We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

2026-02-04AICybersecurity

This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…

More
What is Phishing? Attack Types & Anti-phishing Tools for Business

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29 Cybersecurity

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.

More
CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

2022-07-15 CloudNetworkCustomer ExperienceData CenterCybersecuritySD-WANDigital Transformation

Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…

More
Network Construction: Beyond “Eastern Data and Western Computing”

Network Construction: Beyond “Eastern Data and Western Computing”

2022-05-13 CloudNetworkData CenterCybersecurity

In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations

More
Surge in Phishing Attacks Puts Cybersecurity in Peril

Surge in Phishing Attacks Puts Cybersecurity in Peril

2022-03-25 Cybersecurity

In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…

More
Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

2022-03-18 CloudNetworkCustomer ExperienceData CenterCybersecurityDigital Transformation

As digitalization becomes the new normal across all industries especially during a time when staying at home is encouraged, beauty is no exception. For nearly a decade, CITIC Teleco…

More
“Eastern Data and Western Computing” is in Full Swing

“Eastern Data and Western Computing” is in Full Swing

2022-03-04 CloudNetworkData CenterCybersecurityDigital Transformation

Subsequent to the projects of “South–North Water Transfer”, “West–East Gas Pipeline” and “West–East Electricity Transmission”, one can expect a whole new national initiativ…

More
Email Security is Essential to Preventing Ubiquitous Phishing Attacks

Email Security is Essential to Preventing Ubiquitous Phishing Attacks

2022-02-25 Cybersecurity

As the COVID-19 pandemic becomes more severe around the globe, more enterprises allow employees to work from home to lower infection risks. Email has therefore become the main daily…

More
Bridging Virtuality and Reality to Meet the Rise of Metaverse

Bridging Virtuality and Reality to Meet the Rise of Metaverse

2022-02-18 CloudNetworkData CenterCybersecurity

A time of crisis indeed opens up rare opportunities, and the pandemic has set the stage to enter the metaverse era. In the early days of the pandemic, many enterprises addressed the…

More
Upgrade Endpoint Security to Keep You Away from Data Breach!

Upgrade Endpoint Security to Keep You Away from Data Breach!

2022-02-11 Cybersecurity

During festive seasons, online purchases soar while cybercriminals gear up to launch attacks or frauds. Just before this Chinese New Year, a leading online shopping platform in Hong…

More
Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

2021-12-03 AICybersecurity

Given a multitude of advanced cybersecurity threats, traditional security solutions are less effective in mitigating damage from data breaches or system failure.

More
SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

2021-10-15 NetworkCybersecuritySD-WANDigital Transformation

Subsequent to globalization, business expansion and new branch networks have raised the demand for cross-border communications. Enterprises have to seek a more advanced connectivity…

More
Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

2021-09-03 CloudCybersecurity

Ransomware is becoming highly sophisticated, which a new model has taken shape merely to attack enterprises. Global enterprises will be at stake once ransomware loses its control as…

More
Products & Services
Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services ICT-MiiND Europe Solutions
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog CPC Spotlights
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +81 3 5339 1968

Service Hotline +81 53 1086 0011

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue