, Transition, Operation, and Continual Improvement.

\r\n \r\n Benefits

\r\n - Cost Efficiency: ITIL helps in reducing costs associated with IT services.
\r\n - High Service Quality: ITIL promotes the delivery of high-quality IT services.
\r\n - Increased Productivity: ITIL enhances business productivity through streamlined IT processes.
\r\n - Improved ROI: ITIL contributes to better returns on IT investments.
\r\n - Enhanced Customer Satisfaction: ITIL focuses on meeting customer needs and expectations.
\r\n - Optimized Resource Utilization: ITIL ensures the efficient use of IT resources.

\r\n \r\n A Brief History of ITIL

\r\n Initially developed by the UK government's Central Computer and Telecommunications Agency (CCTA) in the 1980s, ITIL aimed to standardize IT practices across government agencies. Over time, ITIL evolved into a globally recognized best-practice standard for ITSM, focusing on delivering efficient and high-quality IT services aligned with business objectives. The framework has undergone several updates and revisions, with the latest version being ITIL 4.

\r\n \r\n ITIL V1: ITIL was created in 1989 to standardize IT service management.

\r\n ITIL V2: It was introduced in 2001 to perform a uniform structure for service delivery.

\r\n ITIL V3: It was updated in 2007 with a feedback looping feature in order to improve ITIL service.

\r\n \r\n Lifecycle

\r\n ITIL V3 2011: It was released in 2011. It is an upgraded version of V3 and clarifies processes of ITIL V3.

\r\n \r\n …………………………………………………………………………………………………………………..

\r\n \r\n ITIL V4: It has been released in 2019. It has a flexible and integrated system for effective management of IT-enabled services.

\r\n \r\n ITIL 4 consists of two components:

\r\n \r\n (1) The four dimensions model
\r\n (2) ITIL service value system

\r\n \r\n The four dimensions model:

\r\n An organization should address all four dimensions in order to maintain the service quality.

\r\n \r\n - Organizations and People: People in the organization should understand their roles and responsibilities towards creating value for the organization.
\r\n - Information and Technology: This includes the information, knowledge, and techniques that are required for managing services.
\r\n - Partners and Suppliers: It incorporates contracts and other agreements between organizations and their partners.
\r\n - Value streams and Processes: A value stream is a series of steps that an organization uses to create and deliver products and services to a consumer, whereas a well-defined process can improve productivity within or across organizations.

\r\n \r\n ITIL service value system:

\r\n \r\n The service value system (SVS) is a set of activities performed by an organization to deliver a valuable output to end-users.

\r\n \r\n The ITIL 4 SVS includes several elements:

\r\n \r\n - Guiding principles: It has a set of principles that guide you by creating value for your customers and your organization.
\r\n - Governance: It controls and monitors the performance of the organization.
\r\n - Service value chain: It is a set of activities that a business performs in order to deliver a valuable product or service to its consumers.
\r\n - Continual improvement: It is an iterative approach that ensures that an organization's performance meets customer expectations.
\r\n - Practices: It has 34 management practices that are designed for accomplishing organizational goals.

\r\n `,\r\n },\r\n { \r\n id: 2, \r\n date: \"Wednesday, April 03, 2024\",\r\n title: \"Top Use Cases for Firewalls\", \r\n image: bg, \r\n description: `Firewalls play a pivotal role in network and cybersecurity, offering essential protection against a wide range of threats. Here's a concise overview of their top use cases:

\r\n 1. Perimeter Protection: Firewalls establish a barrier between internal networks and the Internet, filtering incoming and outgoing traffic based on predefined rules. These rules can include protocol, IP, port, application, time, and bandwidth filtering, allowing only authorized traffic to pass through.

\r\n \r\n 2. Access Control: Firewalls enable granular control over network resource access, essential for maintaining data confidentiality and meeting compliance requirements.

\r\n \r\n 3. Intrusion Prevention System (IPS): Firewalls equipped with IPS functionality actively identify and block malicious activities in real-time, including known attacks and zero-day exploits.

\r\n \r\n 4. Virtual Private Network (VPN) Enforcement: Firewalls often serve as gateways for VPN connections, providing secure access to internal network resources for remote users or branch offices. They authenticate and encrypt VPN traffic, ensuring data remains protected during transmission over untrusted networks.

\r\n \r\n 5. Content Filtering: Firewalls can filter web content based on predefined criteria such as website categories, URLs, or keywords. This allows organizations to enforce acceptable use policies and block access to inappropriate or malicious websites, reducing the risk of malware infections or data breaches.

\r\n \r\n 6. Data Loss Prevention (DLP): Some firewalls incorporate DLP features to monitor and prevent the unauthorized transmission of sensitive data outside the organization's network. They inspect outbound traffic for patterns or keywords indicating confidential information and take action to prevent data leaks.

\r\n \r\n 7. Threat Intelligence Integration: Firewalls leverage threat intelligence feeds to proactively detect and respond to emerging threats, enhancing cybersecurity posture.

\r\n \r\n Overall, firewalls are critical components of network security infrastructure, helping organizations mitigate risks, protect sensitive data, and maintain compliance with regulatory requirements.
`, \r\n },\r\n { \r\n id: 3, \r\n date: \"Saturday, March 30, 2024\",\r\n title: \"Cybersecurity, The Nuts And Bolts\", \r\n image: bg, \r\n description: `SOME FACTS

\r\nA cyberattack strikes every 39 seconds!

\r\n\r\nIn 2024, the global cost of cybercrime is projected to reach a staggering USD 9.5 trillion, emphasizing the urgent need for cybersecurity to be a top global priority.

\r\n\r\nWith the proliferation of generative AI, including technologies like ChatGPT, the current daily average of 2,200 cyberattacks is expected to escalate significantly, becoming more personalized and widespread.

\r\n\r\nDespite technological advancements, ransomware is anticipated to remain a predominant threat in 2024. According to Statista, it accounted for over 72% of cybersecurity incidents in 2023. Furthermore, small and medium-sized businesses (SMBs) are increasingly becoming targets, with 61% falling victim to cyberattacks in 2023. This has led to a projected growth of the global cybersecurity market to $266.2 billion by 2027.

\r\n\r\nIn 2023, there were 2,365 cyberattacks, impacting a staggering 343,338,964 individuals. Data breaches surged by 72% between 2021 and 2023, surpassing previous records.

\r\n\r\nEmail remains the most common avenue for malware, with approximately 35% of malware deliveries occurring via email in 2023. Moreover, over 94% of organizations reported incidents related to email security.

\r\n\r\nThe financial fallout from cyberattacks is significant, with the average data breach costing $4.45 million. In 2022 alone, business email compromises led to losses totaling $2.7 billion. These figures underscore the critical imperative to address cyber vulnerabilities and cultivate a skilled cybersecurity workforce, especially as our society becomes increasingly reliant on digital technologies and interconnectedness.

\r\n\r\nTYPE OF THREATS

\r\n01 Malware

\r\nMalware, short for \"malicious software,\" encompasses various harmful programs designed to exploit or damage programmable devices, services, or networks. Nearly all modern cyberattacks involve some form of malware. Threat actors employ malware to gain unauthorized access, render systems inoperable, destroy data, steal sensitive information, and compromise critical files.

\r\n\r\nCommon types of malware include:

\r\n\r\nRansomware: Encrypts a victim's data or device and demands a ransom for its release.

\r\n\r\nTrojan Horse: Deceptive code disguised as legitimate software to trick users into downloading and installing it, often leading to further malware infiltration.

\r\n\r\nSpyware: Covertly collects sensitive information from a device and transmits it to the attacker without the user's knowledge.

\r\n\r\nWorms: Self-replicating programs that propagate across devices and networks autonomously.

\r\n\r\n02 Phishing/Social Engineering Scams

\r\nPhishing, the most widespread form of social engineering, involves fraudulent emails, attachments, text messages, or calls aimed at deceiving individuals into disclosing personal data, downloading malware, transferring funds to cybercriminals, or engaging in other actions that compromise their security.

\r\n\r\nCommon phishing tactics include:

\r\n\r\nSpear Phishing: Targeted attacks tailored to specific individuals, often leveraging information from public social media profiles.

\r\n\r\nBusiness Email Compromise (BEC): Scams impersonating executives or trusted contacts to deceive victims into divulging sensitive information or wiring money.

\r\n\r\nDomain Name Spoofing: Creation of fake websites or domains resembling legitimate ones to trick users into divulging sensitive information.

\r\n\r\n03 Man-in-the-Middle (MITM) Attacks

\r\nMITM attacks involve intercepting and manipulating communications between two parties to steal data. Hackers exploit vulnerabilities in unsecured Wi-Fi networks to eavesdrop on connections and extract sensitive information.

\r\n\r\n04 Denial-of-Service (DoS) Attacks

\r\nDoS attacks overwhelm websites, applications, or systems with fraudulent traffic, rendering them slow or inaccessible to legitimate users. Distributed Denial-of-Service (DDoS) attacks amplify this by utilizing botnets to inundate targets with malicious traffic.

\r\n\r\n05 Zero-Day Exploits

\r\nZero-day exploits target previously unknown vulnerabilities in software, hardware, or firmware. Hackers exploit these flaws before vendors can develop patches or fixes, enabling unauthorized access to vulnerable systems.

\r\n\r\n06 Password Attacks

\r\nCybercriminals attempt to guess or steal passwords and login credentials to gain unauthorized access to user accounts. These attacks may involve social engineering tactics or brute force techniques.

\r\n\r\n07 Internet of Things (IoT) Attacks

\r\nIoT attacks exploit vulnerabilities in connected devices, such as smart home gadgets and industrial systems, to compromise security, steal data, or orchestrate larger cyberattacks.

\r\n\r\n08 Injection Attacks

\r\nInjection attacks involve injecting malicious code into programs or systems to execute remote commands, manipulate databases, or alter website data. Common types include SQL injection and Cross-Site Scripting (XSS) attacks.

\r\n\r\nTYPE OF PERPETRATORS

\r\n01 Cybercriminals

\r\nCybercriminals are individuals or groups who engage in illegal activities primarily for financial gain. They perpetrate various cybercrimes, including ransomware attacks and phishing scams aimed at extorting money or obtaining sensitive information such as credit card details, login credentials, or intellectual property.

\r\n\r\n02 Hackers

\r\nHackers possess technical expertise to infiltrate computer networks or systems. It's important to note that not all hackers are malicious actors; some, known as ethical hackers, assist organizations and government agencies by identifying vulnerabilities in their systems to enhance cybersecurity defenses.

\r\n\r\n03 Nation-State Actors

\r\nNation-states and governmental entities often sponsor threat actors to conduct cyber espionage, gather confidential data, or disrupt critical infrastructure of other nations. These activities, which may include espionage or cyberwarfare, are well-funded and sophisticated, posing significant challenges for detection and mitigation.

\r\n\r\n04 Insider Threats

\r\nInsider threats involve individuals within an organization who pose risks to its cybersecurity, whether intentionally or unintentionally. While some insider threats stem from human error, such as inadvertently installing malware or losing company-issued devices, others result from malicious actions. Disgruntled employees, for instance, may exploit their access privileges for personal gain or to inflict harm on the organization, either financially or reputational.

\r\n\r\nPROTECTION

\r\n01 Strong Passwords

\r\nUtilize strong, unique passwords for all accounts and systems, incorporating a mix of uppercase and lowercase letters, numbers, and symbols. Regularly update passwords and avoid using easily guessable information like birthdays or common phrases.

\r\n\r\n02 Email Security Tools

\r\nImplement email security solutions to detect and block phishing attempts, malware-laden attachments, and suspicious links. Train employees to recognize phishing emails and exercise caution when interacting with unfamiliar or unexpected messages.

\r\n\r\n03 Antivirus Software

\r\nInstall reputable antivirus software on all devices to detect and remove malicious software, including viruses, Trojans, and spyware. Keep antivirus programs up-to-date to ensure they can identify emerging threats effectively.

\r\n\r\n04 Firewalls and VPNs

\r\nDeploy firewalls to monitor and control incoming and outgoing network traffic, preventing unauthorized access and filtering out malicious data packets. Additionally, use Virtual Private Networks (VPNs) to encrypt internet connections and safeguard sensitive data transmitted over public networks.

\r\n\r\n05 Multi-Factor Authentication (MFA)

\r\nEnable MFA wherever possible to add an extra layer of security beyond passwords. Require users to provide additional verification, such as a one-time code sent to their mobile device, before accessing accounts or systems.

\r\n\r\n06 Cybersecurity Training

\r\nEducate employees about common cyber threats, phishing techniques, and best practices for cybersecurity hygiene. Regular training sessions can help cultivate a culture of security awareness and empower individuals to recognize and respond to potential threats effectively.

\r\n\r\n07 Advanced Endpoint Security

\r\nEmploy advanced endpoint security solutions, such as endpoint detection and response (EDR) platforms, to proactively identify and mitigate threats across devices and endpoints. These tools offer real-time monitoring, threat intelligence, and automated response capabilities.

\r\n\r\n08 Threat Detection and Incident Response

\r\nInvest in state-of-the-art threat detection and incident response capabilities to identify cybersecurity threats in real-time. Develop and regularly test incident response plans to enable swift and effective responses to cyber incidents, minimizing potential damage and disruption.

\r\n\r\nBy implementing these proactive measures and fostering a security-conscious culture, organizations can significantly enhance their resilience against cyber threats and mitigate the risks associated with cyberattacks.
\r\n`, \r\n },\r\n { \r\n id: 4, \r\n date: \"Wednesday, March 27, 2024\",\r\n title: \"AI, is it fast getting commoditized? Where will the edge be?\", \r\n image: bg, \r\n description: `Artificial intelligence (AI) is progressively transitioning into a commodity, characterized by increased accessibility and integration into diverse products and services. These AI offerings are being bundled and presented as services, making them easily available to both businesses and individuals.

\r\n\r\nThe availability of AI services on cloud computing platforms allows users to tap into pre-trained models, facilitating the development of applications without the need to start from scratch. This commoditization of AI services is breaking down entry barriers, enabling businesses of varying sizes to seamlessly integrate AI into their operations without significant upfront investments in expertise or infrastructure. Furthermore, many companies now provide ready-made AI solutions tailored for specific industries or use cases, reinforcing the perception of AI as a commodity. This trend is expected to persist as AI technologies mature, becoming even more user-friendly and accessible.

\r\n\r\nAs AI becomes a common factor, a level playing field is inevitable. In such a scenario, differentiation from competitors becomes a critical consideration.

\r\n\r\nThe solution, it seems, lies in the timeless realm of human ingenuity, ushering in the next cycle of innovation and distinctiveness. In navigating the landscape of ubiquitous AI, organizations can rely on the creative and problem-solving capabilities of human minds to pioneer new ideas, approaches, and applications, thereby setting themselves apart from the competition.
\r\n`, \r\n },\r\n { \r\n id: 5, \r\n date: \"Wednesday, March 27, 2024\",\r\n title: \"Cyber Security is not simple.\", \r\n image: bg, \r\n description: `Cyber security is not simple. It is beyond a single vendor/product solution and/or an ad hoc approach.

\r\n\r\nCybersecurity requires a comprehensive approach because the digital landscape is complex and dynamic, with a multitude of potential threats and vulnerabilities. A comprehensive cybersecurity strategy considers the various aspects of information security to create a robust defense against a wide range of cyber threats.

\r\n\r\nHere are some reasons why a comprehensive approach is necessary:

\r\n\r\nDiverse Threat Landscape
\r\nCyber threats come in various forms, such as malware, ransomware, phishing attacks, and more.

\r\n\r\nMultiple Attack Vectors
\r\nCyberattacks can target different entry points, including networks, endpoints, applications, and human users.

\r\n\r\nInterconnected Systems
\r\nModern organizations rely on interconnected systems and networks, making them susceptible to cascading effects if one component is compromised.

\r\n\r\nDynamic Technology Landscape
\r\nTechnology evolves rapidly, introducing new devices, applications, and platforms.

\r\n\r\nHuman Factor
\r\nEmployees and users are often targets for cyber attackers through social engineering and other tactics.

\r\n\r\nData Sensitivity
\r\nOrganizations handle sensitive and valuable data that requires protection.

\r\n\r\nRegulatory Compliance
\r\nDifferent industries and regions have specific cybersecurity regulations and compliance requirements.

\r\n\r\nThird-Party Risks
\r\nMany organizations rely on third-party vendors and service providers, introducing additional security risks.

\r\n\r\nIncident Response and Recovery
\r\nDespite preventive measures, security incidents may still occur.

\r\n\r\nContinuous Monitoring
\r\nCyber threats are persistent and continually evolving.

\r\n\r\nResource Allocation
\r\nLimited resources require prioritization and efficient use.

\r\n\r\nOrganizational Resilience
\r\nCybersecurity is not only about preventing breaches but also about ensuring the organization's resilience in the face of attacks.

\r\n\r\nIn summary, a comprehensive cybersecurity approach recognizes the multifaceted nature of cyber threats and takes a layered, adaptive, and strategic approach to protect an organization's digital assets, systems, and information.

\r\n\r\nDeveloping a robust cybersecurity strategy involves a multi-faceted approach that addresses various aspects of information security.

\r\n\r\nRisk Assessment
\r\nIdentify and assess potential cybersecurity risks specific to your organization. Evaluate the potential impact and likelihood of various threats. Prioritize risks based on their significance to your business.

\r\n\r\nSecurity Policies and Procedures
\r\nEstablish clear and comprehensive security policies and procedures. Define acceptable use of technology and data handling guidelines. Communicate these policies to all employees and stakeholders.

\r\n\r\nEmployee Training and Awareness
\r\nConduct regular cybersecurity awareness training for all employees. Educate staff about the latest threats, phishing scams, and social engineering tactics. Foster a culture of security awareness throughout the organization.

\r\n\r\nAccess Control
\r\nImplement the principle of least privilege, ensuring users have only the necessary access. Regularly review and update user access permissions. Utilize strong authentication methods, such as multi-factor authentication.

\r\n\r\nNetwork Security
\r\nDeploy firewalls, intrusion detection/prevention systems, and secure gateways. Regularly update and patch network devices and software. Monitor network traffic for unusual or suspicious activities.

\r\n\r\nEndpoint Security
\r\nInstall and regularly update antivirus, anti-malware, and endpoint protection software. Encrypt sensitive data on endpoints. Implement device management and control policies.

\r\n\r\nData Protection
\r\nClassify and encrypt sensitive data. Regularly back up critical data and ensure data recovery processes are in place. Establish data retention and disposal policies.

\r\n\r\nIncident Response and Recovery
\r\nDevelop an incident response plan outlining steps to take in the event of a security incident. Conduct regular drills and simulations to test incident response capabilities. Establish a clear recovery process to minimize downtime and data loss.

\r\n\r\nSecurity Audits and Assessments
\r\nConduct regular security audits and assessments. Engage third-party penetration testers to identify vulnerabilities. Stay informed about emerging threats and vulnerabilities.

\r\n\r\nVendor Security
\r\nAssess and ensure the security practices of third-party vendors. Include cybersecurity clauses in contracts with service providers. Regularly monitor and audit vendor security practices.

\r\n\r\nRegulatory Compliance
\r\nStay compliant with relevant data protection and privacy regulations. Understand and adhere to industry-specific cybersecurity standards. Regularly review and update compliance measures.

\r\n\r\nContinuous Monitoring and Improvement
\r\nImplement continuous monitoring of systems and networks. Regularly update and improve security measures based on the evolving threat landscape. Stay informed about the latest cybersecurity trends and technologies.
\r\n`, \r\n },\r\n { \r\n id: 6, \r\n date: \"Wednesday, March 27, 2024\",\r\n title: \"Automation, Why it is an essential milestone to achieve.\", \r\n image: bg, \r\n description: `Digitization has profoundly and widely impacted the world across various sectors.

\r\n\r\nGlobal Connectivity
\r\nThe internet has connected people worldwide, facilitating communication, collaboration, and information sharing on a global scale.
\r\nAccording to the GSMA's annual State of Mobile Internet Connectivity Report 2023, over half (54%) of the global population, some 4.3 billion people now own a smartphone. Global Internet penetration is tipping over 65.7%.

\r\n\r\nEconomic Impact
\r\nDigitization has transformed economies, fostering the growth of digital industries, e-commerce, and online marketplaces.

\r\n\r\nEducation
\r\nDigital technologies have revolutionized education, providing access to online courses, virtual classrooms, and educational resources globally.

\r\n\r\nHealthcare
\r\nDigitization in healthcare includes electronic health records, telemedicine, health apps, and data-driven diagnostics, improving patient care and accessibility.

\r\n\r\nCommunication
\r\nDigital communication tools, including email, social media, and messaging apps, have revolutionized the way people connect and share information.

\r\n\r\nFinance and Banking
\r\nDigital banking services, online transactions, and financial technologies (fintech) have transformed the financial sector, making services more accessible and efficient.

\r\n\r\nSmart Cities
\r\nDigitization contributes to the development of smart cities, incorporating technology to enhance urban living, improve infrastructure, and optimize resource management.

\r\n\r\nBusiness and Industry
\r\nIndustries leverage digital technologies for automation, data analytics, and supply chain optimization, enhancing efficiency and productivity.

\r\n\r\nEntertainment and Media
\r\nStreaming services, digital content platforms, and online gaming have changed the way people consume entertainment and media globally.

\r\n\r\nGovernment Services
\r\nMany governments have embraced digitization to provide online services, facilitate e-governance, and enhance transparency.

\r\n\r\nAgriculture
\r\nDigital technologies, such as precision farming, IoT (Internet of Things) sensors, and data analytics, contribute to modernizing agriculture practices for improved efficiency and sustainability.

\r\n\r\nRemote Work
\r\nThe COVID-19 pandemic accelerated the adoption of remote work, with digital tools enabling employees to work from anywhere.

\r\n\r\nMobile Technology
\r\nThe widespread use of smartphones has facilitated access to digital services, information, and communication, especially in regions with limited traditional infrastructure.

\r\n\r\nEmerging Technologies
\r\nTechnologies like artificial intelligence (AI), blockchain, and the Internet of Things (IoT) continue to shape the digital landscape, opening up new possibilities and applications.

\r\n\r\nSocial Impact
\r\nDigitization has had social implications, influencing how people engage in civic activities, express opinions, and participate in online communities.

\r\n\r\nThe ongoing evolution of technology ensures that the reach and impact of digitization will continue to expand. It also creates a great extensive digital fabric for automation. Automation in general brings on board

\r\n\r\nIncreased Efficiency
\r\nAutomation can perform repetitive tasks at a much faster pace than humans, leading to increased productivity and efficiency. This is particularly beneficial in manufacturing, data processing, and routine administrative tasks.

\r\n\r\nCost Reduction
\r\nAutomated processes often result in reduced labor costs over time. While there may be initial investments in technology and infrastructure, the long-term savings in labor and operational costs can be significant.

\r\n\r\nAccuracy and Precision
\r\nAutomated systems can consistently perform tasks with high precision and accuracy. This is crucial in industries such as manufacturing and healthcare, where precision is paramount.

\r\n\r\nImproved Quality
\r\nBy minimizing human error, automation can enhance product and service quality. Automated processes follow predefined rules and specifications, reducing the likelihood of defects.

