News & Events

News, Views & Events

Latest News & Our Event in Maldives, Product Updates, Technology Updates, Online Training, and many more. Also, we encourage you to follow us on Social Media to get news in flash.


The Systems Workshop CIO FORUM 2022
The Systems Workshop CIO FORUM 2022


TSW CIO FORUM 2022 is brought to you by The Systems Workshop Pvt Ltd (TSW) together with Check Point Software Technologies, Commvault Systems Inc, Kaspersky, Barracuda Networks, ManageEngine, Synology and many more on 29th March 2022 at Paradise Island Resort, Maldives.

This year’s event will be the 2nd CIO Forum hosted by TSW along with our principals. The CIO Forum is especially designed for CIO’s, Heads of IT and other IT decision makers to help them to be up to-date on the developments in ICT eco-space.

Furthermore, this Forum is also an excellent opportunity for you to network with your peers in the industry in one of the most scenic settings Maldives has to offer. You will also get an opportunity to interact with some of the most senior overseas business managers representing world class solutions.

July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence

Check Point Research finds sharp increase in the Emotet botnet spreading spam campaigns after period of inactivity, aiming to steal banking credentials and spread inside targeted networks

Our latest Global Threat Index for July 2020 has revealed that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organizations globally.

Since February 2020, Emotet’s activities – primarily sending waves of malspam campaigns – started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when the Emotet botnet ceased activity during the summer months but resumed in September.

In July, Emotet was spreading malspam campaigns, infecting its victims with TrickBot and Qbot, which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious doc file with names like “form.doc” or “invoice.doc”. According to researchers, the malicious document launches a PowerShell to pull the Emotet binary from remote websites and infect machines, adding them to the botnet. The resumption of Emotet’s activities highlights the scale and power of the botnet globally.

It is interesting that Emotet was dormant for several months earlier this year, repeating a pattern Check Point first observed in 2019.  Check Point researchers assume that the developers behind the botnet were updating its features and capabilities. But as it is active again, organizations should educate employees about how to identify the types of malspam that carry these threats and warn about the risks of opening email attachments or clicking on links from external sources. Businesses should also look at deploying anti-malware solutions that can prevent such content reaching end-users.

The research team also warns that “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 44% of organizations globally, followed by “OpenSSL TLS DTLS Heartbeat Information Disclosure” which impacts 42% of organizations worldwide. “Command Injection Over HTTP Payload” is in third place, with a global impact of 38%.

check point, firewall, malware, emotet
News, Events, Synology, Networks attached storage, Computers, Server, Backup

Synology Drive leads a new-era of file collaboration

Surpassing Cloud Station in every way imaginable

Reflecting our core belief that data should be accessible anywhere, Cloud Station offers a private cloud solution allowing you to instantly sync files across multiple platforms while retaining historical versions of important files for recovery purposes. Having served over 1.6 million offices and families since its debut 6 years ago, Cloud Station developed many advanced features to adapt to users’ various needs, allowing you to seamlessly access and sync files across NAS servers, PCs, and mobile devices.

check point
Mobile Adware : the silent plague with no Origin

According to Check Point Software, 27% of companies worldwide have suffered attacks on their mobile devices, showing a clear upward trend of sixth generation attacks

We are witnessing a plague of mobile adware, one of the most common forms of cyber-threats designed to collect personal information from a user’s device. Roughly 4 billion people1are connected to the internet via their smartphone, yet companies rarely prioritize mobile security. Check Point’s  Cyber Security Report 2020 shows that in 2019, 27% of companies suffered a cyber-attack because the security of a mobile device was breached.

“It only takes one compromised mobile device for cybercriminals to steal confidential information and access an organizations corporate network,” explains Yael Macias, Product Marketing Manager from Check Point. “More and more mobile threats are created each day, with higher levels of sophistication and larger success rates. Mobile adware, a form of malware designed to display unwanted advertisements on a user’s screen, is utilized by cybercriminals to execute sixth-generation cyber-attacks.”

Check Point Mobile Adware Protection
TSW CIO Forum 2019

TSW CIO Forum 2019​

TSW CIO Forum 2019 was held in Adaarn Hudhuranfushi Resort on 27th & 28th July 2019 for the 1st Time..​

Commvault Continues To Stand Out With Data Breakthrough Award Win

The Systems Workshop (TSW) CIO FORUM 2019 was held in Adaaran Hudhuran Fushi Resort on 27th & 28th July. The Event was inaugurated by Hon. Minister Communication & Technology Maleeh Jamal. The Idea behind the TSW CIO Forum is to create an idea sharing platform for Maldives IT community. Forum will be the medium to disseminate the latest technology enhancements in the field, IT Best Practices, Training and last but not least to create wide network among the community.    

Commvautlt Breakthrough Award
ManageEngine Multicloud-Adoption-blog
manage engine
Five worthy reads: How should your business approach multi-cloud adoption?

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. In this edition, we’ll learn about the multi-cloud strategy, why you should consider it and how to implement it in your organization.


Have you ever been driving along, pulled up to a stop light, and wondered why that stop light was put there in the first place? Or wondered about all other rules we follow on the road, like obeying yield signs or the single and double yellow lines on the road?

Read More

Check Point Firewall OT
Commvault Wins Gartner Peers Sight Customer's Choice for Year 2020 Enterprise Data Backup & Recovery

Tinton Falls, N.J. – February 24, 2020 – Commvault (NASDAQ: CVLT), a recognized global enterprise software leader in the management of data across cloud and on-premises environments, is excited to share that, for the third time in a row, Commvault was named a Gartner Peer Insights Customers’ Choice for Data Center Backup and Recovery Solutions.


Commvault for Microsoft Office 365 Backup and Recovery
Introducing Unified Controller Synology UC3200​
Forcepoint Minute Ep. 1 – Email Phishing
Kaspersky Safe Kids Parental Portal Tour
CrowdStrike Falcon: The Breach Prevention Platform
Whiteboard Thinking Barracuda ADC
Visit Our YouTube Channel
for more Insightful Videos
Hi There.!