Resources

Social engineering attacks: 4 Ways businesses and individuals can protect themselves

Social engineering attacks: 4 Ways businesses and individuals can protect themselves

Social engineering scams are rampant, but businesses and individuals can protect themselves from such threats.

3 years ago

How can businesses protect their enterprise from Business Email Compromise (BEC) attacks?

Protect your enterprise from Business Email Compromise attacks! Business Email Compromise (BEC) attacks As reported by Singapore Computer Emergency Response…

3 years ago

6 ways to recognize potential phishing scam and what to do if you receive one

There are ways to recognize a phishing scam! SINGAPORE – According to the Singapore Police Force (SPF), a new variant…

3 years ago

How does ransomware happen? Here are 7 ways to prevent them

Ransomware happen when not being careful. Here are 7 ways to prevent them. How does ransomware happen The key in…

3 years ago

Ways to protect HR data and avoid penalties for data breaches

There are many ways to protect HR data, and organisations benefit from learning how to properly harness them.

3 years ago

Data Protection Act of Singapore: Validity in the Post-pandemic World

Let's explore the increasing validity of Data Protection Act of Singapore in the Post Pandemic World Data Protection Act of…

3 years ago

National Cybersecurity Awareness Campaign of Singapore: Better Cyber Safe than Sorry

The 4th Edition National Cybersecurity Awareness Campaign of Singapore The 4th Edition National Cybersecurity Awareness Campaign of Singapore is here…

3 years ago

Revised Technology Risk Management Guidelines of Singapore

2021 Revised Technology Risk Management Guidelines of Singapore The Revised Technology Risk Management Guidelines of Singapore  After engaging with cyber…

3 years ago

September 2021 PDPC Incidents and Undertaking: Lessons from the Cases

We take a look at the September 2021 PDPC incidents and undertaking, where we glean vital cybersecurity and data protection…

3 years ago

The 5 Important Things To Know In Security Pen Testing

Penetration testing (or pen testing) is a security pen testing exercise where a cyber-security expert attempts to find and exploit…

3 years ago