\r\n\r\nEnhanced Safety
\r\nAutomation is particularly valuable in environments that may pose safety risks to humans. Robots and automated machinery can handle dangerous tasks, reducing the likelihood of workplace accidents and injuries.

\r\n\r\n24/7 Operations
\r\nAutomated systems can operate around the clock without the need for breaks or shifts. This continuous operation can lead to increased output and faster turnaround times.

\r\n\r\nScalability
\r\nAutomated systems can easily scale up or down based on demand. This flexibility allows businesses to adapt to changes in production requirements without the need for a significant adjustment in workforce size.

\r\n\r\nData Collection and Analysis
\r\nAutomated systems generate vast amounts of data, which can be valuable for analysis and decision-making. This data-driven approach enables organizations to make informed strategic decisions.

\r\n\r\nConsistency in Processes
\r\nAutomation ensures that processes are consistently executed according to predefined standards. This is crucial in industries such as manufacturing and food production to maintain product consistency.

\r\n\r\nCompetitive Advantage
\r\nOrganizations that leverage automation often gain a competitive edge by delivering products and services faster, more efficiently, and at a lower cost than competitors relying solely on manual processes.

\r\n\r\nFocus on Complex Tasks
\r\nAutomation allows humans to focus on more complex, creative, and cognitive tasks that require critical thinking, problem-solving, and emotional intelligence.

\r\n\r\nMitigation of Workforce Challenges
\r\nIn certain industries facing labor shortages or challenges, automation can help fill the gaps, ensuring that critical tasks are still performed efficiently.
\r\n`, \r\n\r\n },\r\n { \r\n id: 7, \r\n date: \"Wednesday, March 27, 2024\",\r\n title: \"Top Usecases for Firewalls\", \r\n image: bg, \r\n description: `Firewalls play a pivotal role in network and cybersecurity, offering essential protection against a wide range of threats. Here's a concise overview of their top use cases:

\r\n\r\n1. Perimeter Protection:
\r\nFirewalls establish a barrier between internal networks and the Internet, filtering incoming and outgoing traffic based on predefined rules. These rules can include protocol, IP, port, application, time, and bandwidth filtering, allowing only authorized traffic to pass through.

\r\n\r\n2. Access Control:
\r\nFirewalls enable granular control over network resource access, essential for maintaining data confidentiality and meeting compliance requirements.

\r\n\r\n3. Intrusion Prevention System (IPS):
\r\nFirewalls equipped with IPS functionality actively identify and block malicious activities in real-time, including known attacks and zero-day exploits.

\r\n\r\n4. Virtual Private Network (VPN) Enforcement:
\r\nFirewalls often serve as gateways for VPN connections, providing secure access to internal network resources for remote users or branch offices. They authenticate and encrypt VPN traffic, ensuring data remains protected during transmission over untrusted networks.

\r\n\r\n5. Content Filtering:
\r\nFirewalls can filter web content based on predefined criteria such as website categories, URLs, or keywords. This allows organizations to enforce acceptable use policies and block access to inappropriate or malicious websites, reducing the risk of malware infections or data breaches.

\r\n\r\n6. Data Loss Prevention (DLP):
\r\nSome firewalls incorporate DLP features to monitor and prevent the unauthorized transmission of sensitive data outside the organization's network. They inspect outbound traffic for patterns or keywords indicating confidential information and take action to prevent data leaks.

\r\n\r\n7. Threat Intelligence Integration:
\r\nFirewalls leverage threat intelligence feeds to proactively detect and respond to emerging threats, enhancing cybersecurity posture.

\r\n\r\nOverall, firewalls are critical components of network security infrastructure, helping organizations mitigate risks, protect sensitive data, and maintain compliance with regulatory requirements.
\r\n`, \r\n },\r\n { \r\n id: 8, \r\n date: \"Monday, March 25, 2024\",\r\n title: \"Demystifying Cyber Security\", \r\n image: bg, \r\n description: `To start off with, what is cyber security?

\r\n\r\nCybersecurity is the practice of protecting internet-connected systems such as hardware, software, and data from cyber threats. It's used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.

\r\n\r\nThe digital threat landscape is numerous, disruptive with innovation, competing technologies, choices, alternatives, active and hence fast-paced and unpredictable, and requires a cohesive approach which cannot simply depend on human effort alone to detect, isolate, and action for threat elimination.

\r\n\r\nComprehensive deployment of effective software tools (including AI and ML driven) are to be effectively capitalized to simplify the detection and actioning in real-time.

\r\n\r\nHuman intervention is sought on specific functions which require further analysis to formulate the course of action which are beyond the capabilities of the tools deployed.

\r\n\r\nKey Functions of Cyber Security on the digital platforms include:
\r\n(1) Securing all end points (firewalls, access points, integration points, computing surfaces and devices, network equipment, etc.) with configurations with the required policies, restrictions, etc.

\r\n\r\n(2) Unified Identity and access management. Ensure that all user accounts are managed in a granular fashion.

\r\n\r\n(3) If the IT landscape under consideration is of a sizable proportion, then it demands the deployment of software platform to deal with the aggregation of all security threats, suspicious activities, and events to be filtered and prioritized for effective analysis and prompt decision making.

\r\n\r\n(4) The complementing part of the above functionality is for the actioning of such events for immediate resolutions. This will enable common and well articulated activities to be resolved through automation. Less known activities to be dealt with custom playbooks and unknown activities to be dealt with direct intervention.

\r\n\r\n(5) Constant evaluation of technological developments and updates in this sphere.

\r\n\r\nPertinent and overlapping technologies for detailed evaluation and consideration includes SIEM (Security Information and Event Management), EDR (Endpoint Detection and Response), XDR (eXtended Detection and Response), MDR (Managed Detection and Response), SOAR (Security Orchestration Automation and Response), etc.\r\n`, \r\n },\r\n { \r\n id: 9, \r\n date: \"Saturday, October 31, 2020\",\r\n title: \"The Context For eCommerce\", \r\n image: bg, \r\n description: `Present Context
\r\nThere is no foreseeable control or ending to the raging global pandemic. This is driving the need and realization for online fulfillment and convenience.

\r\n\r\nAs the COVID-19 pandemic reshapes our world, more consumers have begun shopping online in greater numbers and frequency. According to new data from IBM’s U.S. Retail Index, the pandemic has accelerated the shift away from physical stores to digital shopping by roughly five years.

\r\n\r\nIn the first six months of the year, consumers spent $347.26 billion online with U.S. retailers, up 30.1% from $266.84 billion for the same period in 2019, according to the latest Digital Commerce 360 analysis of U.S. Department of Commerce data. Comparatively, eCommerce sales during the first half of 2019 grew just 12.7% year over year.

\r\n\r\nDepartment stores, as a result, are seeing significant declines. In the first quarter of 2020, department store sales and those from other “non-essential” retailers declined by 25%. This grew to a 75% decline in the second quarter.

\r\n\r\nLarge retailers like Walmart and Target have embraced omnichannel fulfillment to their advantage. Both reported stellar earnings this month thanks to their earlier investments in e-commerce. In Walmart’s case, the pandemic helped drive e-commerce sales up 97% in its last quarter. Target set a sales record as its same-day fulfillment services grew 273% in the quarter. Amazon, naturally, has also benefited from the shift to digital with its recent record quarterly profit and 40% sales growth.

\r\n\r\nThis will drive a global/local trend that will evolve to be the new norm.

\r\n\r\nSome Facts Pertaining To Global eCommerce:
\r\n- Global eCommerce revenue: 4.2 Trillion. It is estimated that there will be 2.05 billion global digital buyers by 2020.
\r\n- The number #1 reason people shop online is that they’re able to shop at all hours of the day.
\r\n- 81% of consumers conduct online research before making a purchase online.
\r\n- 81% of consumers trust the advice of friends and family over businesses.
\r\n- 65% of shoppers look up price comparisons on their mobile device while in a physical store.
\r\n- 80% of people stop doing business with a company because of poor customer experience.
\r\n- Consumers are most likely to trust a business that makes it easy to contact people at the company.
\r\n- On average, only 2.86% of eCommerce website visits convert into a purchase.
\r\n- 69% of shopping carts are abandoned. The unexpected extra cost is the number one reason shoppers abandon carts. Abandoned cart follow-up emails have an average open rate of 45%.
\r\n- On average, 52% of online stores have omnichannel capabilities. This means they sell to and communicate with customers through multiple channels. For example, you might have a website, Facebook Shop, Instagram account, and an email list.
\r\n- Nearly half (48%) of online shoppers simply head straight to a large eCommerce marketplace.
\r\n- Mobile eCommerce is expected to account for 67.2% of digital sales in 2019. Users who have a negative experience on a mobile website are 62% less likely to purchase from that business in the future. Longer mobile page load times drastically increase bounces.
\r\n- Younger people spend more time shopping online than older people.

\r\n\r\nKey Pillars For eCommerce Success:
\r\n\r\n1. #1 eCommerce Platform Software:
\r\n- The need for ground-up development of eCommerce software is no longer a mandate due to the availability of robust platforms on both Open Source and Commercial Models.
\r\n- The challenge lies in customizing these for the #1 UI/UX experience and seamless process integration from order to delivery.

\r\n\r\n2. Secure Hosting Infrastructure for Throughput and Scale:
\r\n- Hosting infrastructure that can scale and perform within reasonable cost parameters.
\r\n- Tier 1 cloud computing facilities are widely available at commodity pricing on utilization-based charging models.

\r\n\r\n3. Payment Gateway:
\r\n- Many choices are available at affordable rates from PayPal to local offerings through banks and third-party establishments.

\r\n\r\n4. Delivery (Courier) Both Local and Overseas:
\r\n- Many choices from global courier giants to local establishments for prompt local deliveries at affordable rates and published delivery cycles.

\r\n\r\n5. A Product Portfolio that Makes Sense for Online Commerce and Revenue:
\r\n- Not all products are suitable for online commerce.
\r\n- From the customer's perspective: Will they make an online purchase of a given product?
\r\n- From the company’s perspective: Is it profitable to sell the item online from a cost, margin, and sales volume viewpoint?

\r\n\r\n6. Seamless Execution from Order to Delivery and Effective CRM:
\r\n- The whole process needs to be executed with tier 1 quality and consistency, requiring perfect coordination between software, people, processes, and external entities.
\r\n- Customer sentiment tracking and effective product portfolio relevance is essential.

\r\n\r\n7. Digital Marketing:
\r\n- Digital marketing is crucial to create reach, visibility, and subtle influence for successful conversion into purchases through SEO, SERP, SEM, SMM, etc.

\r\n\r\neCommerce Context in Sri Lanka:
\r\n- Over the last decade, the pillars for effective eCommerce have evolved and are in place for capitalization.
\r\n- Sri Lankan businesses should focus on capitalizing on the eCommerce platform to showcase exclusive/exotic produce/products for global/regional consumers.
\r\n- Focusing on cheap imported substandard products will not be sustainable due to high competition and low margins.

\r\n\r\nSources:
\r\n- [TechCrunch](https://techcrunch.com)
\r\n- [Digital Commerce 360](https://www.digitalcommerce360.com)`, \r\n },\r\n { \r\n id: 10, \r\n date: \"Wednesday, October 28, 2020\",\r\n title: \"Divergent Perspectives - Internet/eCommerce Statistics\", \r\n image: bg, \r\n description: `The internet serves as an unparalleled global connector, offering boundless opportunities for those who are bold, brave, and creative. Consider the staggering statistics:

\r\n\r\nKey Figures

\r\nGlobal Population: 8.1 Billion
\r\nMobile Users: 6.3 Billion (68%)
\r\nInternet Users: 5.3 Billion (66%)
\r\nSocial Media Users: 4.9 Billion (60%)

\r\n\r\nDetailed Insights

\r\nThe average person spends 6 hours and 30 minutes online daily.
\r\nThere are approximately 1.7 billion websites worldwide.
\r\nGlobal eCommerce generates $4.2 trillion in revenue.
\r\nPredictions suggested 2.05 billion digital buyers worldwide by 2020.
\r\nConvenience is the primary reason for online shopping, cited by 81% of consumers.
\r\n81% of shoppers conduct online research before making a purchase.
\r\nConsumer trust leans heavily towards recommendations from friends and family (81%).
\r\n65% of shoppers compare prices on mobile devices while in physical stores.
\r\nPoor customer experiences lead 80% of people to cease business with a company.
\r\nEasy accessibility to company representatives fosters consumer trust.
\r\nOn average, only 2.86% of eCommerce website visits convert to purchases, with 69% of shopping carts abandoned due to unexpected additional costs.
\r\nAbandoned cart follow-up emails achieve a 45% open rate.
\r\nApproximately 52% of online stores embrace omni-channel capabilities.
\r\nNearly half (48%) of online shoppers prefer large eCommerce marketplaces.
\r\nMobile commerce accounts for 67.2% of digital sales.
\r\nNegative mobile website experiences reduce future purchases by 62%.
\r\nLengthy mobile page load times significantly increase bounce rates.
\r\nYounger demographics allocate more time to online shopping.

\r\n\r\nSummary

\r\nNow is an optimal time to launch an online store.
\r\nBusinesses lacking online presence should establish one promptly.
\r\nPrioritize convenience in customer experience; platforms like Facebook Shop can facilitate this.
\r\nUtilize Google Shopping for product advertisement.
\r\nCraft comprehensive product pages to address consumer queries.
\r\nLeverage social proof to bolster trust and drive sales.
\r\nFocus on stellar customer service to enhance retention.
\r\nContinuously optimize website conversion rates.
\r\nStreamline checkout processes to reduce cart abandonment.
\r\nMinimize surprise fees and consider offering free shipping.
\r\nImplement automated email campaigns for abandoned carts.
\r\nOffer a seamless, personalized omni-channel experience.
\r\nCreate attention-grabbing ad designs.
\r\nBuild visitor trust through website optimization.
\r\nOpt for mobile-optimized website themes.
\r\nImprove website load speed by resizing images.
\r\nDefine and cater to a clear target market.\r\n`, \r\n },\r\n { \r\n id: 11, \r\n date: \"Thursday, July 30, 2020\",\r\n title: \"IOT - The Next Frontier Of Online Expansion\", \r\n image: bg, \r\n description: `The mobile is taking the Internet accessibility to the remaining frontiers of the global population.

\r\n\r\nInitiatives such as Tesla's Star-link project aims for global accessibility of high-speed internet at affordable rates.

\r\n\r\nCloud-based computing is making it possible for ubiquitous real-time computing capability.

\r\n\r\nThe next phase of the internet expansion is now being driven to bring on board all equipment, devices, etc. for greater interaction, integration and experience through IoT enablement.

\r\n\r\nBy 2025, it is estimated that there will be more than 21 billion IoT devices.

\r\n\r\nThis makes it possible for the ability to manage, track, integrate and interact at a more cohesive and holistic manner. Brings about unprecedented capabilities and possibilities for the world at large.

\r\n\r\nThese are all made possible through supporting technologies which includes voice enablement, AI, Big Data, VR, AR, etc.\r\n`, \r\n },\r\n { \r\n id: 12, \r\n date: \"Monday, July 27, 2020\",\r\n title: \"Voice - The Next Phase Of Digital Interaction\", \r\n image: bg, \r\n description: `All major players are into it and also with many solutions.

\r\n\r\nHowever, these are still at its infancy and are set to become mainstream in the days ahead.

\r\n\r\nVoice will provide that next level of ease of interaction with Digital. While this will not replace the existing methods but will for sure carve out a significant share of human to digital interactions and will also extend to Digital to Digital Interactions.

\r\n\r\nThe possibilities of Digital to Digital interactions over voice will also loosen up the rigid coding level integration to a more extensible speech related models.

\r\n\r\nVoice will enable a whole new world of possibilities.
\r\nFor example
\r\n* A CEO can just simply ask for the yesterday's sales and revenue figures while on holiday on a beachfront enjoying a cup of tea.
\r\n* An HR manager can simply ask who is absent to work or on leave while driving his way to the office.

\r\n\r\nVoice is set to dominate the enterprise as a key mechanism to interact with their digital assets for effective and instant updates and decision making.

\r\n\r\nA potential platform we are currently looking into at PragICTS is Amazon's Alexa. We also expect to venture into the other major alternatives by both Microsoft, Google, etc.

\r\n\r\nWhat is fueling these possibilities are primarily enabled by the rapid advancements in AI.\r\n`, \r\n },\r\n { \r\n id: 13, \r\n date: \"Saturday, July 25, 2020\",\r\n title: \"'H' - The Hyped Part of HRM / HCM\", \r\n image: bg, \r\n description: `While there has been notable progress in Human Resource Management (HRM) over recent decades, there remains a pervasive sense of unmet potential.

\r\n\r\nHRM has often been entangled in public relations and marketing endeavors rather than earnestly considering how to strike a harmonious balance between the needs of employees and employers.

\r\n\r\nThe Dilemma:
\r\nEmployers prioritize extracting maximum output at minimal cost.
\r\nEmployees seek maximum rewards with minimal exertion.

\r\n\r\nThough seemingly contradictory, deeper reflection reveals a nuanced line that warrants greater exploration.

\r\n\r\nPerhaps the starting point lies in empathetically considering each party's perspective. Genuine empathy is paramount.

\r\n\r\nA guiding principle to remember is that \"Life is not just about work, and work is not just about life.\" The goal is sustained productivity and well-being while honoring this premise.

\r\n\r\nConstructive measures such as strategic planning, training, automation, standardized processes, appropriate tools, and conducive work environments can contribute significantly to achieving these objectives, provided they are pursued with sincerity.

\r\n\r\nUltimately, the aim is to increase output efficiency with reduced effort.\r\n`, \r\n },\r\n { \r\n id: 14, \r\n date: \"Saturday, July 25, 2020\",\r\n title: \"Open Source Or Commercial Software ?\", \r\n image: bg, \r\n description: `The debate between open-source and commercial software is nuanced, with both options presenting their own advantages and drawbacks.

\r\n\r\nEach has its own user base, deployments, and dedicated supporters, showcasing their respective strengths.

\r\n\r\nUltimately, the effectiveness of either depends on the specific context in which they're being considered.

\r\n\r\nNeither option holds inherent superiority over the other; their suitability varies based on individual needs.

\r\n\r\nWhen making a decision, key factors to consider include:
\r\nCost implications
\r\nAvailability of skilled personnel
\r\nEase of implementation and mastery
\r\nCompatibility for integration and scalability
\r\nPlatform compatibility and interoperability

\r\n\r\nIt's crucial to approach the decision-making process objectively, avoiding being swayed by hype or one-sided marketing.

\r\n\r\nUltimately, the goal is to make an informed decision based on clear facts and considerations.\r\n`, \r\n },\r\n { \r\n id: 15, \r\n date: \"Friday, July 24, 2020\",\r\n title: \"Online Presence - A Must Have\", \r\n image: bg, \r\n description: `An online presence refers to the digital footprint or visibility that an entity maintains on the internet. While having a website or social media accounts can contribute to an online presence, simply having these platforms does not guarantee effective online visibility.

\r\n\r\nYes, having a website provides a foundational base for your online presence, offering a unique online address and location. Similarly, maintaining social media accounts can enhance your online presence by engaging with audiences on various platforms.

\r\n\r\nHowever, merely having these platforms does not ensure online discoverability. To truly establish an online presence, an entity must be easily discoverable by its target audience through multiple channels:
\r\nSearch: Ensuring that your website and content are optimized for search engines, making it easier for users to find you through search queries.
\r\nAdvertisements: Utilizing online advertising platforms to reach and engage with target audiences effectively.
\r\nContent: Creating high-quality and relevant content that resonates with your audience, increasing your visibility and credibility online.
\r\nSocial Platforms: Leveraging social media platforms to connect and interact with your audience, sharing content and engaging in conversations.

\r\n\r\nBy effectively leveraging these channels and ensuring discoverability across various online platforms, an entity can confidently claim to have established an online presence.\r\n`, \r\n },\r\n { \r\n id: 16, \r\n date: \"Friday, July 24, 2020\",\r\n title: \"Keep It Simple\", \r\n image: bg, \r\n description: `Simplicity is key to success, a principle that applies across all aspects of life, including IT and digital endeavors.

\r\n\r\nIn the fast-paced world of IT, constant innovation disrupts established practices. Striving for perfection in such a dynamic environment can be counterproductive.

\r\n\r\nChoices abound in IT, making navigation through alternatives challenging. It requires both broad and deep knowledge, as well as a steady approach, to find pragmatic solutions that suit current and future needs.

\r\n\r\nEvery solution has its benefits and risks. Balancing engineering efforts to meet requirements without over or under-engineering is crucial.

\r\n\r\nIn essence, simplicity, adaptability, and balance are fundamental to achieving success in the ever-evolving landscape of IT.\r\n`, \r\n },\r\n];\r\n\r\nconst Projects = () => {\r\n const [expandedProjectId, setExpandedProjectId] = useState(null);\r\n\r\n // Toggle function to expand/collapse description\r\n const toggleExpand = (id) => {\r\n setExpandedProjectId(expandedProjectId === id ? null : id);\r\n };\r\n\r\n // Truncate description to the first 4 lines\r\n const truncateDescription = (description, lines = 3) => {\r\n const lineBreaks = description.split('
').slice(0, lines).join('
');\r\n return lineBreaks;\r\n };\r\n\r\n return (\r\n
\r\n
\r\n //Blogs\r\n
\r\n\r\n
\r\n
\r\n
\r\n
\r\n {projects.map(project => (\r\n
\r\n
\r\n

{project.date}

\r\n

\r\n {project.title}\r\n

\r\n\r\n {/* Truncated or full description */}\r\n

\r\n \r\n

\r\n\r\n {/* Expand/Shrink functionality */}\r\n {expandedProjectId !== project.id && (\r\n \r\n )}\r\n\r\n {expandedProjectId === project.id && (\r\n \r\n )}\r\n
\r\n
\r\n ))}\r\n
\r\n
\r\n
\r\n
\r\n
\r\n );\r\n};\r\n\r\nexport default Projects;\r\n","import React from \"react\"\r\nimport HeroSlides from \"../components/hero-slides\"\r\nimport Layout from \"../components/layout\"\r\n\r\nimport Footer from \"../components/footer\"\r\n\r\nimport SocialIconsFooter from \"../components/social-icons-footer\"\r\n\r\nimport Projects from \"../components/projects\"\r\n\r\nconst IndexPage = () => {\r\n return (\r\n \r\n
\r\n
\r\n
\r\n
\r\n
\r\n
\r\n Scroll Down\r\n
\r\n \r\n
\r\n\r\n \r\n\r\n
\r\n\r\n {/* overview section */}\r\n \r\n \r\n \r\n\r\n \r\n
\r\n
\r\n \r\n )\r\n}\r\n\r\nexport default IndexPage\r\n"],"names":["SocialIconsFooter","React","className","href","target","slides","id","image","mainText","HeroSlides","map","slide","key","dangerouslySetInnerHTML","__html","projects","date","title","bg","description","Projects","expandedProjectId","setExpandedProjectId","useState","toggleExpand","truncateDescription","lines","split","slice","join","style","padding","marginTop","project","fontSize","textTransform","fontWeight","paddingBottom","textAlign","onClick","backgroundColor","IndexPage","Layout","pageTitle","Footer"],"sourceRoot":""}