SlideShare a Scribd company logo
1 of 43
UCLOUD ASIA
W E L C O M E T O
PTE LTD
COMPANY
UCloud Asia Pte Ltd provides consulting, management, advisory and
professional managed services to small and medium enterprises
(SMEs) around the region that are looking for cloud-based solutions
to their various IT and applications needs,
We focus to provide enterprise grade email system to enable
customer has worry free service.
Steven Chin
Director
Experienced Director with multiple skill sets supporting SME in Digital Transformation. Combined 18 years of experiences
in startups, sales, business development, strategic marketing, Cloud services, IT managed service, IT strategy, IT Service
Management, Web Hosting management and digital media.
Email: steven.chin@ucloud.sg
My Journey
Run my own site since 1997
At first using free hosting service such as Geocities
which is popular in 90s
Register my first domain name
Register .freehtml.com in year 1997
Want to bring quality hosting to
Singapore
At that time there are few Singapore web hosting
company.
Our Journey
2002
Started Venture Domain
Hosting
2003
Launch web hosting services
and domain name registration
services
2005
Launch Enterprise Exchange
Hosting
2006
Launch Enterprise File Sync
Our Journey
2006
Launch Multi-Structure Hybrid
DNS
2010
Launched VPS services
2016
Started Ucloud Asia to bring
along IT Managed Services.
PRESENT
Focus helping customer make
use of cloud services.
Reduction or more
in IT expenditures with managed
services.
Business Agreed
Managed IT Service make
improvement to business process.
SME
Actively seeking to employ
technology to solve business
problem..
50% 70% 80%
Did you know that
We can help
Get up to 85% subsidy
from SMB Grant Hub
• Best of all there is no tedious
paperwork application and you
only pay the subsidized
amount.
• In addition, the subsidies are
recurring every year and no
expiry.
Get up to 85% subsidy from
SMB Grant Hub
• Enterprise Exchange Email boxes
• Enterprise File Sync storage
(Box.com/Dropbox/GoogleDrive/OneDrive etc)
• Secure VPN
• Cloud VPS
• VPS
• Business Fiber Broadband
• Microsoft Office
• Endpoint Solution
• (AVG/Avast/Bitdefender/Kaspersky/Malywarebytes/
Trend Micro/Sophos/Symantec)
• Data Backup
• Disaster Recovery (Ransomware Recovery)
• IT Managed Services
Our Services
Cloud Solutions
Help company move to the cloud. Do
more anytime anywhere with Cloud
services.
Business Security
Enhance your company security.
Protect critical business data from
hackers and ransomware.
Data Center and Hosting
Data Centre services. VPS Hosting.
Co-location
Networking
Internet Fiber broadband and
networking services. Help your
business connect with the world.
IT Managed Services
IT as a Service – Let you focus on your
business. We will take care IT for you.
Data Recovery and Backup
Data recovery and backup solutions to
ensure no data loss.
Cloud Solutions
Cloud computing can be a great proposition for SMEs, as it has the ability to reduce complexity, cost and IT resource that
often comes with on-premise solutions.
Amazon Web Services
Secure cloud services platform,
offering compute power,
database storage, content
delivery and other functionality
to help businesses grow.
Microsoft Azure
Turn your ideas into solutions
faster using a trusted cloud
that is designed for you.
Google Cloud Platform
Google Cloud Platform lets you
build and host applications and
websites, store data, and analyze
data on Google's scalable
infrastructure.
Aliyun
provides a suite of cloud
computing services that
covers elastic computing,
object storage, relational
database, big data analysis,
and artificial intelligence
Internet Broadband and Networking
Internet Fiber broadband and networking services. Help your business connect with the world.
Let UCloud Asia help you get connected to bring your business to the next level.
We worked with the major ISP locally and internationally to bring you the best internet connection.
Singtel
Singtel Fibre Broadband
services and co-location
Starhub
Starhub Fibre
Broadband service
and co-location.
M1
M1 Mobile and
Colocation
service
ViewQwest
Business and residential
Fibre broadband service
My Republic
Business and residential
Fibre broadband service
Data Centre and Hosting
We provide datacenter services ranging from business web hosting, email hosting, VPS hosting, co-location and domain
name registration services since the year 2002.
Data Centre and Hosting
Managed data centre and web hosting services
Co-location
24/7 secured rack with surveillance and access
control ensures your servers and appliances are
protected
Virtual Private Server (VPS)
With VPS hosting, you are allocated guaranteed
server resources, and have full control of your
operating system to install software that you need.
Dedicated Server
Managed dedicated servers for maximum
performance, customizability and satisfaction.
Business Hosting
Enterprise-level web hosting with premium features.
Business Security
Enhance your company security. Protect critical business data from hackers and ransomware.
Business Security
Enhance your company security. Protect critical business data from
hackers and ransomware.
Total Data Protection
Safeguard businesses from IT disasters, human error,
and malicious activity
Ransomware Protection
Cybercriminals want your money. Stop them before
they attack you.
Business Continuity and Disaster Recovery
Protect your business against unknown risks with frequent
backup of your entire business infrastructure.
Disaster Recovery as a Service
If disaster strike, recover your data, servers, desktop
and the entire infrastructure to a virtual environment in
seconds.
AVG
Give you all the top-rated
antivirus protection. From
instant email alerts about
threats and to remote admin
tools that help you manage
online security on the move.
Avast
Stay focused on your endgame
and leave your endpoint security to
us. On-premise or cloud-based, we
scale to your business — whatever
its size, network, or devices.
Sophos
Next-gen security with real-time
intelligence sharing between your
endpoints and firewall. Unified
protection against ransomware
attack.
Bitdefender
Delivers the best security,
unparalleled performance and
incredible ease of use for your
home PC, business, hybrid
infrastructure or datacentre
IT Manage Service
Focus on your business and leave your IT support to us. Our
affordable and professional IT support maintenance package
covers all your office computing equipment such as desktop,
laptops, tablets, networking equipment and printers. Our
team of qualified IT will keep your office computing
environment running optimally.
Fixed Monthly Price
Our package prices comes in a fixed monthly price so
that you will not have any bill shock.
Control Your IT Cost
Ensuring you buy only what you need, at a cost
effective price.
Increase Productivity
Reduce the impact to your business operation by
reducing IT system failure. Ensure shortening time to
resolve issues.
Protected Business Information
Data backup service ensure you have peace of mind
knowing all critical business and customer data can
be quickly recovered.
Disaster Recovery and Backup
Backup your data before disaster strike!
Total Data Protection
Safeguard businesses from IT disasters, human error,
and malicious activity
Ransomware Protection
Cybercriminals want your money. Stop them before
they attack you.
Business Continuity and Disaster Recovery
Protect your business against unknown risks with frequent
backup of your entire business infrastructure.
Disaster Recovery as a Service
If disaster strike, recover your data, servers, desktop
and the entire infrastructure to a virtual environment in
seconds.
Ecommerce Overview
What is Ecommerce?
Some common things to look out for
Transaction across internet
Any type of business, or commercial transaction, that
involves the transfer of transaction across the
Internet.
Online Payment
Using Payment Gateway to process your online
transaction so that customer can pay you using Credit
Card
Delivery
Deliver products to your customer
Driving Traffic to your store
Traffic is important to your online store.
Exponential Growth of Ecommerce
Why so many SMB is going for ecommerce?
Access to Tech
Rising access to technology
– easier to setup
Simpler Payment
Simpler and easier payment
gateway to allow collection of
payment.
Social Media
Instant trends, global trends
Logistic n Delivery
Improved logistics and
digitized delivery
Type of Ecommerce
There are 4 type
Business to Business (B2B)
Market place such as Alibaba
Business to Consumer (B2C)
Market place such as Qoo10, Amazon
Consumer to Consumer (C2C)
Eg Carousel
Online Store
Data backup service ensure you have peace of mind
knowing all critical business and customer data can
be quickly recovered.
How to start your
ecommerce?
1. Market place 2. Start your own ecommerce store?
Market Place
1. Easier to start.- No
technical needed to setup
hosting/domain
name/backend system
2. Need to pay high
commission to Market
Place – eat into your
margin
3. Not able to customized
store function
4. Delivery may be pre-
arranged – most need to
pay
Own Ecom Store
1. Technical knowledge
needed to setup
hosting/domain
name/backend system
2. NO-Need to pay
commission to Market
Place
3. Full control to customized
store function
4. Delivery may be pre-
arranged – most need to
pay
Key component of your own ecommerce store
Key Component – Own Ecom Store
Catalogue and Product
Information
Checkout Capability &
Payment Gateway
Inventory and Order
Management
Logistics and
Delivery
Management
Why go with Shopify?
Shopify is a subscription based service to let you start your
own store easily. Start with trail now!
Low Investment
Affordable price to start
selling online
No Coding needed
Need not hire web developer
Integrate with
Payment
Start getting pay now
Security
Cloud based security
Shopify (Self-managed )
Pricing Plan Table
BASIC SHOPIFY
2 staff, unlimited products, unlimited
storage, Free SSL
$45/MO*
SHOPIFY
5 staff, unlimited products, unlimited
storage, Free SSL,Gift Cards,
Professional Report , Abandon cart
recovery
$125/MO*
ADV SHOPIFY
5 staff, unlimited products, unlimited
storage, Free SSL,Gift Cards,
Professional Report , Abandon cart
recovery, Advanced Report Builder
$480/MO*
* Based on per site per month
Shopify (Managed Service)
Pricing Plan Table
SET UP (ONE-TIME)
• To configure domain name to link up with
Shopify store.
• To setup the Shopify account with account login
• To setup the Shopify contact us page
• To setup Shopify Home Page
• To setup Shopify Online Store
• To setup Shopify with Paypal
$180
MANAGED SERVICE
• Manage Shopify
• Provide 1st Level Support
$125/MO*
DOMAIN NAME
• Register Domain Name
$75/YR*
Shopify
Feature Table
Transaction fees
Paypal Fees
Step by step setting up Shopify
Steps to Setup
Site Planning
- Plan site structure
- Plan Product category
- Plan Payment Gateway to use.
- Plan Logistic and Delivery
Product
Management
- Upload Product.
Setup Payment
- Linked up with Payment such
as Paypal
Sign Up Shopify
- Setup Shopify Account
- Link up own domain name
Launch Site
- Publish your site and start
selling.
Enter your subhead line here
Getting Ready for Ecommerce
Site Related
• Domain Name
• Logo File
• Images related to your business and
product range
Operation Related
• Paypal / Payment gateway
• Business Email / Phone Number
• Terms and Conditions / Policies
Product Related
• Product Images
• Product Title Descriptions
• List price and Selling Price of
Products
Marketing Related
• Keywords Identifications
• Bio of your business/ Story /Mission
etc
• Social Media Assets – Facebook,
Instagram , LinkedIn, Twitter
SITE DEMO
www.dealsantivirus.com
We are dealing with many international
customer and supplier and your Enterprise
Exchange Hosting ensure I have peace of
mind that my business email data are well
secured!
(Customer since year 2012)
Mehul
We switched to Enterprise Exchange
Hosting after we are hit by lots of email
issue such as low email quota, unable to
sync my emails.
(Customer since year 2013)
Ben Soh
Testimonial
Company name and title omitted to keep customer data confidential
We are looking for
1. Company or individual that want to help us resell our Enterprise
Exchange Hosting, Enterprise File Sync.
2. Industry: Accounting Firm, Web Design Firm, SEO/Internet Marketing
Firm
Industry we like to help
1. F & B
2. Financial Services
3. Property Services
4. Recruitment Services
5. Law Services
6. Medical Services
7. Retail Services
8. Engineering Services
Contact Us to find out more
Ucloud Asia Pte Ltd
60 Paya Lebar Road
#09-38
Singapore 409051
steven.chin@ucloud.sg
www.ucloud.sg
+65 6100 8223
Q&A
Get up to 85% subsidy
from SMB Grant Hub
• Best of all there is no tedious
paperwork application and you
only pay the subsidized
amount.
• In addition, the subsidies are
recurring every year and no
expiry.
Get up to 85% subsidy from
SMB Grant Hub
• Enterprise Exchange Email boxes
• Enterprise File Sync storage
(Box.com/Dropbox/GoogleDrive/OneDrive etc)
• Secure VPN
• Cloud VPS
• VPS
• Business Fiber Broadband
• Microsoft Office
• Endpoint Solution
• (AVG/Avast/Bitdefender/Kaspersky/Malywarebytes/
Trend Micro/Sophos/Symantec)
• Data Backup
• Disaster Recovery (Ransomware Recovery)
• IT Managed Services

More Related Content

What's hot

Perpetual IT Are A Very Trustworthy Organisation
Perpetual IT Are A Very Trustworthy OrganisationPerpetual IT Are A Very Trustworthy Organisation
Perpetual IT Are A Very Trustworthy Organisationperpetualit
 
Edgewater computer repair
Edgewater computer repairEdgewater computer repair
Edgewater computer repairJDTechSolutions
 
Soma IT - South East Queensland Telstra Accredited ICT Partner
Soma IT -  South East Queensland Telstra Accredited ICT PartnerSoma IT -  South East Queensland Telstra Accredited ICT Partner
Soma IT - South East Queensland Telstra Accredited ICT PartnerManmohan Singh
 
Conquer the world from Luxembourg, EBRC
Conquer the world from Luxembourg, EBRCConquer the world from Luxembourg, EBRC
Conquer the world from Luxembourg, EBRCPaperjam_redaction
 
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORT
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORTCHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORT
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORTperpetualit
 
Court presentation web
Court presentation webCourt presentation web
Court presentation webTraci Youngman
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computingessentialdata
 
ESDS_Corporate_Profile
ESDS_Corporate_ProfileESDS_Corporate_Profile
ESDS_Corporate_ProfileRavi Shandilya
 
PCMan Integra Solution Business
PCMan Integra Solution BusinessPCMan Integra Solution Business
PCMan Integra Solution Businessyanto Ligman
 

What's hot (15)

Perpetual IT Are A Very Trustworthy Organisation
Perpetual IT Are A Very Trustworthy OrganisationPerpetual IT Are A Very Trustworthy Organisation
Perpetual IT Are A Very Trustworthy Organisation
 
NourNet Profile 2019
NourNet Profile 2019NourNet Profile 2019
NourNet Profile 2019
 
Edgewater computer repair
Edgewater computer repairEdgewater computer repair
Edgewater computer repair
 
Soma IT - South East Queensland Telstra Accredited ICT Partner
Soma IT -  South East Queensland Telstra Accredited ICT PartnerSoma IT -  South East Queensland Telstra Accredited ICT Partner
Soma IT - South East Queensland Telstra Accredited ICT Partner
 
Conquer the world from Luxembourg, EBRC
Conquer the world from Luxembourg, EBRCConquer the world from Luxembourg, EBRC
Conquer the world from Luxembourg, EBRC
 
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORT
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORTCHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORT
CHOOSE PERPETUAL IT FOR YOUR LONDON IT SUPPORT
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
LOGIX PROFILE
LOGIX PROFILELOGIX PROFILE
LOGIX PROFILE
 
Hoboken computer repair
Hoboken computer repairHoboken computer repair
Hoboken computer repair
 
Court presentation web
Court presentation webCourt presentation web
Court presentation web
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
 
E-Business
E-BusinessE-Business
E-Business
 
ESDS_Corporate_Profile
ESDS_Corporate_ProfileESDS_Corporate_Profile
ESDS_Corporate_Profile
 
PCMan Integra Solution Business
PCMan Integra Solution BusinessPCMan Integra Solution Business
PCMan Integra Solution Business
 
Managed servoes 2mb
Managed servoes 2mbManaged servoes 2mb
Managed servoes 2mb
 

Similar to Ecommerce - Choosing Shopify as your ecommerce platform

How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...UCloud Asia Pte Ltd
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Pte Ltd
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
 
INET Brochure of Services
INET Brochure of ServicesINET Brochure of Services
INET Brochure of Servicesinetcs
 
CITS We Make IT Simpler
CITS We Make IT SimplerCITS We Make IT Simpler
CITS We Make IT SimplerSteve Meyer
 
it support and service in san diego & carlsbad
  it support and service in san diego & carlsbad  it support and service in san diego & carlsbad
it support and service in san diego & carlsbadBhavin V Mehta
 
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business DevicesCloudSmartz
 
Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Keith Shaffer
 
Looking for Managed Services in Johannesburg?
Looking for Managed Services in Johannesburg?Looking for Managed Services in Johannesburg?
Looking for Managed Services in Johannesburg?Tcgcape
 
Everything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileEverything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileCloud Solutions SA
 
Managed IT Service Providers.pptx
Managed IT Service Providers.pptxManaged IT Service Providers.pptx
Managed IT Service Providers.pptxmaximumnetworks
 
Technology Source Role of a Technology Advisor
Technology Source Role of a Technology AdvisorTechnology Source Role of a Technology Advisor
Technology Source Role of a Technology AdvisorTechnologySource
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it wordsApixel IT Support
 
Atlantic Digital - Corporate Overview
Atlantic Digital - Corporate OverviewAtlantic Digital - Corporate Overview
Atlantic Digital - Corporate OverviewMarc Shen
 

Similar to Ecommerce - Choosing Shopify as your ecommerce platform (20)

How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...How can Enterprise Email Security and Enterprise File Security protect compan...
How can Enterprise Email Security and Enterprise File Security protect compan...
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
INET Brochure of Services
INET Brochure of ServicesINET Brochure of Services
INET Brochure of Services
 
IT Support
IT SupportIT Support
IT Support
 
CITS We Make IT Simpler
CITS We Make IT SimplerCITS We Make IT Simpler
CITS We Make IT Simpler
 
Brochure01
Brochure01Brochure01
Brochure01
 
it support and service in san diego & carlsbad
  it support and service in san diego & carlsbad  it support and service in san diego & carlsbad
it support and service in san diego & carlsbad
 
Entero pty ltd
Entero pty ltdEntero pty ltd
Entero pty ltd
 
Profile
ProfileProfile
Profile
 
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
[BROCHURE] Choosing the Right MSP to support All of Your Business Devices
 
Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1Introduction to Managed IT Services_v1
Introduction to Managed IT Services_v1
 
Looking for Managed Services in Johannesburg?
Looking for Managed Services in Johannesburg?Looking for Managed Services in Johannesburg?
Looking for Managed Services in Johannesburg?
 
Everything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profileEverything computer IT related solutions-6 page profile
Everything computer IT related solutions-6 page profile
 
SCS Service_PPT
SCS Service_PPTSCS Service_PPT
SCS Service_PPT
 
Managed IT Service Providers.pptx
Managed IT Service Providers.pptxManaged IT Service Providers.pptx
Managed IT Service Providers.pptx
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
Technology Source Role of a Technology Advisor
Technology Source Role of a Technology AdvisorTechnology Source Role of a Technology Advisor
Technology Source Role of a Technology Advisor
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 
Atlantic Digital - Corporate Overview
Atlantic Digital - Corporate OverviewAtlantic Digital - Corporate Overview
Atlantic Digital - Corporate Overview
 

Recently uploaded

VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 

Recently uploaded (20)

VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 

Ecommerce - Choosing Shopify as your ecommerce platform

  • 1. UCLOUD ASIA W E L C O M E T O PTE LTD
  • 2. COMPANY UCloud Asia Pte Ltd provides consulting, management, advisory and professional managed services to small and medium enterprises (SMEs) around the region that are looking for cloud-based solutions to their various IT and applications needs, We focus to provide enterprise grade email system to enable customer has worry free service.
  • 3. Steven Chin Director Experienced Director with multiple skill sets supporting SME in Digital Transformation. Combined 18 years of experiences in startups, sales, business development, strategic marketing, Cloud services, IT managed service, IT strategy, IT Service Management, Web Hosting management and digital media. Email: steven.chin@ucloud.sg
  • 4. My Journey Run my own site since 1997 At first using free hosting service such as Geocities which is popular in 90s Register my first domain name Register .freehtml.com in year 1997 Want to bring quality hosting to Singapore At that time there are few Singapore web hosting company.
  • 5. Our Journey 2002 Started Venture Domain Hosting 2003 Launch web hosting services and domain name registration services 2005 Launch Enterprise Exchange Hosting 2006 Launch Enterprise File Sync
  • 6. Our Journey 2006 Launch Multi-Structure Hybrid DNS 2010 Launched VPS services 2016 Started Ucloud Asia to bring along IT Managed Services. PRESENT Focus helping customer make use of cloud services.
  • 7. Reduction or more in IT expenditures with managed services. Business Agreed Managed IT Service make improvement to business process. SME Actively seeking to employ technology to solve business problem.. 50% 70% 80% Did you know that
  • 9. Get up to 85% subsidy from SMB Grant Hub • Best of all there is no tedious paperwork application and you only pay the subsidized amount. • In addition, the subsidies are recurring every year and no expiry.
  • 10. Get up to 85% subsidy from SMB Grant Hub • Enterprise Exchange Email boxes • Enterprise File Sync storage (Box.com/Dropbox/GoogleDrive/OneDrive etc) • Secure VPN • Cloud VPS • VPS • Business Fiber Broadband • Microsoft Office • Endpoint Solution • (AVG/Avast/Bitdefender/Kaspersky/Malywarebytes/ Trend Micro/Sophos/Symantec) • Data Backup • Disaster Recovery (Ransomware Recovery) • IT Managed Services
  • 11. Our Services Cloud Solutions Help company move to the cloud. Do more anytime anywhere with Cloud services. Business Security Enhance your company security. Protect critical business data from hackers and ransomware. Data Center and Hosting Data Centre services. VPS Hosting. Co-location Networking Internet Fiber broadband and networking services. Help your business connect with the world. IT Managed Services IT as a Service – Let you focus on your business. We will take care IT for you. Data Recovery and Backup Data recovery and backup solutions to ensure no data loss.
  • 12. Cloud Solutions Cloud computing can be a great proposition for SMEs, as it has the ability to reduce complexity, cost and IT resource that often comes with on-premise solutions.
  • 13. Amazon Web Services Secure cloud services platform, offering compute power, database storage, content delivery and other functionality to help businesses grow. Microsoft Azure Turn your ideas into solutions faster using a trusted cloud that is designed for you. Google Cloud Platform Google Cloud Platform lets you build and host applications and websites, store data, and analyze data on Google's scalable infrastructure. Aliyun provides a suite of cloud computing services that covers elastic computing, object storage, relational database, big data analysis, and artificial intelligence
  • 14. Internet Broadband and Networking Internet Fiber broadband and networking services. Help your business connect with the world. Let UCloud Asia help you get connected to bring your business to the next level. We worked with the major ISP locally and internationally to bring you the best internet connection.
  • 15. Singtel Singtel Fibre Broadband services and co-location Starhub Starhub Fibre Broadband service and co-location. M1 M1 Mobile and Colocation service ViewQwest Business and residential Fibre broadband service My Republic Business and residential Fibre broadband service
  • 16. Data Centre and Hosting We provide datacenter services ranging from business web hosting, email hosting, VPS hosting, co-location and domain name registration services since the year 2002.
  • 17. Data Centre and Hosting Managed data centre and web hosting services Co-location 24/7 secured rack with surveillance and access control ensures your servers and appliances are protected Virtual Private Server (VPS) With VPS hosting, you are allocated guaranteed server resources, and have full control of your operating system to install software that you need. Dedicated Server Managed dedicated servers for maximum performance, customizability and satisfaction. Business Hosting Enterprise-level web hosting with premium features.
  • 18. Business Security Enhance your company security. Protect critical business data from hackers and ransomware.
  • 19. Business Security Enhance your company security. Protect critical business data from hackers and ransomware. Total Data Protection Safeguard businesses from IT disasters, human error, and malicious activity Ransomware Protection Cybercriminals want your money. Stop them before they attack you. Business Continuity and Disaster Recovery Protect your business against unknown risks with frequent backup of your entire business infrastructure. Disaster Recovery as a Service If disaster strike, recover your data, servers, desktop and the entire infrastructure to a virtual environment in seconds.
  • 20. AVG Give you all the top-rated antivirus protection. From instant email alerts about threats and to remote admin tools that help you manage online security on the move. Avast Stay focused on your endgame and leave your endpoint security to us. On-premise or cloud-based, we scale to your business — whatever its size, network, or devices. Sophos Next-gen security with real-time intelligence sharing between your endpoints and firewall. Unified protection against ransomware attack. Bitdefender Delivers the best security, unparalleled performance and incredible ease of use for your home PC, business, hybrid infrastructure or datacentre
  • 21. IT Manage Service Focus on your business and leave your IT support to us. Our affordable and professional IT support maintenance package covers all your office computing equipment such as desktop, laptops, tablets, networking equipment and printers. Our team of qualified IT will keep your office computing environment running optimally. Fixed Monthly Price Our package prices comes in a fixed monthly price so that you will not have any bill shock. Control Your IT Cost Ensuring you buy only what you need, at a cost effective price. Increase Productivity Reduce the impact to your business operation by reducing IT system failure. Ensure shortening time to resolve issues. Protected Business Information Data backup service ensure you have peace of mind knowing all critical business and customer data can be quickly recovered.
  • 22. Disaster Recovery and Backup Backup your data before disaster strike! Total Data Protection Safeguard businesses from IT disasters, human error, and malicious activity Ransomware Protection Cybercriminals want your money. Stop them before they attack you. Business Continuity and Disaster Recovery Protect your business against unknown risks with frequent backup of your entire business infrastructure. Disaster Recovery as a Service If disaster strike, recover your data, servers, desktop and the entire infrastructure to a virtual environment in seconds.
  • 24. What is Ecommerce? Some common things to look out for Transaction across internet Any type of business, or commercial transaction, that involves the transfer of transaction across the Internet. Online Payment Using Payment Gateway to process your online transaction so that customer can pay you using Credit Card Delivery Deliver products to your customer Driving Traffic to your store Traffic is important to your online store.
  • 25. Exponential Growth of Ecommerce Why so many SMB is going for ecommerce? Access to Tech Rising access to technology – easier to setup Simpler Payment Simpler and easier payment gateway to allow collection of payment. Social Media Instant trends, global trends Logistic n Delivery Improved logistics and digitized delivery
  • 26. Type of Ecommerce There are 4 type Business to Business (B2B) Market place such as Alibaba Business to Consumer (B2C) Market place such as Qoo10, Amazon Consumer to Consumer (C2C) Eg Carousel Online Store Data backup service ensure you have peace of mind knowing all critical business and customer data can be quickly recovered.
  • 27. How to start your ecommerce? 1. Market place 2. Start your own ecommerce store?
  • 28. Market Place 1. Easier to start.- No technical needed to setup hosting/domain name/backend system 2. Need to pay high commission to Market Place – eat into your margin 3. Not able to customized store function 4. Delivery may be pre- arranged – most need to pay Own Ecom Store 1. Technical knowledge needed to setup hosting/domain name/backend system 2. NO-Need to pay commission to Market Place 3. Full control to customized store function 4. Delivery may be pre- arranged – most need to pay
  • 29. Key component of your own ecommerce store Key Component – Own Ecom Store Catalogue and Product Information Checkout Capability & Payment Gateway Inventory and Order Management Logistics and Delivery Management
  • 30. Why go with Shopify? Shopify is a subscription based service to let you start your own store easily. Start with trail now! Low Investment Affordable price to start selling online No Coding needed Need not hire web developer Integrate with Payment Start getting pay now Security Cloud based security
  • 31. Shopify (Self-managed ) Pricing Plan Table BASIC SHOPIFY 2 staff, unlimited products, unlimited storage, Free SSL $45/MO* SHOPIFY 5 staff, unlimited products, unlimited storage, Free SSL,Gift Cards, Professional Report , Abandon cart recovery $125/MO* ADV SHOPIFY 5 staff, unlimited products, unlimited storage, Free SSL,Gift Cards, Professional Report , Abandon cart recovery, Advanced Report Builder $480/MO* * Based on per site per month
  • 32. Shopify (Managed Service) Pricing Plan Table SET UP (ONE-TIME) • To configure domain name to link up with Shopify store. • To setup the Shopify account with account login • To setup the Shopify contact us page • To setup Shopify Home Page • To setup Shopify Online Store • To setup Shopify with Paypal $180 MANAGED SERVICE • Manage Shopify • Provide 1st Level Support $125/MO* DOMAIN NAME • Register Domain Name $75/YR*
  • 35. Step by step setting up Shopify Steps to Setup Site Planning - Plan site structure - Plan Product category - Plan Payment Gateway to use. - Plan Logistic and Delivery Product Management - Upload Product. Setup Payment - Linked up with Payment such as Paypal Sign Up Shopify - Setup Shopify Account - Link up own domain name Launch Site - Publish your site and start selling.
  • 36. Enter your subhead line here Getting Ready for Ecommerce Site Related • Domain Name • Logo File • Images related to your business and product range Operation Related • Paypal / Payment gateway • Business Email / Phone Number • Terms and Conditions / Policies Product Related • Product Images • Product Title Descriptions • List price and Selling Price of Products Marketing Related • Keywords Identifications • Bio of your business/ Story /Mission etc • Social Media Assets – Facebook, Instagram , LinkedIn, Twitter
  • 38. We are dealing with many international customer and supplier and your Enterprise Exchange Hosting ensure I have peace of mind that my business email data are well secured! (Customer since year 2012) Mehul We switched to Enterprise Exchange Hosting after we are hit by lots of email issue such as low email quota, unable to sync my emails. (Customer since year 2013) Ben Soh Testimonial Company name and title omitted to keep customer data confidential
  • 39. We are looking for 1. Company or individual that want to help us resell our Enterprise Exchange Hosting, Enterprise File Sync. 2. Industry: Accounting Firm, Web Design Firm, SEO/Internet Marketing Firm Industry we like to help 1. F & B 2. Financial Services 3. Property Services 4. Recruitment Services 5. Law Services 6. Medical Services 7. Retail Services 8. Engineering Services
  • 40. Contact Us to find out more Ucloud Asia Pte Ltd 60 Paya Lebar Road #09-38 Singapore 409051 steven.chin@ucloud.sg www.ucloud.sg +65 6100 8223
  • 41. Q&A
  • 42. Get up to 85% subsidy from SMB Grant Hub • Best of all there is no tedious paperwork application and you only pay the subsidized amount. • In addition, the subsidies are recurring every year and no expiry.
  • 43. Get up to 85% subsidy from SMB Grant Hub • Enterprise Exchange Email boxes • Enterprise File Sync storage (Box.com/Dropbox/GoogleDrive/OneDrive etc) • Secure VPN • Cloud VPS • VPS • Business Fiber Broadband • Microsoft Office • Endpoint Solution • (AVG/Avast/Bitdefender/Kaspersky/Malywarebytes/ Trend Micro/Sophos/Symantec) • Data Backup • Disaster Recovery (Ransomware Recovery) • IT Managed Services

