We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

2026-02-04AICybersecurity

This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…

More
How to Maintain Your Business Continuity during Disease Outbreaks?

How to Maintain Your Business Continuity during Disease Outbreaks?

2020-02-14 NetworkData CenterCybersecurity

Extreme events such as disease outbreaks and natural disasters happen frequently in recent years. In this globalized economy, corporates suffer from these extreme events and their b…

More
New Threats of Ransomware

New Threats of Ransomware

2020-01-10 Cybersecurity

Ransomware has been raging around the world in recent years. Some victims refused to pay the ransom and tried to hide the breach. This spurred cybercriminals to change their strateg…

More
New Era of Cyber Security with Artificial Intelligence (AI)

New Era of Cyber Security with Artificial Intelligence (AI)

2019-12-13 AICybersecurity

Along with the significant numbers of cyber-attacks across different industries, cybersecurity becomes inevitable for enterprises.

More
How Artificial Intelligence is Transforming Your Business?

How Artificial Intelligence is Transforming Your Business?

2019-09-27 AICybersecurityDigital Transformation

No one can deny that artificial intelligence (AI) and machine learning technologies are already transforming the world of business. According to Gartner's 2019 CIO Agenda survey, or…

More
Tomorrow with Secure Cloud

Tomorrow with Secure Cloud

2019-09-20 CloudCybersecurity

Cloud computing is becoming an ideal on-demand solution when it comes to the delivery of enterprise infrastructure, software and platforms...

More
Security in IoT Cyber World

Security in IoT Cyber World

2019-09-06 Cybersecurity

Internet-of-things (IoT) is growing exponentially across various industries and transforming our daily lives, such as automotive, healthcare, logistics, telecom and manufacturing.

More
Hackers stole millions of Bulgarians' financial data by exploiting vulnerability

Hackers stole millions of Bulgarians' financial data by exploiting vulnerability

2019-07-22 Cybersecurity

The system of Bulgaria's National Revenue Agency (NRA) was hacked. The financial data of almost all taxpayers in the country was found to be stolen by hackers. The incident becomes …

More
CITIC Telecom CPC Facilitates Enterprises' Digital Globalization with its

CITIC Telecom CPC Facilitates Enterprises' Digital Globalization with its "Global Local" Expertise

2019-07-19 AIData AnalyticsCloudNetworkData CenterCybersecurityIntelligent InnovationSD-WANDigital Transformation

In the era of globalization, new economic models continue to emerge. Smart technologies are reinforcing enterprises innovation, and digital transformation is crucial for the success…

More
[Enterprise InfoSec Series] 60% of Cyberattacks Originated from Insider Threats?!

[Enterprise InfoSec Series] 60% of Cyberattacks Originated from Insider Threats?!

2019-03-29 NetworkCybersecurity

Recently, companies encourage employees to bring their own devices (BYOD) to workplace, to access corporate networks, confidential documents and important data. If these devices are…

More
The“Outline Development Plan for the Guangdong-Hong Kong-Macao Greater Bay Area

The“Outline Development Plan for the Guangdong-Hong Kong-Macao Greater Bay Area"

2019-03-27 CybersecurityIntelligent Innovation

The “Outline Development Plan for the Guangdong-Hong Kong-Macao Greater Bay Area" was officially launched. One of the key strategies is the development of innovation.The Plan sugge…

More
30th Anniversary of the WWW

30th Anniversary of the WWW

2019-03-20 Cybersecurity

The World Wide Web (WWW), the Internet Protocol (IP), and Google’s algorithms are three important inventions of the 20th century. This month is the 30th anniversary of the WWW.

More
The biggest risks facing our world in 2019

The biggest risks facing our world in 2019

2019-02-20 Cybersecurity

The Internet has become part of our daily lives. While technology brings convenience, the importance of information security cannot be ignored. In the recent release of World Econom…

More
Products & Services
Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services ICT-MiiND Europe Solutions
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog CPC Spotlights
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +852 2170 7401

Service Hotline +852 2331 8930

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue