Privacy Ninja

DPIA example

DPIA example: Understanding the 6 phases of its life cycle

Conducting a DPIA ensures that the policies and procedures to be implemented comply with the obligations stated in the PDPA. With this, organisations in Singapore should see to it that whenever there are changes in the policies implemented or changes in general to the functions and services of the organisation, a DPIA must be first conducted to ensure that any possible loopholes or vulnerabilities are covered and acknowledged. 

best apps for online privacy

15 best apps for online privacy: Your ultimate guide

These best apps for online privacy could help you protect your personal data from bad actors lurking and waiting for you to let your guard down.

If you don’t want to subscribe to these apps that asks you monthly fees, you can also opt privacy phones, such as Privacy Ninja’s AntiHAck phone. This phone offers built-in protection so that you no longer have download apps for your online privacy.

email impersonation

Email impersonation scams: What are the types and how to protect your business against them?

For the longest time, employees have been the constant target of bad actors simply because they have the level of access that could penetrate the organisation’s cybersecurity. This could be in the form of hacking for passwords, phishing, and, the most common, email impersonation scams. In this article, we defined what is an email impersonation, discussed its types, and explained how you protect your business against them.

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Powered by WhatsApp Chat

× Chat with us