Posted on Leave a comment

Security is the new brand promise: Why trust is your startup’s only moat

If you build in Southeast Asia long enough, you learn something slightly uncomfortable. Trust isn’t something you earn later, after product-market fit or scale. It’s part of the product from day one. And one of the fastest ways to lose it is through a security incident.

That is why cybersecurity has become the trust layer across the digital economy. Because the moment trust breaks, growth breaks with it. Users do not separate “a technical incident” from “a company I can rely on”. Partners do not separate “a vendor problem” from “a risky platform”. Investors do not separate “a one-off breach” from a leadership team that did not think ahead.

From a PR and strategic communications perspective, this is the part many founders underestimate. In an environment where fake news spreads quickly, screenshots travel faster than context, and deepfakes can mimic a face and voice convincingly, cybersecurity is no longer just an IT concern. It’s reputation management in its most unforgiving form.

I have worked with more than 200 founders and CEOs over the past few years across growth stages, sectors, and markets. And I can tell you what trust loss looks like in real life. It’s not always dramatic. It’s the customer who quietly churns. The enterprise prospect who suddenly “pauses the conversation” and never comes back. It’s the investor who asks one extra diligence question, then ten, then decides to back a competitor. Trust usually leaks before it breaks.

Here is the hard part. We’re not only fighting criminals. We are fighting confusion. The World Economic Forum’s Global Risks Report 2025 once again ranks misinformation and disinformation as a top short-term risk, because it erodes shared reality and confidence in institutions, businesses, and information itself. In that environment, every security incident becomes a story problem as much as a technical problem. People ask, “Can I believe you?” long before they ask, “What happened?”

This is where cybersecurity and communications meet.

Also Read: Cybersecurity is not an IT problem: It is a trust architecture crisis

Most founders think crisis communications begins when something goes wrong. In reality, it begins much earlier, when you decide what not to prioritise. Security gaps often show up later as reputation problems. It compounds quietly, then collects interest at the worst possible moment.

The World Economic Forum’s Global Cybersecurity Outlook 2026 found that 77 per cent of respondents reported an increase in cyber-enabled fraud and phishing, and 73 per cent said they or someone in their network had been personally affected by cyber-enabled fraud. These cybercrime numbers aren’t distant concepts. Many have experienced it themselves or know people who have. So when a company downplays an incident, it lands poorly. People are already on edge, and their default setting is caution or suspicion.

Then there’s cost. IBM’s Cost of a Data Breach Report 2025 estimates the global average cost of a data breach at US$4.4 million. For startups, the bigger damage often isn’t just limited to financial. It’s distraction, lost momentum, morale hit and the reputational drag that follows you into every sales, investor or hiring conversation.

I remember working with a founder who had just secured a major partnership. The deal took months. Then a phishing incident hit a senior team member’s inbox. No customer funds were stolen, and the team contained it quickly. Technically, it was “handled”. Commercially, it hurt. The partner’s legal team requested additional assurance, the launch timeline slipped twice, and the founder spent weeks explaining and rebuilding confidence. The incident didn’t “break the company”, but it did disrupt the momentum.

Another founder I worked with faced a different kind of threat: a wave of fake social posts and forwarded messages claiming the company was insolvent and “being investigated.” It was untrue, but it was believable enough to spread. Initially, the team saw it as a PR annoyance until they realised it was really a trust and security problem. They tightened account access, verified official channels, and built a simple public “source of truth” page that stakeholders could refer to when rumours resurfaced. The communication worked because it was backed by operational discipline. If you don’t control your channels, you don’t control the story.

If you take one idea from this piece, it’s this: cybersecurity is credibility. It’s proof that you can be trusted with other people’s money, data and decisions.

So what does a communications-led approach to cybersecurity look like in practice?

  • First, treat trust as a design requirement, not a marketing promise. If onboarding requires sensitive data, your language must match the responsibility you are taking on. “We take your privacy seriously” isn’t a strategy. Instead, explain what you store, why you store it, and how users can protect themselves. Provide as much clarity as possible.
  • Second, communicate early when something happens. I have seen leadership teams freeze because they want certainty before they speak. Meanwhile, rumours fill the gap. A simple early update acknowledging what you know, what you don’t know yet, and what you’re doing next often builds more confidence than a polished statement released days later.
  • Third, rehearse the whole scenario. Who decides what is disclosed? Who speaks to customers? Who handles investors? Who monitors social channels? Who documents the timeline? Founders are often surprised that a “security incident” becomes a leadership endurance test. You are making decisions under pressure, with incomplete information, while your team looks to you for calm and direction. That is not a day to discover you don’t have a patted-down plan or an updated crisis playbook.

This matters even more now because scams are increasingly sophisticated. Across Asia in 2025, authorities reported large-scale operations involving deepfake technology used to impersonate trusted individuals and trick victims into transferring funds. Whether you’re running a fintech platform, e-commerce business, SaaS product, or marketplace, you’re operating in a region where fraud is organised and run at scale. Trust is about whether people feel safe using your products and services.

Also Read: How cybersecurity is becoming the trust layer that underpins Southeast Asia’s digital economy in 2026

Having been a startup co-founder myself, I’ve learnt that “winging it” when things go wrong often doesn’t work. Teams that invest in crisis preparedness and have more disciplined habits like clearer processes, faster internal escalation and better communication spend far less time later trying to explain themselves. Issues still happen. The difference is they’re able to handle them with confidence, not panic, while in damage control mode.

From a communications perspective, security is not just prevention and protection. It is leadership in action. It shows talent, customers, partners, and investors that you’re thinking ahead, building with care and taking responsibility seriously, even while the business is moving quickly.

If you’re thinking this sounds expensive, here’s the reality: you’re already paying, just in quieter ways. It shows up when customers hesitate to renew because something feels off, even if they can’t explain why. It shows up in small internal shortcuts taken because it’s faster. None of this is purely technical. It’s what leadership looks like in practice: what you prioritise, what you postpone, and what standards you set while you’re moving fast.

Founders often worry that talking about security will make users nervous. In my experience, silence or lack of information makes people far more uneasy. Clear, regular and consistent communication shows you’ve done the work, set boundaries, and respect what people have trusted you with.

This is why cybersecurity as a trust layer isn’t a tagline. It’s the discipline of protecting your reputation before you’re forced into defence mode. Because the real question isn’t whether something will go wrong. It’s whether people will still believe you when it does.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

The post Security is the new brand promise: Why trust is your startup’s only moat appeared first on e27.

Posted on Leave a comment

Cybersecurity and trust: A digital dawn for women in rural India 

The sun beats down intensely on green millet fields in Kadiri taluka, Andhra Pradesh, the ‘Sunrise State’. Lakshmi (name changed for privacy), a member of a village SHG (Self-Help Group), sits on a brightly coloured woven floor mat in the white-washed community kitchen where her group makes healthy millet snacks and packages them to be shipped to urban consumers in Bangalore, Visakhapatnam, Hyderabad and beyond. In her lap rests a mobile phone, its screen glowing faintly.

She tells me about the first time she used digital payments through India’s UPI network. “My fingers were shaking,” she recalls. “What if someone stole my money? I didn’t understand the messages that came to my phone.” Around her, her fellow SHG members laugh and agree, as they continue to shape millet flour, ghee, jaggery and nuts into evenly sized laddoos. Even as the hum of daily life continues, for Lakshmi and others like her, that small screen represents both opportunity and risk.

Across India’s villages, women are stepping into the digital world: selling their products and produce through WhatsApp groups, accessing government schemes online, and making and receiving payments through mobile wallets. Yet, their trust in technology is fragile, often shaken by fraud calls, phishing messages, or identity theft. Stories of PAN (Income Tax ID) numbers being misused and bank accounts being emptied are warning whispers circulating among the women gathered in the community kitchen and the Panchayat (village council) centre.

When trust meets technology

In Nalanda, Bihar, the rhythmic click-clack of a handloom resonates through the family home of Amrit and Geeta Devi (names changed for privacy). The husband and wife take turns weaving Bawan Buti saris, a traditional handloom cotton saree characterised by 52 (bawan) woven motifs (buti). Geeta’s shy smile radiates warmth even through the camera lens of the smartphone she is holding up to join a video conference call along with a group of village women entrepreneurs from across Bihar.

“A man messaged me, saying I could get a subsidy if I shared my Aadhaar (India’s National ID) details. I almost believed him. But I remembered what we learned in our training session before. ‘Never share personal information and ID details with strangers!’ I deleted the message and blocked the number.”

That action may have saved her livelihood. Geeta had attended sessions on using digital tools like WhatsApp for Business, UPI, and more along with the other women entrepreneurs in the cohort. With the support of their local Panchayat Mukhiyas (leaders), women were trained to use the mobiles safely, recognise fraud, and secure their finances. “I protected my family and my business”, she says, with deserved pride.

Her SHG coordinator, Rekha Devi (name changed), also an entrepreneur, adds: “We learned that our phone is like our home. We wouldn’t leave our door unlocked at night. In the same way, we shouldn’t leave our phone open to anyone.”

Also Read: Cybersecurity is not an IT problem: It is a trust architecture crisis

Digital access to safety tools

Back in Andhra Pradesh, women like Lakshmi increasingly face cyber harassment and threatening messages from unknown numbers. In the past, most stayed silent, too afraid to approach the police. But now, many in her village know about the mobile citizen services and the Suraksha app, launched by the state government.

Cyber awareness campaigns are conducted in the district by the police, local authorities, volunteers and NGOs. Chandra (name changed), a volunteer with a local NGO, says, “We go to villages and tell women: if you face fraud, don’t be silent. Report it. The system is here to protect you.”

Grassroots trust networks

In Bihar, local government facilities often double as classrooms. At a Didi Adhikaar Kendra (a one-stop support centre for women) in Muzzafarpur district, women gather with notebooks and phones, listening intently as one of their own, trained in cyber safety, explains how to spot suspicious links.

In Andhra Pradesh, SHG women act as intermediaries, translating technical advice into simple, local language instructions. “We don’t say ‘phishing’ or ‘malware,’” says Seeta, a high school graduate and active SHG member in Telugu, the local language. “We say, ‘Don’t click on strange messages.’ That is easier for people to understand.”

Lakshmi adds, “When women teach each other, it’s very helpful. We believe advice more when it comes from someone we know.”

Trust grows when women see familiar faces like neighbours, local officials, and fellow SHG members leading the way. It transforms cybersecurity from a distant concept into a living reality.

Also Read: Cybersecurity: The evolution from digital safeguard to economic governance

Lessons for the future

  • Cybersecurity is empowerment: For women like Geeta and Lakshmi, digital safety is not just about avoiding fraud; it is about protecting livelihoods and personal dignity.
  • Trust is community-led: Programs succeed when they embed cybersecurity into community structures, not just individual training.
  • Policy meets practice: Andhra Pradesh’s institutional support and Bihar’s grassroots training together show emerging holistic models, where top-down infrastructure is paired with bottom-up empowerment.

Cybersecurity and digital trust are not only technical issues, but they are also deeply human. For women at the bottom of the economic pyramid, trust in digital tools can unlock new opportunities, strengthen livelihoods, and foster confidence in the digital future.

Protecting them from cyber risks ensures that digital inclusion becomes a pathway to empowerment, not vulnerability. We must all recognise that Cybersecurity may start with protecting data, but it ends up protecting dreams. For millions of women in India’s villages, those dreams deserve to be safe.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

The post Cybersecurity and trust: A digital dawn for women in rural India  appeared first on e27.

Posted on Leave a comment

Quantum ambitions go global, and Southeast Asia wants in

Quantum computing has shifted from laboratory curiosity to a national strategic imperative. The “Quantum Computing Report 2026” by Tracxn documents multi-year, multi‑billion-dollar government commitments worldwide designed to accelerate research, build industrial capabilities, and mitigate security risks.

From the US’s National Quantum Initiative to China’s sweeping funding programmes and Europe’s Quantum Flagship, public missions are catalysing private-sector activity and shaping international collaborations.

Also Read: The Quantum gold rush is becoming an infrastructure race

In Asia, India, Japan, and South Korea have already announced major plans. Southeast Asia, meanwhile, is carving a distinct, if heterogeneous, path into the quantum landscape.

Global playbook: investment, partnerships, and security

Most national strategies combine three pillars:

  • Large-scale funding for hardware and software research.
  • Public‑private partnerships to translate laboratory advances into deployable systems and applications.
  • Workforce programmes and standards development, particularly for post‑quantum cryptography and secure communications.

These pillars reflect shared priorities: technological sovereignty, industrial competitiveness, and national security. Governments are not merely funding research; they’re building ecosystems (testbeds, standards bodies, talent pipelines, and procurement pathways) to ensure domestic industries capture value and critical infrastructure remains resilient.

Asia beyond the big three: a growing quantum interest

India, Japan, and South Korea have outlined ambitious trajectories: India’s National Quantum Mission, Japan’s multi‑billion yen commitment linking semiconductors with quantum R&D, and South Korea’s sizeable investment plan through 2035. These efforts create regional demand for partnerships, skilled workers, and specialised infrastructure — all opportunities for Southeast Asian nations to participate and specialise.

Southeast Asia’s emerging quantum landscape

Southeast Asia is not monolithic. Countries vary in research capacity, industrial bases, and national priorities. Yet several patterns are emerging:

Singapore: Acting as the regional hub

Singapore stands out as a clear regional quantum hub. Its strengths — stable funding mechanisms, world-class universities (e.g., NUS, NTU), advanced data‑centre infrastructure, and an active ecosystem of startups and multinational R&D labs — make it attractive for quantum testbeds and regional headquarters. Government agencies (A*STAR, NRF) and industry players are investing in quantum research, quantum-safe cryptography trials, and talent programmes. Singapore’s regulatory clarity and connectivity position it as a base for cross-border partnerships and pilot deployments in finance and telecommunications.

Malaysia and Thailand: building on electronics and manufacturing

Malaysia and Thailand, with their strong electronics and semiconductor ecosystems, are well placed to contribute to quantum hardware supply chains, cryogenics components, and packaging technologies. National research institutes and universities are increasingly integrating quantum modules into engineering curricula, and both countries are exploring cluster development to attract quantum-startup investments and OEM partnerships.

Also Read: Quantum computing market surges as companies shift focus to revenue

Indonesia and Vietnam: scale, talent, and localised applications

Indonesia and Vietnam possess large, youthful populations and rapidly expanding tech sectors. Their comparative advantage may lie in talent development, software-focused quantum applications (optimisation, logistics, finance), and cloud‑based access models that lower barriers to entry for local companies. National labs and universities are beginning to offer quantum programming courses and hackathons to seed developer communities.

The Philippines: research-to-industry pathways

The Philippines has strengths in IT services and a growing academic research base. Government initiatives and partnerships with foreign research centres could accelerate applied quantum research aimed at the services sector — for example, quantum‑inspired algorithms for supply‑chain optimisation or fintech applications.

ASEAN-level opportunities and challenges

  • Collaboration over competition: ASEAN can amplify individual member strengths through shared infrastructure (regional quantum testbeds), common certification standards for quantum-safe cryptography, and joint talent programmes. A coordinated approach would reduce duplication and attract global partners seeking regional scale.
  • Connectivity and data sovereignty: Southeast Asia’s role as a digital hub depends on secure communications. Quantum key distribution (QKD) pilots and post‑quantum cryptography (PQC) adoption must account for cross‑border data flows, undersea cable architectures, and national regulations on encryption. Governments will need to harmonise policy to avoid fragmentation that hinders regional trade in data‑dependent services.
  • Financing and talent gaps: While top-tier nations can deploy large budgets, many Southeast Asian states face budgetary constraints. Creative financing — blended public‑private funds, regional bonds, and international partnerships — can help. Equally important is scaling education: short targeted Masters programmes, industry‑led apprenticeships, and regional fellowships can supply the engineers, physicists, and software developers required.

Sectors to watch in Southeast Asia

  • Finance and insurance: Quantum‑safe cryptography, portfolio optimisation, and risk modelling are near-term priorities for regional banks and reinsurers eager to future‑proof data.
  • Logistics and manufacturing: Quantum‑inspired heuristics can improve routing and scheduling in congested supply chains; quantum hardware could later accelerate materials discovery relevant to regional industries.
  • Telecommunications: National carriers and regional exchanges may pilot QKD for backbone links or critical government communications.
  • Energy and materials: Universities and startups can partner with local industry to use quantum simulations for battery, catalyst, and semiconductor materials research.

Also Read: Quantum computing’s double-edged sword could threaten cybersecurity

Strategic autonomy, partnerships, and geopolitics

Southeast Asian governments will balance strategic autonomy with international collaboration. Partnering with the US, EU, Japan, China, or India offers access to capital, equipment, and talent, but also introduces geopolitical considerations. Careful procurement policies, transparency in partnerships, and multi‑partner strategies can help nations reap benefits while managing risks.

Policy recommendations for Southeast Asia

  • Prioritise capacity building: Invest in education, regional fellowships, and exchange programmes to grow a quantum-ready workforce.
  • Create regional public goods: Shared testbeds, standards harmonisation for PQC, and a regional quantum data governance framework would lower entry barriers.
  • Target sectoral pilots: Focus public funding on high-impact pilots (finance, energy, logistics) to demonstrate near-term value and attract private capital.
  • Encourage industry clusters: Incentivise manufacturing and supply‑chain capabilities tied to quantum hardware through tax incentives and grants.
  • Promote open collaboration: Facilitate academic and industry partnerships across ASEAN, and maintain transparent, multi-lateral foreign partnerships.

Conclusion

National quantum missions are reshaping the global technology landscape; Southeast Asia will not be a passive audience. By combining targeted public investment, regional cooperation, and pragmatic partnerships, countries in the region can capture value from quantum technologies — first through software and cloud access models, then by deepening hardware and manufacturing capabilities. The race is global, but the route to relevance for Southeast Asia is clear: specialise where comparative advantages exist, pool resources regionally, and build the human capital that will turn government missions into local economic opportunity.

Also Read: How quantum computing moved from components to applications in 2024

Quantum advantage, after all, depends as much on people and policy as on qubits.

The post Quantum ambitions go global, and Southeast Asia wants in appeared first on e27.

Posted on Leave a comment

Echelon Philippines 2025 – Partnering for Growth: How great founders and VCs build together

Echelon Philippines 2025 featured a fireside chat between Puiyan Leung, Partner at Vertex Ventures SEA & India, and Thaddeus Koh, Co-Founder and Programs Director of e27, exploring the mindset founders need to navigate entrepreneurship.

Leung highlighted that successful founders balance optimism about what is possible with a practical understanding of how to achieve it, grounded in a clear personal reason for choosing the entrepreneurial path. She also stressed the importance of openness—being willing to connect with investors and peers to learn continuously.

Building relationships during good times, not only in moments of difficulty, helps founders identify the right investors partners.

The post Echelon Philippines 2025 – Partnering for Growth: How great founders and VCs build together appeared first on e27.

Posted on Leave a comment

Echelon Philippines 2025 – SaaS 2.0 in SEA: Vision and reality with Sprout’s Patrick Gentry

At Echelon Philippines 2025, a fireside chat featuring Patrick Gentry, Co-Founder and CEO of Sprout Solutions, and moderated by Artie Lopez, Co-Founder and Startup Coach at Brainsparks, explored the evolving future of SaaS in Southeast Asia.

Gentry described “SaaS 2.0” as a shift from traditional subscription models toward outcome-driven software, where companies charge based on features and results rather than fixed subscriptions. While businesses will always rely on software, the delivery model is rapidly changing with cloud infrastructure and AI shaping the next generation of products.

He also noted that SaaS in the Philippines remains nascent, with limited exposure to global best practices for building and scaling software businesses.

The post Echelon Philippines 2025 – SaaS 2.0 in SEA: Vision and reality with Sprout’s Patrick Gentry appeared first on e27.

Posted on Leave a comment

The household cyber risk no one talks about

The “Asia‑Pacific Cyber Safety Landscape 2026” by bolttech highlights unique vulnerabilities faced by seniors and teenagers: two groups that often sit at opposite ends of the digital experience spectrum but share similar risks. The report’s findings, including that more than half of respondents doubt seniors (55+) can detect scams and that many worry teens “click too fast”, drive urgent calls for tailored education, community support, and policy action across Southeast Asia and the broader Asia‑Pacific region.

Why seniors are at greater risk — Southeast Asian context

Across Southeast Asia, seniors face particular challenges that magnify the general trends described in the bolttech report:

Also Read: APAC’s cyber safety crisis: Why overconfidence is putting millions at risk

  • Digital literacy gaps: In countries with uneven broadband rollout and high rural populations (for example, Indonesia and the Philippines), older adults often adopted internet use later in life and may lack formal digital training. An older person in a provincial town might rely on a younger relative to set up online banking and then be more trusting of messages that appear to come from that helper.
  • Trust and social norms: Many seniors in countries such as Vietnam, Thailand, and Malaysia are raised in cultures where courtesy and respect make them less likely to challenge seemingly authoritative requests—such as a call from a “bank official” asking for OTPs (one‑time passwords).
  • Financial targeting: Scams exploiting government relief or pension schemes have been reported across the region. In Indonesia, for instance, fake texts claiming to be from local social‑assistance programmes have tricked older recipients into revealing banking details. The financial impact is severe — respondents to the bolttech study voiced fears that “hard‑earned money can be lost just like that.”
  • Language and UX barriers: Many seniors prefer local languages or dialects, but some mainstream apps or official guidance are only in national languages or English. This mismatch increases reliance on informal advice channels and heightens vulnerability to misinformation.

Real‑world example: In the Philippines, a wave of so‑called “vishing” (voice phishing) scams exploited older citizens by simulating government helplines. Victims would willingly share sensitive numbers, believing they were securing benefits, illustrating how social engineering preys on trust and perceived authority.

Why teenagers are particularly exposed in Southeast Asia

Teenagers are frequently online, socially connected, and eager to engage — traits that make them attractive targets:

  • Platform‑specific risks: Teens in Singapore, Malaysia, and the Philippines engage heavily on short‑form video apps and messaging platforms. Fake promotions, impersonation accounts, and deepfake content can spread quickly. A viral “discount code” may ask for a phone number, leading to SIM swap fraud or premium‑rate subscriptions.
  • Peer pressure and reputation: In collectivist societies across the region, the fear of losing social standing can discourage teens from reporting online harassment or scams. Respondents noted teens’ reluctance to disclose scams for fear of embarrassment or punishment — a concern amplified where family honour is central.
  • Economic desperation: In some cities across Southeast Asia, teenagers pursue quick online earnings through freelancing or crypto schemes. Predatory “work‑from‑home” job offers or multi‑level marketing scams exploit this economic drive.
  • Mental health and cyberbullying: Cyberbullying incidents in countries such as Thailand and Indonesia have led to profound harm. The bolttech study’s concern that teens “click too fast” intersects with impulsive emotional responses to online provocation, increasing both victimisation and risky retaliatory actions.

Also Read: Why do people fall for online scams in this digital age?

Real‑world example: A viral scam in Indonesia targeted high‑school students, promising fast cash through a “study‑reward” crypto app; many signed up and lost savings, while some suffered reputational damage after personal data was leaked.

Household cyber safety: the weakest link in Southeast Asian homes

A key insight from bolttech is starkly visible in multi-generational Southeast Asian households: one vulnerable member can expose an entire household. Typical scenarios include:

  • Shared devices: Families often share phones or computers. If a teen downloads a malicious app, it may access their parents’ or grandparents’ accounts.
  • Intergenerational trust: Seniors may forward messages from their social circle that contain malicious links, putting younger family members who use the same Wi‑Fi or accounts at risk.
  • Digital help dependencies: Younger adults frequently “manage” older relatives’ online accounts, creating single points of failure if credentials are compromised.

This dynamic calls for multi‑generational education and protections that recognise household patterns common across the region: from kampongs (villages) in Malaysia to barangays in the Philippines.

What education and support should look like — practical Southeast Asian approaches

To move from concern to action, coordinated efforts across governments, civil society, telcos, platforms, and families are needed. Effective examples and possibilities:

  1. Localised, language‑appropriate curricula: Ministries of Education and NGOs can adapt cyber‑safety modules into community centers and senior clubs. For example, Singapore’s Cyber Security Agency already runs community outreach; similar models can be scaled in Bahasa, Tagalog, Thai, Vietnamese and minority languages.
  2. Trusted helplines and “no‑shame” reporting: Create toll‑free numbers and WhatsApp/SMS channels where seniors and teens can report scams anonymously. Partnerships between banks, telcos, and consumer protection agencies in Malaysia and the Philippines could provide immediate fraud‑mitigation steps (freeze account, block SIM) to reduce losses.
  3. Embedding safety into daily platforms: Messaging apps, e‑commerce marketplaces, and social platforms popular in Southeast Asia should integrate simplified reporting flows and one‑tap help links. For seniors, UX designs with larger fonts, clear local language prompts, and built‑in scam warnings when clicking external links would reduce risk.
  4. School and family programmes: Teach teens not only prevention but also incident response — how to document scams, whom to tell at home, and how to preserve evidence. Encourage family “cyber discussions” where tech‑savvy members guide older relatives without judgement.
    Community champions: Train community volunteers — librarians, religious leaders, barangay health workers — as cyber safety ambassadors who can translate technical steps into culturally appropriate guidance.
  5. Industry and regulatory measures: Stronger KYC (know‑your‑customer) safeguards, anti‑SIM‑swap protocols, and mandatory fraud reporting by platforms can reduce attack vectors. Regulators in the region can encourage reporting transparency to identify patterns early.

Looking forward: building resilience in a diverse region

With cybercrime expected to increase and 64 per cent of households anticipating a victim within the next year, protecting vulnerable groups across Southeast Asia and the wider Asia‑Pacific is urgent. Key priorities:

Also Read: Cybersecurity: The evolution from digital safeguard to economic governance

  • Prioritise multi‑language, life‑stage appropriate education.
  • Make reporting easy, anonymous, and stigma‑free.
  • Design platform features that reduce impulsive risk for teens and offer clear safeguards for seniors.
  • Foster cross‑sector collaboration: governments, private sector, civil society, and families.

The bolttech findings are a clear call to action: cyber safety in Asia‑Pacific is not only about technology — it’s about people, cultures, and social structures. By embedding culturally sensitive education, accessible support, and household‑level strategies, Southeast Asian countries can protect both the wisdom of older generations and the promise of the young. The goal is a shared cyber safety culture that leaves no one behind.

The post The household cyber risk no one talks about appeared first on e27.

Posted on Leave a comment

What Bitcoin’s US$70,000 support zone means for traders after this week’s volatility

The cryptocurrency market just witnessed a powerful reminder of how leverage and sentiment can collide to create violent price moves. A sharp Bitcoin-led rally forced over-leveraged short sellers to cover, triggering around US$471 million in crypto derivatives liquidations across major exchanges within 24 hours. About US$471 million of futures positions were wiped out, with roughly US$348 million from shorts and US$123 million from longs as BTC pushed toward US$74,000.

This was not random noise. It was a classic short squeeze, fuelled by crowded bearish positioning, negative funding, rising open interest, and strong ETF inflows into BTC and ETH. I have seen this pattern repeat across cycles, and each iteration teaches the same lesson. When leverage builds on one side of the market, the reversal does not just correct the price; it resets positioning with force.

The scale of the flush matters because it reveals where the real risk lives. Data from derivatives trackers shows roughly US$471 million in crypto futures liquidations over 24 hours, with shorts taking the majority of the hit at about US$348 million versus US$123 million in longs, as Bitcoin and Ethereum ripped higher toward key resistance near US$74,000. This pattern matches reporting that a BTC surge to the mid-70,000s erased over US$500 million in leveraged positions, with the largest daily wipeout of shorts since late February in some samples.

The pain concentrated in major coins such as Bitcoin, Ethereum, and other large caps, where leverage runs deepest. That tells us the move was big enough to reset a lot of leveraged positioning, not just a minor intraday shakeout. When the largest shorts get squeezed in the most liquid names, the signal travels fast through the entire derivatives complex.

Behind the numbers sat a textbook setup. After recent macro and geopolitical volatility, many traders rebuilt short exposure, with funding rates turning negative and open interest climbing as BTC dipped into the mid-60,000s. When spot prices reversed higher amid renewed ETF inflows and easing macro fears, exchanges’ risk engines began liquidating underwater shorts into a rising market, forcing additional buy orders and accelerating the upside.

Similar dynamics played out on ETH, where more than US$100 million in shorts were liquidated in a day, compared with a much smaller amount of long liquidations. Bears leaning too hard into downside with high leverage can turn into forced buyers, amplifying rallies beyond what spot demand alone would justify. I view this as a structural feature of modern crypto markets, not a bug. Derivatives and ETF flows now act as powerful amplifiers, and anyone trading without watching funding rates and open interest is flying blind.

Also Read: Quantum ambitions go global, and Southeast Asia wants in

This squeeze did not happen in isolation. Global markets on 6 March 2026 were dominated by risk-off sentiment as the conflict among the US, Israel, and Iran drove a broad retreat in risk assets. While US stock futures showed some stability early in the day, Asian and European equities fell sharply, heading toward their steepest weekly losses in years. US major indices closed lower on Thursday due to soaring oil prices and geopolitical fears. The Dow Jones dropped 784.67 points to close at 47,954.74. The S&P 500 declined 0.56 per cent to 6,830.71. The Nasdaq Composite slipped 0.26 per cent to 22,748.99.

Overseas, the MSCI Asia Pacific Index fell 1.1 per cent on Friday, marking its worst week in six years. Japan’s Nikkei 225 fell 0.66 per cent to 54,915 points. In Europe, major indices such as the FTSE 100, DAX, and CAC 40 declined by 1.5 per cent to 1.6 per cent amid ongoing energy disruption fears. Oil prices anchored the move, with WTI crude surging above US$80 per barrel following reports of an Iranian strike on an oil tanker and the closure of the Strait of Hormuz. Rising energy and labour costs fuelled fears that the Federal Reserve would maintain high interest rates to combat sticky inflation.

The US Dollar gained as a safe-haven, heading for its best week since 2024. Gold prices remained volatile, briefly hitting US$5,400 earlier in the week before settling near US$5,100 by Thursday. Investors awaited the US Non-Farm Payrolls and Retail Sales reports for February to gauge the health of the labour market. In that backdrop, Bitcoin’s initial surge toward US$74,000 stood out as a sharp counter-trend move before macro gravity reasserted itself.

Also Read: Gold surges past US$5,340 and Bitcoin breaks US$70,000 as Middle East crisis sends markets into chaos

Post-event, derivatives metrics suggest that some excess leverage on the short side has been cleared, with funding rates normalising and open interest stabilising slightly lower. Order book data still shows dense liquidity zones both above and below the current price, and prior episodes suggest that traders are quick to re-leverage once volatility cools.

For risk monitoring, the key signals are funding rates, especially if they flip extreme again, sharp jumps in open interest, and any renewed surge in ETF flows that could interact with crowded futures positioning. The immediate squeeze may be over, but this remains a high-leverage environment where sudden price moves and positioning shifts can still trigger large, fast liquidation cascades. I watch these signals closely because they often telegraph the next inflection before price confirms it.

Bitcoin now trades down 1.72 per cent to US$71,244.79 over the past 24 hours, underperforming a slightly weaker broader market, primarily driven by a risk-off shift amid escalating Middle East tensions. It shows a strong correlation of 0.86 with Gold, indicating a shared macro-driven move. The primary reason remains geopolitical risk from the US-Iran conflict, which spiked oil prices and triggered a flight from risk assets.

A secondary factor was technical rejection at the key US$74,000 resistance level, where selling pressure overwhelmed buyers. Near-term, if BTC holds above the US$70,000 to US$71,000 whale bid zone, it could retest US$74,000. A break below risks a move toward US$67,500. I see this range as the battlefield where macro narrative and derivatives positioning will duel for control.

What should readers take from this sequence?

  • First, the reported US$471 million liquidation wave resulted from an aggressive short buildup caught offside by a strong Bitcoin-led rebound, not from a structural failure in the market. It has cleared some speculative froth, and derivatives activity and ETF flows remain powerful amplifiers, so future positioning extremes could again translate into abrupt squeezes rather than smooth trend moves.
  • Second, in a world where oil can jump above US$80 on geopolitical headlines, and equities can post their worst week in years, crypto will continue to mirror macro risk while retaining its own leverage-driven volatility.
  • Third, independent analysis matters more than ever. Crowded narratives can flip fast when funding rates turn, open interest spikes, or ETF flows accelerate. I prefer to track the plumbing, not just the price.

With all that said, I expect volatility to remain elevated as markets digest geopolitical shocks, inflation data, and the ongoing tug-of-war between risk-on and risk-off flows. Bitcoin’s correlation with Gold at 0.86 reminds us that macro drivers can dominate in the short term, even for an asset built on decentralisation. The derivatives layer adds a crypto-native amplifier that can exaggerate moves in either direction. If funding rates flip extreme again or open interest jumps while price consolidates, prepare for another squeeze. 

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. You can also share your perspective by submitting an article, video, podcast, or infographic.

The views expressed in this article are those of the author and do not necessarily reflect the official policy or position of e27.

Join us on InstagramFacebookX, and LinkedIn to stay connected.

The post What Bitcoin’s US$70,000 support zone means for traders after this week’s volatility appeared first on e27.

Posted on Leave a comment

AI could redefine women in the workplace—and companies must act now

AI is rapidly transforming industries worldwide, bringing both opportunity and disruption to women in the workplace. While AI promises productivity gains and new career paths, it also risks widening existing gender gaps if organisations fail to act deliberately.

Automation is already reshaping how work is structured across sectors. Many roles involving routine or repetitive tasks are increasingly being augmented—or replaced—by AI systems. Because women are often overrepresented in administrative, clerical, and customer service positions, these shifts could disproportionately affect female workers.

As businesses accelerate digital transformation, leaders must consider how technological change impacts gender equity. Without thoughtful workforce planning, AI adoption could unintentionally exacerbate existing disparities in skills development, leadership representation, and career progression.

According to Yvonne Teo, Vice President of Human Resources, APAC at ADP, organisations have a critical responsibility to ensure that technological progress benefits everyone.

“The transition to an AI-driven workplace will reshape roles across every function,” Teo says. “Leaders must ensure this shift expands opportunities rather than deepens existing gaps.”

Her comments reflect growing global conversations about the future of women in the workplace, particularly as companies integrate AI into daily operations.

Also Read: Cybersecurity and trust: A digital dawn for women in rural India 

Upskilling as a strategic priority

Despite widespread discussion about AI, many workers remain uncertain about what the technology means for their careers.

In Singapore, ADP research shows that nearly one in five workers (19 per cent) are unsure how AI will change their job responsibilities. This uncertainty highlights the challenge organisations face in communicating how roles may evolve in an increasingly automated environment.

At the same time, confidence in career readiness appears uneven. Only about one in four female workers (24 per cent) say they believe they have the skills needed to advance their careers over the next three years.

These findings suggest that the conversation about women in the workplace must increasingly include access to future-focused skills. As AI reshapes job requirements, the ability to adapt will become essential.

Workforce transformation cannot rely solely on new technology. It must also include meaningful investment in people.

Teo notes that leaders should approach upskilling strategically and ensure development opportunities are accessible to all employees.

This involves rethinking how jobs are structured. Rather than viewing roles as fixed positions, organisations can break down job scopes into individual tasks and redesign them to integrate both human and AI capabilities.

By doing so, companies can identify where human strengths remain essential. Skills such as critical thinking, collaboration, creativity, and communication remain areas where people outperform machines.

Equipping employees with these capabilities—alongside digital literacy and data analysis skills—will be critical to ensuring that women in the workplace remain competitive in an AI-driven economy.

Also Read: Bridging the gender gap in GenAI learning: Strategies to get more women involved

Designing roles for human-AI collaboration

As AI becomes more embedded in everyday workflows, the most successful organisations will focus on collaboration between humans and machines rather than simple automation.

This means recognising the value of human judgement, relationship-building, and contextual decision-making—areas where technology alone cannot deliver optimal outcomes.

Redesigning roles with these strengths in mind can create new opportunities for employees whose traditional responsibilities may evolve due to automation.

For women whose roles may be more exposed to AI-driven changes, these redesign efforts can be particularly important. Structured career pathways, mentoring programmes, and transparent training opportunities can help ensure that talent pipelines remain diverse and resilient.

The theme of this year’s International Women’s Day, “Give To Gain,” underscores the importance of deliberate action when it comes to workplace equity.

Progress for women in the workplace does not happen automatically through technological advancement. Instead, it requires organisations to intentionally provide equal access to training, mentoring, and career development opportunities.

When companies invest in inclusive skills development, they benefit in multiple ways. A workforce that feels supported and prepared for change is more likely to remain engaged, innovative, and committed.

Equitable access to development also strengthens leadership pipelines, ensuring that women continue to play a vital role in shaping the future of work.

As AI adoption accelerates, the choices organisations make today will determine whether technology becomes a force for greater inclusion—or a catalyst for widening gaps. For leaders navigating this transformation, the goal should be clear: ensure that innovation strengthens, rather than sidelines, women in the workplace.

The post AI could redefine women in the workplace—and companies must act now appeared first on e27.

Posted on Leave a comment

Ecosystem Roundup: The hidden household cyber risk; SEA’s VC winter deepens; The Quantum gold rush turns infra race

Cyber threats in Asia-Pacific are often framed as a technological problem, but the bolttech report reminds us that they are equally a social one. Seniors and teenagers sit at opposite ends of the digital experience spectrum, yet both face strikingly similar vulnerabilities online. One group may trust too easily, while the other often acts too quickly — and cybercriminals are adept at exploiting both behaviours.

In Southeast Asia, these risks are amplified by cultural and structural realities. Multi-generational households, shared devices, and strong social trust networks create environments where a single compromised user can expose an entire family. When a senior forwards a suspicious message or a teen downloads a malicious app, the consequences rarely stay confined to one individual.

Addressing this challenge requires moving beyond generic cybersecurity advice. Education must be localised, language-accessible, and tailored to different life stages. Seniors need clear guidance that builds confidence rather than fear, while teenagers require digital literacy that emphasises critical thinking and responsible online behaviour.

Equally important is reducing the stigma around reporting scams. Victims — whether young or old — often remain silent due to embarrassment. Governments, platforms, and financial institutions must create reporting systems that are simple, immediate, and judgement-free.

Ultimately, building cyber resilience in Asia-Pacific will depend not only on better technology but on stronger digital habits within families and communities.

REGIONAL

Chips, corruption, and credibility: Malaysia’s semiconductor gamble faces a trust test: Malaysia’s probe into the Arm chip design deal raises questions about governance, investor confidence, and SEA’s race for semiconductor leadership.

Southeast Asia’s VC winter? Funding dips sharply in February: Southeast Asia’s startup funding slowed in February 2026, with US$76M across 13 deals. The decline reflects a broader venture capital recalibration amid shifting investor priorities.

Aonic bags US$10M Series A as Malaysia’s agri-drone race heats up: Kairous Capital is the lead investor. Aonic integrates drone manufacturing, software, financing, and operator training to make agricultural spraying faster, safer, and data-driven.

Google DeepMind strengthens Asia Pacific presence with Singapore lab launch: Google DeepMind launched a Singapore research lab to advance frontier AI, expand regional collaboration, and develop inclusive technologies tailored for Asia-Pacific markets and diverse global communities.

TradeTogether raises fresh capital to build MAS-regulated Web3 investment rails: Singapore wealthtech firm targets institutional capital with regulated funds combining tokenised assets, traditional markets, and blockchain-based investment infrastructure.

Singapore to launch AI, tech visa track with US$23K income rule: The track will replace the Tech.Pass and requires applicants to have earned at least a fixed monthly salary of US$17K plus vested non-cash pay to meet a US$23,478 monthly threshold in the past year.

Acceler8 secures seed funding led by a16z Speedrun to build real-time workforce intelligence platform: The company converts real work signals generated across enterprise tools and workflows into continuous intelligence that leaders can use to guide people’s decisions.

Indonesia sets platform age limits for children from March 28: The regulation requires platforms to restrict access so users must be at least 16 for high-risk services and at least 13 for lower-risk services. The rule targets tech companies and sanctions platforms that fail child protection duties, not children or parents.

FEATURES & INTERVIEWS

Quantum ambitions go global, and Southeast Asia wants in: Governments worldwide are investing billions into quantum computing to boost security and innovation. SEA is emerging through partnerships, talent development, and specialised roles in software, manufacturing, and regional collaboration.

The Quantum gold rush is becoming an infrastructure race: Quantum computing funding is concentrating into a few capital-intensive platform companies, reflecting an infrastructure race, while Southeast Asia’s opportunity lies in deployment, integration, and quantum-ready industry ecosystems.

Echelon Philippines 2025 – Partnering for Growth: How great founders and VCs build together: A fireside chat between Puiyan Leung of Vertex Ventures SEA & India, and Thaddeus Koh, Co-Founder and Programs Director of e27, explores the mindset founders need to navigate entrepreneurship.

INTERNATIONAL

Oracle plans thousands of job cuts as AI costs rise: The reductions could start this month and will target roles the company expects to need less of because of AI. Oracle is embarking on a historic build-out of data centres to run AI workloads for customers including OpenAI.

OpenAI CEO criticises Anthropic, backs stronger gov’t power: Anthropic, clashed with the Department of Defense over model use and was labelled a “Supply-Chain Risk to National Security” by Defense Secretary Pete Hegseth before President Trump directed agencies to “immediately cease” using Anthropic technology.

Chinese gaming billionaire plans US$2B investment in next-genAI: Chen Tianqiao, founder of Shanda Group, said the US$2B investment will be used to develop “discoverative AI,” his term for AI integrating long-term memory, causal reasoning, and predictive modelling beyond current large language models.

Netflix buys Ben Affleck’s AI film tech firm: Affleck founded InterPositive in 2022 and said the company trained AI models to follow visual logic and editorial consistency while adding restraints to protect creative intent. Financial terms were not disclosed.

CYBERSECURITY

The household cyber risk no one talks about: Bolttech’s 2026 cyber safety report reveals seniors and teenagers across Asia-Pacific face similar online risks, urging multi-generational education, platform safeguards, and coordinated action to strengthen digital resilience in Southeast Asia.

APAC’s cyber safety crisis: Why overconfidence is putting millions at risk: Consumers across Asia Pacific are dangerously overconfident in their cyber safety, but when it comes to actual online habits, the reality tells a starkly different story.

Cybersecurity and trust: A digital dawn for women in rural India: Rural Indian women are embracing digital tools to grow businesses and access services, but fragile trust, cyber fraud risks, and community-led cybersecurity training shape their journey toward safe digital empowerment.

Why trust is your startup’s only moat: Cybersecurity is the foundation of trust in SEA’s digital economy, where breaches, misinformation, and fraud quickly damage reputation, partnerships, and growth. Clear communication and preparedness protect credibility before crises erupt.

Cybersecurity, psychology, and our awkward digital relationship: Cybersecurity is emerging as the trust layer of APAC’s booming digital economy, where strong security, clear communication, and behavioural nudges help users feel safe while protecting them from rising scams.

Abuse engineering: The discipline security teams still don’t formalise: Abuse engineering reframes platform misuse as adversarial economics, building observability and targeted friction to make exploitation unprofitable while protecting legitimate users.

SEMICONDUCTOR

US considers new AI chip export rules that require investment: The new rules could require foreign nations to invest in the US, including in the American tech stack, or provide security guarantees to receive 200,000 or more AI chip, according to a document.

Taiwan export orders hit record high on strong AI, chip demand: Taiwan’s export orders in January rose 60.1% YoY to US$76.9B, marking the 12th straight month of double-digit growth and the highest single-month total. The figure was up 0.9% from December and beat the ministry’s US$70-72B estimate.

Nvidia shifts chip production on China import delays: sources: Nvidia has shifted TSMC capacity from H200 chips intended for China to its newer Vera Rubin processors after US export controls and possible Chinese import limits stalled the approval process.

AI

AI Agents: Good or bad?: AI agents are transforming digital commerce by autonomously browsing, transacting, and deploying code—reshaping trust models while introducing new cybersecurity risks across e-commerce, payments, and Web3 ecosystems.

Your US$900M AI is failing because humans don’t work the way you think: AI ventures like Olive, Pear, and Babylon collapsed despite strong technology because they ignored real-world workflows. The real barrier to innovation isn’t computation — it’s human behaviour, context, and adoption.

Hunters in the dark: AI agents and the cybersecurity trade-off: AI agents promise powerful automation but expand security risks through deep integrations and credentials. Balancing capability and safety requires zero-trust design, human oversight, verifiable identities, and cross-industry standards.

Why Confluent sees real-time data as the key to AI success in Asia Pacific: Confluent is helping Asia-Pacific enterprises move beyond AI pilots by building real-time data infrastructure, enabling scalable AI deployments, improved governance, and measurable business outcomes across diverse regional markets.

AI-powered cybersecurity solutions driving next-gen enterprise resilience: AI-powered cybersecurity helps enterprises detect subtle threats hidden in routine activity, correlate signals across complex environments, prioritise risks, reduce alert overload, and accelerate response against increasingly automated cyberattacks.

THOUGHT LEADERSHIP

Fragmentation to scale: What the payment journey of India portends to SEA: Southeast Asia’s fragmented digital payments contrast with India’s interoperable UPI model. As real-time payments scale, governance, trust, dispute resolution, and system reliability become critical infrastructure challenges.

2026’s hard truth: Why faster coding means more messy releases: AI has accelerated coding, but startups still miss deadlines because decision friction—unclear scope, weak testing, poor communication, and delayed security—slows delivery. Winning teams build systems that turn decisions into stable releases.

The future of board – C-suite collaboration: From oversight to strategic partnership: Asian boards must evolve from passive oversight to strategic partnership with the C-suite, enabling faster decisions, stronger risk management, innovation, and resilience in today’s complex, fast-changing business environment.

The future of travel payments infrastructure: Is orchestration the missing layer?: APAC travel is rebounding fast, but fragmented cross-border payment systems create operational bottlenecks. Payment orchestration platforms promise unified infrastructure, improving transaction success, reconciliation, fraud control, and conversion.

Asia’s cross-border payment surge: A US$23.8T opportunity with fragmented solutions: Cross-border payments may nearly double from to US$23.8T by 2032, but fragmented infrastructure, regulatory complexity, and weak interoperability challenge fintech expansion across diverse regional markets.

From extreme fear to cautious hope: What the 10-point sentiment swing signals for crypto: Crypto market gains 5.2% to US$2.45T, but strong S&P 500 correlation shows macro liquidity driving rally, not crypto fundamentals. Bitcoin must hold US$72K.

When tools start acting for you: The hidden cost of shadow IT: Shadow IT and Shadow AI emerge when employees adopt unapproved tools to work faster. Individually harmless, these systems can create hidden infrastructure, governance blind spots, and significant security, compliance, and accountability risks.

The post Ecosystem Roundup: The hidden household cyber risk; SEA’s VC winter deepens; The Quantum gold rush turns infra race appeared first on e27.

Posted on Leave a comment

How my entrepreneurial failures led me to rethink learning and upskilling

education and learning

Learning is a forever journey and not something that should be halted or resumed as and when it is seemingly needed. From children requiring tuition in addition to classroom education, or adults in need of self-improvement courses, education has become a necessity.

This situation has been further exacerbated by the COVID-19 pandemic threatening jobs in almost every industry, leading to the need to re-skill and upskill.

However, courses, whether academic or non-academic, have become more and more expensive over the years. Many of them charge exorbitant fees but do not impart lasting impact, knowledge, or significant skills to their students. In the end, students often walk away from these courses feeling disappointed and harbouring a recurring question: What have I learnt from this?

I noticed this phenomenon among my peers when I was in university. At the same time, I fell in love with training, speaking, and educating — basic skills that I felt everyone should have access to. Because of this, I became very disillusioned with these issues within the education industry and set out to change the norm.

Addressing gaps in the education industry

I have been a serial entrepreneur since graduating from the National University of Singapore (NUS). After learning all I could from my internships, I realised that I could combine my love for public speaking and training with my goal of making education and learning, not only transparent but also accessible and affordable — by having students of my own. I began with teaching the skill I was most familiar with and had mastered by the age of 18: forex trading.

To polish my speaking and training abilities, I decided to join multiple firms and take up a variety of leadership positions which I felt accelerated my training as a public speaker. They included positions like Academy Director of Forex100 Academy, a forex trading school; Head of Blockchain Development at Jigsaw Capital, a consulting firm; and Vice President of InvestPage Holdings, an investment holdings company which provided opportunities to investors while serving as an education hub.

Also Read: HH Investments VC Founder Maarten Hemmes on why the entrepreneurial journey is more important than the end result

Each of these roles required me to lead others, imparting the lessons and skills that I had learned as I polished my skills over the years. However, the journey towards becoming a professional trainer and speaker was not easy.

One of the challenges which I faced in becoming a professional trainer was my age. As I started with financial coaching, many believed that I was too young to be coaching other people and that age reflected my calibre. Despite giving it my best in terms of teaching, many still found it hard to trust me because of my youth.

Another challenge I faced was my own conscience; while I did not believe in overpriced courses, I was constantly pressured to follow the “market rate” while setting the prices for my courses. It troubled me greatly because in my heart, I knew that education and the price tag attached to it, should be affordable by the masses. These challenges, especially the latter, continue to haunt me as I struggled to find my compass in life.

Soon, I started Reubiks Academy in 2014, which began as a transparent and trusted learning ecosystem for aspiring traders and those looking to boost their financial literacy and wealth management skills.

The road to digitising education and making learning transparent

As I continued to hone my skills as a trainer, the path to success was even rockier. I unexpectedly experienced failure after failure in my pursuit of entrepreneurship. I was even betrayed by ex-business partners resulting in a financial loss of approximately S$200,000 (US$150,000) by the time I was 27 years old.

This betrayal was extremely painful because I had trusted my then-partner so much, leaving him to handle day-to-day operations while I focused on running the sales component of the company.  At one point, my losses had become so enormous that I only had S$289.60 (US$217) to survive. However, I learned a valuable lesson; a true blue entrepreneur might not be the best at every component of the business but he or she must be able to, at least oversee and execute it at a basic level.

Despite falling on hard times, I only became even more determined to create viable options and transparent avenues for everyone looking to learn. More than that, I aimed to protect students, young and old, from potentially unscrupulous individuals, who would charge large sums of money in exchange for a curriculum that provided little value.

Also Read: SMU’s Protégé Ventures as a catalyst for entrepreneurial education

To recover my losses, I took on multiple part-time jobs just to get by. I worked part-time as a sales associate in the Merchant Acquisition department at GrabFood, gave tuition to primary school children, taught blockchain technology to adults, and took on website and app development projects.

During this period, I discovered that not only did parents find it difficult to find affordable and reliable tuition for their children, but that people looking to learn a skill were not given sufficient choices like price comparisons of courses, and previews of their selected curriculum, among others.

Most importantly, the entire education industry needed disruption as parents and learners were still making phone calls to arrange tuition for their children with a tutor they have never seen before.

The culmination of my part-time gigs, especially during a time where online marketplaces like Grab were gaining notoriety, led me to create a platform that would allow students to “shop” for tutors and lessons in a marketplace setting. With this, Reubiks Academy evolved into Reubiks mobile app, an education marketplace that gives students access to any educational curriculum imaginable, whether academic or non-academic.

How education marketplace benefits both tutors and students

 In line with the goals that initially spurred me on to embark on this journey, an education marketplace like Reubiks mobile app provides students with transparent, accessible, and affordable education that was never available before.

By browsing through a list of tutors, their curriculum, their teaching styles, and their fees, and filtering them via a simple comparison feature, students of all ages can make informed choices in their learning journey with us. Transparency is further guaranteed by the marketplace as students can experience free trials before deciding on their lessons.

Meanwhile, trusted tutors who utilise a platform such as Reubiks mobile app are able to tap into a network of eager students, enabling a more efficient method of teaching while ensuring a healthy transfer of knowledge.

Also Read: How edutech startups can accelerate active learning

With the COVID-19 pandemic resulting in education becoming an increasingly virtual process, tutors must find new ways to reach their students and conduct classes effectively. Therefore, an education platform such as Reubiks mobile app which matches students to prospective tutors and vice versa might just be the answer!

 –

Editor’s note: e27 aims to foster thought leadership by publishing contributions from the community. Become a thought leader in the community and share your opinions or ideas and earn a byline by submitting a post.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

Image credit: Annie Spratt on Unsplash

This article was first published on December 14, 2020

The post How my entrepreneurial failures led me to rethink learning and upskilling appeared first on e27.