We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Esiletõstetud
New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

2026-02-04TehisintellektKüberturvalisus

This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…

Rohkem

What is Phishing? Attack Types & Anti-phishing Tools for Business

2022-07-29 Küberturvalisus

Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.

Rohkem
CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

CITIC Pacific Special Steel: Empowered by Integrated ICT Solution for Digitalization and Intelligentization

2022-07-15 PilvÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusSD-WANDigitaalne transformatsioon

Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…

Rohkem
Network Construction: Beyond “Eastern Data and Western Computing”

Network Construction: Beyond “Eastern Data and Western Computing”

2022-05-13 PilvÜhendusedMajutuskeskusKüberturvalisus

In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations

Rohkem
Surge in Phishing Attacks Puts Cybersecurity in Peril

Surge in Phishing Attacks Puts Cybersecurity in Peril

2022-03-25 Küberturvalisus

In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…

Rohkem
Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

Global luxury beauty group partners with CITIC Telecom CPC undergo digital transformation

2022-03-18 PilvÜhendusedCustomer ExperienceMajutuskeskusKüberturvalisusDigitaalne transformatsioon

As digitalization becomes the new normal across all industries especially during a time when staying at home is encouraged, beauty is no exception. For nearly a decade, CITIC Teleco…

Rohkem
“Eastern Data and Western Computing” is in Full Swing

“Eastern Data and Western Computing” is in Full Swing

2022-03-04 PilvÜhendusedMajutuskeskusKüberturvalisusDigitaalne transformatsioon

Subsequent to the projects of “South–North Water Transfer”, “West–East Gas Pipeline” and “West–East Electricity Transmission”, one can expect a whole new national initiativ…

Rohkem
Email Security is Essential to Preventing Ubiquitous Phishing Attacks

Email Security is Essential to Preventing Ubiquitous Phishing Attacks

2022-02-25 Küberturvalisus

As the COVID-19 pandemic becomes more severe around the globe, more enterprises allow employees to work from home to lower infection risks. Email has therefore become the main daily…

Rohkem
Bridging Virtuality and Reality to Meet the Rise of Metaverse

Bridging Virtuality and Reality to Meet the Rise of Metaverse

2022-02-18 PilvÜhendusedMajutuskeskusKüberturvalisus

A time of crisis indeed opens up rare opportunities, and the pandemic has set the stage to enter the metaverse era. In the early days of the pandemic, many enterprises addressed the…

Rohkem

Upgrade Endpoint Security to Keep You Away from Data Breach!

2022-02-11 Küberturvalisus

During festive seasons, online purchases soar while cybercriminals gear up to launch attacks or frauds. Just before this Chinese New Year, a leading online shopping platform in Hong…

Rohkem
Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

Endpoint Detection & Response: Panacea for New Wave of Cyber Threats

2021-12-03 TehisintellektKüberturvalisus

Given a multitude of advanced cybersecurity threats, traditional security solutions are less effective in mitigating damage from data breaches or system failure.

Rohkem
SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

2021-10-15 ÜhendusedKüberturvalisusSD-WANDigitaalne transformatsioon

Subsequent to globalization, business expansion and new branch networks have raised the demand for cross-border communications. Enterprises have to seek a more advanced connectivity…

Rohkem
Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

2021-09-03 PilvKüberturvalisus

Ransomware is becoming highly sophisticated, which a new model has taken shape merely to attack enterprises. Global enterprises will be at stake once ransomware loses its control as…

Rohkem
Tooted ja Teenused
Euroopa lahendused Võrgustiku loomine Infoturve Pilvelahendused Pilvandmekeskus Internetiteenused Haldatavad teenused ICT-MiiND
Lahendused
Arhitektuur, projekteerimine ja ehitus Autotööstus BFSI Logistika ja transport Tootmine Õigus- ja raamatupidamisteenused Jaemüük Healthcare
Tehnoloogia ja teenused
Konsultatsiooniteenused Klienditeenindus
Infomaterjalid
Teenuste brozüürid Uued pakkumised Videod Valge raamat Edulood Blogi CPC Spotlights
Firmast
Meie firma Globaalsed ökosüsteemi partnerid Uudised Akrediteerimised ja auhinnad Karjäär
Võtke ühendust

Üldtelefon:
+3726223399
Müük:
+3726223360

Tehniline abi +372 622 33 90

Võtke ühendust

Jälgi meid

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Kuidas saada ühendust
Helistage meile

372 622 33 99

Kirjutage meile

Saatke meile oma küsimus