Editor's Notes

  1. Include company story Mission / Vision / Why Us/ why we start Testimonial from customer / most not wishing to reveal name as from industry that require compliance such as financial services
  2. Questions to ask: How many physical servers and virtual machines do you have?   2) What type of OS and versions are running on the servers / VMs   3) What is the network speed on the LAN?   4) What is the outbound uplink connection speed available via the internet?   5) what are the applications/databases that are to be backed up?   6) what is the total utilised data size that needs to be backed up?   7) what are the RPO/RTO requirements?
  3. Source: www.businesstimes.com.sg/technology/a-third-of-singapore-smes-hit-by-ransomware-last-year-study (dated 01 Aug 2017) A STUDY has found that one in three small and medium-sized enterprises (SMEs) in Singapore have experienced a ransomware attack in the last year. About 21 per cent of those who had been hit by ransomware had to cease all business operations immediately, while 11 per cent lost revenue as a direct result of the attack, according to Malwarebytes' Second Annual State of Ransomware Report released on Tuesday. The report revealed that more than half of cybercriminals (53 per cent) who strike SMEs in Singapore with ransomware ask for payments of less than US$1,000, with only 7 per cent asking for sums more than US$10,000. A third of SMEs (33 per cent) who refused to pay the ransom lost access to files as a result. More than 61 per cent of companies in Singapore hit by ransomware experienced downtime of more than nine hours from a single incident of ransomware; the equivalent of a full working day.
  4. Source: http://sbr.com.sg/information-technology/commentary/five-important-cyber-security-measures-singapore-smes-0 1. Identify your most valuable digital assets By adopting a risk-based approach to protecting your most valuable assets, you can maximise security while minimising costs. This entails identifying and categorising your company's digital assets according to the level of sensitivity/importance. In other words, how damaging would the loss of the data be to the company? Assign “low,” “moderate,” and “high” ratings according to the level of sensitivity of the company data. Secure your highest rated assets first. 2. Set up an access control list Determine which employees have control to which assets and set up levels of security clearance (open or restricted access). Review and update the list regularly to reflect staff movement. Remove anyone that does not require high-level access anymore. The most senior person need not have the highest-level access; on the contrary, he/she may have the least access, for example, to the company's databases if management reports are prepared for him/her by other staff. 4. Encrypt sensitive company data Bring Your Own Device (BYOD) policies may offer flexibility to staff, but this also opens up a security loophole when staff lose their laptops or smartphones containing precious company data. The data should be encrypted to ensure that only staff with the necessary security clearance can access them. Budget conscious SMEs can use free encryption software such as Microsoft BitLocker. SMEs who wish to go a step further can deploy Full Disk Encryption (FDE) with 2FA. FDE refers to encrypting all the data on the hard drive used to boot a computer. Access to the data is granted only after the employee has been authenticated with a password and a second factor such as a smart card. 5. Practice secure business outsourcing As more budget-conscious SMEs in Singapore take advantage of recently announced government subsidies on high-speed Internet access and outsource their data centres to cloud providers, the security risks of doing so have become apparent. Develop a security checklist (physical and virtual) for your vendor. Onsite security, malware protection, data encryption, and security measures to counter colocation risks are some of the items that should be on the list. Choose cloud providers who offer 2FA on top of the basic security measures. You can outsource your data storage, but not the responsibility for ensuring the security of the outsourced data. Data breaches can cost your company not only financial damage, but also reputational embarrassment. By adopting the above five cyber security measures, you can strengthen your defence against identity theft while staying on budget. 5. Implement Firewall and Antivirus Solutions You will be surprised that a lot of SME use out-dated or ‘free’ home security antivirus to protect their most impoprtant business data. Firewall act as 1st level of defence as a wall to prevent outside intrusion. Technology has also advance to protect Zero-Day attack, whereby the hacker penetrate into your company system but does not active until trigger. A.I and Machine Learning can analysis various file and user behavior to determine if this is a abnormal action and stop before the trojan or ransomware activated to cause harm. 6. End-user training Your staff and end users need to be trained not to click on suspecting links and also report to the IT manager or management. When in doubt always ask 3. Implement 2FA for remote VPN access Passwords alone are not secure enough to prevent unlawful access to your company data. Implement two-factor authentication (2FA) for remote virtual private network (VPN) access. This means that employees have to key in a One-Time Password (OTP) on top of their username and password in order to access company data remotely. Depending on your budget, hardware token-based 2FA should be adopted to secure access to more sensitive data. Tokenless SMS OTP or soft tokens such as Google Authenticator can be considered for access to less sensitive company data. Sensitive company emails and attachments should also be password-and 2FA-protected. For example, authorised recipients can key in a OTP to read the emails and download the attachments.
  5. Company A Accounts department receive email from ‘supplier’ to bank transfer $40,000 to another bank account (not the regular account). Await CEO approval CEO approve transfer without double confirming Engineering Company B Staff like to backup files to PC and desktop, My document folders Company Outlook download all emails to PC and leave no copy in server (fear will eat up space) Company did not implement any secured file backup system One day attack by ransomware, important files and email data locked. All email and important file hijacked Have to pay ransom to restore data
  6. Questions to ask: How many physical servers and virtual machines do you have?   2) What type of OS and versions are running on the servers / VMs   3) What is the network speed on the LAN?   4) What is the outbound uplink connection speed available via the internet?   5) what are the applications/databases that are to be backed up?   6) what is the total utilised data size that needs to be backed up?   7) what are the RPO/RTO requirements?
  7. Questions to ask: How many physical servers and virtual machines do you have?   2) What type of OS and versions are running on the servers / VMs   3) What is the network speed on the LAN?   4) What is the outbound uplink connection speed available via the internet?   5) what are the applications/databases that are to be backed up?   6) what is the total utilised data size that needs to be backed up?   7) what are the RPO/RTO requirements?
  8. Recovery Point Objective (RPO) describes the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity Plan’s maximum allowable threshold or “tolerance.” Example: If the last available good copy of data upon an outage is from 18 hours ago, and the RPO for this business is 20 hours then we are still within the parameters of the Business Continuity Plan’s RPO. In other words it the answers the question – “Up to what point in time could the Business Process’s recovery proceed tolerably given the volume of data lost during that interval?” RTO: Recovery Time Objective The Recovery Time Objective (RTO) is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity. In other words, the RTO is the answer to the question: “How much time did it take to recover after notification of business process disruption?“ RPO designates the variable amount of data that will be lost or will have to be re-entered during network downtime. RTO designates the amount of “real time” that can pass before the disruption begins to seriously and unacceptably impede the flow of normal business operations. There is always a gap between the actuals (RTA/RPA) and objectives introduced by various manual and automated steps to bring the business application up. These actuals can only be exposed by disaster and business disruption rehearsals. Some Examples Traditional Backups: In traditional tape backups, if your backup plan takes 2 hours for a scheduled backup at 0600 hours and 1800 hours, then a primary site failure at 1400 hours would leave you with an option to restore from 0600 hours backup, which means RPA of 8 hours and 2 hours RTA. Continuous Replication: Replication provides higher RPO guarantees as the target system contains the mirrored image of the source. The RPA values depend upon how fast the changes are applied and if the replication is synchronous or asynchronous. RPO is dependent on how soon can the data on target/replicated site be made available to the application.
  9. Target customer profile: Offices in multiple locations Mobile, traveling or remote employees Currently use file servers, PC backup, file sync and share services or a combination Share very large files: Design and Creative, Architecture/Engineering Comply with industry regulations: Health Care, Finance, Legal Share files between departments, within the company, or with external business partners, vendors, or customers
