KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Microsoft Removes Windows Defender Ability After Security Concerns Microsoft has removed the ability to download files using Windows Defender after it was demonstrated how it could be used by attackers to download malware onto a computer. Last week, we reported that Microsoft quietly added the ability to download files using Windows Defender for an unknown reason. When this
Keeping up with the demands of a growing business in an increasingly digitalised world can be cumbersome for any organisation. This is especially true when it comes to system maintenance. Organisations that rely solely on their internal IT team for system management may find that their IT has become more reactive than proactive. Initially, the
A penetration test (which can also go by the terms ‘pen test’, ‘pentest’, or ethical hacking), is defined as an authorised simulated cyber attack on a computer system, which is done to evaluate the security of that system. A full risk assessment is completed when both vulnerabilities and strengths are identified. Sadly, some organisations treat
By definition, a data breach pertains to any unauthorised access, collection, use, disclosure, copying, modification, or disposal or personal data in an organisation’s possession or under its control. Data breaches must be taken seriously as it often leads to financial losses, not to mention a loss of consumer trust for the organisation. In Singapore, the