Resources

Data Minimization; Why Bigger is Not Always Better

Data Minimization; Why Bigger is Not Always Better

Data Minimization; Why Bigger is Not Always Better "Rather than focusing on opt-in v. opt-out ... we should be discussing…

3 years ago

Vulnerability Management For Cybersecurity Dummies

Vulnerability Management For Cybersecurity Dummies The Center for Internet Security (CIS) ranked vulnerability management among its Top 18 CIS Controls…

3 years ago

Compliance With Singapore Privacy Obligations; Made Easier!

Compliance With Singapore Privacy Obligations; Made Easier! Strict adherence with Singapore privacy obligations can be tricky especially with SMEs; here…

3 years ago

Got notice of data breach? Don’t panic!

Handling a notice of data breach is as easy as taking three deep breaths Got a notice of data breach?…

3 years ago

A Review of PDPC Undertakings July 2021 Cases

PDPC Undertakings July 2021, two cases to emphasize the importance of employee training in PDPA A Review on PDPC Undertakings…

3 years ago

Protecting Data Online in the New Normal

Protecting Data Online in the New Normal Protecting data online could not be more overemphasized in the "new normal" we…

3 years ago

The Top 4W’s of Ethical Hacking

The Top 4W's of Ethical Hacking Prevention is better than cure. Ethical hacking is still viewed as one of the…

3 years ago

What is Social Engineering and How Does it Work?

What is Social Engineering and How Does it Work? What is social engineering and why is it among the most…

3 years ago

4 Reasons Why You Need an Actively Scanning Antivirus Software

4 Reasons Why You Need an Actively Scanning Antivirus Software Your data needs round-the-clock protection. The importance of actively scanning…

3 years ago

5 Types of Ransomware, Distinguished

5 Types of Ransomware, Distinguished Knowing the distinction between the types of ransomware can help you take the more appropriate…

3 years ago