  10. https://digitalguardian.com/blog/101-data-protection-tips-how-keep-your-passwords-financial-personal-information-safe Securing Your Devices and Networks A) Secure Your devices and network Encrypt your data. Use software to help you encrypt 2. backup data (to cloud) 3. Use antivirus 4. Always run OS and software updates 12. Use "passphrases" rather than "passwords." What's the difference? "A passphrase is simply a different way of thinking about a much longer password. Dictionary words and names are no longer restricted. In fact, one of the very few restrictions is the length - 15 characters. Your passphrase can be a favorite song lyric, quote from a book, magazine, or movie, or something your kids said last week. It's really that easy," explains Indiana University's Protect IU. Think of a saying or series of words that is easy for you to remember, and use the first letter of each word in the phrase, along with a combination of numbers and special characters, as your passphrase. C) PROTECTING YOUR CREDIT 52. Sign up for email alerts for transactions. 53. Review your statements regularly. 57. Shop on familiar websites. 59. Maintain a low-balance credit card for online purchases. How to do this easily Use VPN Use Passwordf Manager (instead of write on paper) Data Protection Tips for Mobile Devices Protecting Your Identity Protecting Your Credit Protecting Your Data on Social Networking Protecting Your Data Online Data Protection Following a Data Breach
  11. A) Secure Your devices and network Encrypt your data. Use software to help you encrypt 2. backup data (to cloud) 3. Use antivirus 4. Always run OS and software updates 12. Use "passphrases" rather than "passwords." What's the difference? "A passphrase is simply a different way of thinking about a much longer password. Dictionary words and names are no longer restricted. In fact, one of the very few restrictions is the length - 15 characters. Your passphrase can be a favorite song lyric, quote from a book, magazine, or movie, or something your kids said last week. It's really that easy," explains Indiana University's Protect IU. Think of a saying or series of words that is easy for you to remember, and use the first letter of each word in the phrase, along with a combination of numbers and special characters, as your passphrase.
  12. B) Protect your identity 1. Use secure password Passwords are easily cracked by hackers, particularly if you don't use sound password-creation practices. The best passwords contain uppercase and lowercase letters, numbers, and special characters. You should also avoid using easily guessed words or alphanumeric combinations, such as the names of children or pets, birth dates, addresses, and similar information that can be easily guessed by someone looking at your Facebook profile or through a Google search. "A strong password should be more than eight characters in length, and contain both capital letters and at least one numeric or other non alphabetical character. Use of non-dictionary words is also recommended,“ 2. Don’t use phone numbers, birthday, name as password Don't use numbers or combinations associated with other personally identifiable information as all or even part of your passwords. "Don't use any part of your social security number (or any other sensitive info, like a credit card number) as a password, user ID or personal identification number (PIN). If someone gains access to this information, it will be among the first things they use to try to get into your account," Bank of America advises. Twitter: @BofA_News 4. Don’t use same password for more than one account or service A password manager seems like an even better idea when you consider the fact that you should never use the same password for more than one account or service. Think about it: If a hacker cracks your password on one website, they suddenly have cracked your password for a dozen more. But remembering the slew of passwords the average person would need to recall to access the many accounts and services most people have these days is no simple feat, unless you have a photographic memory. In lieu of a password manager, you could follow Danny Heisner's advice at Cranking the Ranking and create your own password algorithm that makes it simple to remember all your passwords without ever using the same one twice. Don't write your passwords down. It's tempting to keep a written list of passwords, or even a single password written down in a notebook or, worse yet, a sticky note. But this is a bad idea, as it makes it extraordinarily easy for someone else to steal your login information and access your accounts without your permission. "Writing your password on a 'sticky-note' and sticking it on your monitor makes it very easy for people who regularly steal passwords to obtain yours. Hiding it under your keyboard or mouse pad is not much better, as these are common hiding places for passwords. However if you must write something down, jot down a hint or clue that will help jog your memory or store the written password in a secure, locked place," says SANS.org. Twitter: @SANSInstitute
  13.  Consciously check and configure app privacy settings. Most apps offer privacy settings for users, enabling you to determine how much and what types of information are shared or stored. Always choose the least amount of data-sharing possible. Google, for instance, offers individual permission levels and privacy settings for the mobile apps it provides: "Google offers a variety of mobile applications that you can download onto your smart phone and some of these apps, such as Search, Maps and Latitude incorporate geolocation features. Some parents may be concerned about their teen sharing their location with others. Each app allows you to adjust the privacy setting so you can share as much or little as you want." Twitter: @goinsidegoogle Enable remote location and device-wiping. "If your gadget is lost or stolen, tracking apps can tell you exactly where your phone is. These apps also let you wipe sensitive information remotely. If your phone does end up landing in the wrong hands, you can at least make sure they don't get your information," says Kim Komando. Twitter: @kimkomando Take care of privacy settings immediately upon setup.\ Lock your smartphone and tablet devices. Practically everyone has a smartphone, tablet, or both these days. All it takes is a single mishap where your device slips out of your pocket or briefcase at a restaurant or on public transportation, and your data could wind up in the hands of someone who will use it maliciously. You can take steps to protect your data in the event of a lost or stolen device, however, beginning with locking your device. When your device is locked, a thief must crack your password before gaining access to your apps or personal information, adding a layer of protection. "As soon as you get a new smartphone, set a hard to guess password to protect your device and change it on a regular basis." say Don't forget to backup your mobile device data. Another data protection strategy that's often overlooked for mobile devices is the need to backup your data from your mobile device in addition to your desktop computer's or laptop's data. There are some automatic cloud-backup options, but this article on Yahoo Small Business Advisor suggests an interesting strategy: using IFTTT (If This Then That) to facilitate automatic backups of important files, such as photos or work documents. Twitter: @Yahoo Get anti-virus or anti-malware protection for your mobile devices. Anti-malware protection software is a given for most computer users, but many consumers still overlook the importance of protecting mobile devices from the growing number of malware programs impacting all types of mobile devices. Just a few years ago, however, security options for mobile devices offered mediocre protection against threats, at best. "Besides antivirus and malware scanning, security apps for Android also offer a full McAfee LiveSafe 2014 Android screenshot McAfee for Android security suite with features such as device location, remote wipe, backup, and suspicious-URL blocking. These extra features usually require a premium subscription, but most apps offer a minimal, basic level of protection for free, including malware scanning," according to an article on PCWorld. Twitter: @pcworld Use an on-device, personal firewall.
  14. D) PROTECTING YOUR DATA ONLINE Avoid sensitive transactions on public Wi-Fi. Working at the local coffee shop may have some appeal, but relying on a public Wi-Fi connection means your data is interceptible by outsiders. Avoid conducting banking transactions and sending other sensitive information over a public Wi-Fi network. "Public wi-fi 'hotspots' in public places like cafés, airports, hotels and libraries are convenient but unlike your home computer, use of public hotspots involves security compromises. It is easy for other users to intercept your data, so be careful about what information you send or receive while connected. Try and limit activity when connected to a public wi-fi network to web browsing and avoid banking or any other activities that involve user password access. Avoid using hotspots that are run by people you do not know or trust. Criminals can set up hotspots known as 'evil twins' and 'rogue hotspots' to steal users' information. Always try and use encrypted (password protected) networks," advises  Don't forget to sign out. Signing in to online services is necessary when you need to access your personal accounts, but many users forget to sign out when they're finished using a service. "But when using public computers like in a cybercafe or library, remember that you may still be signed into any services you’ve been using even after you close the browser. So when using a public computer, be sure to sign out by clicking on your account photo or email address in the top right corner and selecting Sign out. If you use public computers often, use 2-step verification to help keep your account safe, and be extra careful to sign out of your accounts and shut down your browser when you have finished using the web," according to the Google Safety Center. Don't open emails from people you don't know.  