Resources

How To Secure Your WiFi Camera: 4 Points To Consider

How To Secure Your WiFi Camera: 4 Points To Consider

How To Secure Your WiFi Camera: 4 Points To Consider If you are not yet thinking much about how to…

4 years ago

How Formidable is Singapore Cybersecurity Masterplan 2020?

How Formidable is Singapore Cybersecurity Masterplan 2020? The full version of the Singapore Cybersecurity Masterplan 2020 is available for download…

4 years ago

Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

Going Beyond DPO Meaning: Ever Heard of Outsourced DPO? So you know what the DPO meaning is and what a…

4 years ago

5 Common Sections in an Agreement Form Example

5 Common Sections in an Agreement Form Example An agreement form example looks very much similar to a contract form…

4 years ago

Limiting Location Data Exposure: 8 Best Practices

Limiting Location Data Exposure: 8 Best Practices Limiting location data exposure can be a huge challenge in a generation that…

4 years ago

10 Practical Benefits of Managed IT Services

10 Practical Benefits of Managed IT Services If they haven't yet, organisations must acknowledge that the benefits of managed IT…

4 years ago

What is Pentest Report? Here’s A Walk-through

What is Pentest Report? Here's A Walk-through We are giving you walk-through on what is pentest report, why every organisation…

4 years ago

The PDPA Data Breach August 2020: A Recap of 8 Alarming Cases

The PDPA Data Breach August 2020: A Recap of 8 Alarming Cases The recent PDPA Data Breach August 2020 underscores…

4 years ago

How long do employers keep employee records after termination?

How long do employers keep employee records after termination? If you ask the Ministry of Manpower, it's not as long…

4 years ago

By attending this event you agree to be photographed

If you're no stranger to events, then you're no stranger to seeing this disclaimer, either: "by attending this event you…

4 years ago