Use two-factor authentication. Two-factor authentication is an additional layer of security that provides protection in the event that a hacker guesses or cracks your password. Two-factor authentication requires a second verification step, such as the answer to a secret question or a personal identification number (PIN). You should opt for two-factor authentication when given an option. "Some websites, such as Google, will text you a code when you login to verify your identity, while others have small devices that you can carry around to generate the code. Authenticator apps are also available on all major smartphone platforms. Other types of two-factor authentication do exist as well, so look in the settings of your banking, shopping, and e-mail hosts for the option," explains the Webroot Threat Blog. Twitter: @Webroot Don't believe everything you read. This tip is important for much beyond data protection, such as protecting your financial assets, your reputation, and perhaps most importantly, your personal confidence or self-worth. Too many people have fallen victim to scams online, by buying into false claims and promises of vast accumulation of wealth. Michael Daniel, on The White House Blog, advises, "Be cautious about what you receive or read online – if it sounds too good to be true, it probably is." Best-case scenario is you lose a few bucks buying into a pyramid scheme that will never net you any profits; worst-case, your personal information is sold and your identity stolen.  Use secure websites, especially for sensitive transactions. Avoid clicking on links in emails. Most everyone gets the occasional email from their bank, financial institution, or similar accounts and services. But to be safe, you should always open a browser window and type the URL in the address bar, rather than click on links in emails. Why? Phishing emails are one of the most common ways hackers obtain personal information, tricking users into inadvertently handing over their login credentials to bank accounts, credit cards, and other accounts where they can glean further information, make unauthorized purchases, or even steal your identity. "Don’t get caught by phishers. Phishing is when you get an email or a social media message that looks like it’s coming from a legitimate place such as a bank or social networking site. If you click on a link in the message, you're taken to a website that looks legitimate but could be run by criminals trying to trick you to sign in with your username and password so they can capture that information. Your best bet is not to click on the link but rather type the web address (such as mybank.com) into your browser window and go to the site that way," the Google Safety Center recommends.  Don't send passwords or account login credentials over public or unsecured Wi-Fi networks. "Never, ever send account and password information over an open (unsecure) wireless connection.You are broadcasting to everyone within the radius of your wireless signal, which can be several hundred feet, all of your personal information and account information. They can use this to compromise your accounts (e.g. email, financial, system/application access), steal your identity, or commit fraud in your name Don't save passwords in your browser. Regular password changes might not actually be necessary.
  15. URL: https://www.youtube.com/watch?v=AhgtoQIfuQ4
  16. Questions to ask: How many physical servers and virtual machines do you have?   2) What type of OS and versions are running on the servers / VMs   3) What is the network speed on the LAN?   4) What is the outbound uplink connection speed available via the internet?   5) what are the applications/databases that are to be backed up?   6) what is the total utilised data size that needs to be backed up?   7) what are the RPO/RTO requirements?
  17. https://eastsideco.com/about-shopify WHY YOU’LL LOVE SHOPIFY 1. SHOPIFY IS AFFORDABLE AND A BREEZE TO USE We love Shopify and you will too. It’s a fantastic, easy-to-use E-commerce platform for those wanting to quickly and affordably start their online store without the fuss over servers and expensive development costs. Being a fully a hosted platform means we get to focus wholly on the design of your website instead of files and coding, which results in quicker turnaround times and lower cost to you when compared to other E-commerce projects. 2. ENDLESS DESIGN POSSIBILITIES It is well known that first impressions count! Shopify make it easier than ever for you to impress your visitors with a beautiful store. The Theme Store offers an expansive range of professionally designed themes, with prices ranging from nothing at all to $180. If you are looking for a more custom approach than a standard theme, you still have a range of options! Another wonderful thing about Shopify is us Experts! If you’d like something a little more custom and unique to your company, our Shopify designers and developers can help. Whether you’d just like help setting up your store, making small changes to design or even for us to create an entirely unique design, we are just an e-mail, call, or click away. 3. DYNAMIC MARKETING From an online marketing standpoint, Shopify make it easy for you to edit the most important elements of your website to be search engine friendly. You can input meta titles, the page title, meta description, unique URLs, make pages visible and invisible, and redirect pages where necessary. This gives you great flexibility to optimise your ecommerce store the way you want it. For the more technically savvy of you out there, a sitemap.xml and robots.txt file is automatically generated to save you the time of having to set them up. For those websites who want to migrate over to the Shopify platform, with their in-built 301 redirect facility you can do that with ease too. 4. UNMATCHED TECHNICAL SUPPORT A reliable and responsive technical support service is vital when running an online operation. Should your website go down or a payment gateway stops working, it’s important you can get in touch with someone no matter what time of the day, which is a huge benefit that Shopify has. You can call up the team around the clock on their toll free numbers or live chat with an online operator. 5. AROUND THE CLOCK SECURITY Shopify invest millions of pounds into ensuring their platform is secure and adhere to PCI rules and regulations. Security is ever more important and when store owners are taking customer’s credit card details to make purchases it’s important you’re PCI compliant and your website displays “HTTPS” when users come to process their orders. Shopify take care of all of this for you.
  18. https://eastsideco.com/about-shopify WHY YOU’LL LOVE SHOPIFY 1. SHOPIFY IS AFFORDABLE AND A BREEZE TO USE We love Shopify and you will too. It’s a fantastic, easy-to-use E-commerce platform for those wanting to quickly and affordably start their online store without the fuss over servers and expensive development costs. Being a fully a hosted platform means we get to focus wholly on the design of your website instead of files and coding, which results in quicker turnaround times and lower cost to you when compared to other E-commerce projects. 2. ENDLESS DESIGN POSSIBILITIES It is well known that first impressions count! Shopify make it easier than ever for you to impress your visitors with a beautiful store. The Theme Store offers an expansive range of professionally designed themes, with prices ranging from nothing at all to $180. If you are looking for a more custom approach than a standard theme, you still have a range of options! Another wonderful thing about Shopify is us Experts! If you’d like something a little more custom and unique to your company, our Shopify designers and developers can help. Whether you’d just like help setting up your store, making small changes to design or even for us to create an entirely unique design, we are just an e-mail, call, or click away. 3. DYNAMIC MARKETING From an online marketing standpoint, Shopify make it easy for you to edit the most important elements of your website to be search engine friendly. You can input meta titles, the page title, meta description, unique URLs, make pages visible and invisible, and redirect pages where necessary. This gives you great flexibility to optimise your ecommerce store the way you want it. For the more technically savvy of you out there, a sitemap.xml and robots.txt file is automatically generated to save you the time of having to set them up. For those websites who want to migrate over to the Shopify platform, with their in-built 301 redirect facility you can do that with ease too. 4. UNMATCHED TECHNICAL SUPPORT A reliable and responsive technical support service is vital when running an online operation. Should your website go down or a payment gateway stops working, it’s important you can get in touch with someone no matter what time of the day, which is a huge benefit that Shopify has. You can call up the team around the clock on their toll free numbers or live chat with an online operator. 5. AROUND THE CLOCK SECURITY Shopify invest millions of pounds into ensuring their platform is secure and adhere to PCI rules and regulations. Security is ever more important and when store owners are taking customer’s credit card details to make purchases it’s important you’re PCI compliant and your website displays “HTTPS” when users come to process their orders. Shopify take care of all of this for you.
  19. https://www.shopify.com.sg/pricing Basic – USD $29 / SGD $46 Shopify – USD $79 / SGD $ Adv Shopify USD $299 / SGD $
  20. https://www.shopify.com.sg/pricing Basic – USD $29 / SGD $46 Shopify – USD $79 / SGD $ Adv Shopify USD $299 / SGD $
  21. https://www.shopify.com.sg/pricing Basic – USD $29 / SGD $46 Shopify – USD $79 / SGD $ Adv Shopify USD $299 / SGD $
  22. https://www.shopify.com.sg/pricing Basic – USD $29 / SGD $46 Shopify – USD $79 / SGD $ Adv Shopify USD $299 / SGD $
  23. $50 Per 50 voucher For $250 min