Email:

Phone No.

Whatsapp

Tag: privacy ninja

13 phishing attack types and how to protect your business against them
13 phishing attack types and how to protect your business against them
13 phishing attack types and how to protect your business against them
13 phishing attack types and how to protect your business against them

13 phishing attack types and how to protect your business against them

13 phishing attack types and how to protect your business against them Phishing attacks have existed since the internet’s infancy. The earliest phishing attacks began in the mid-1990s, using AOL to collect passwords and credit card numbers. Today’s cybercriminals utilize increasingly sophisticated social engineering techniques. In essence, phishing is a social engineering attack that employs

Cybersecurity for SMEs: What employees should know

Cybersecurity for SMEs: What employees should know The employees are the first line of defense and key to any enterprise’s cybersecurity. Thus, we gathered some important tips that SME employees could practice and bear in mind in the workplace, whether working from home or in the office. Here are the four (4) reminders to employees:

What every organization should know about the Notification Obligation

What every organization should know about the Notification Obligation In early February, Singapore became the latest Asian state to enact the mandatory data breach notification obligation. The new rules were enacted as amendments to Singapore’s Personal Data Protection Act 2012 (PDPA), which has been in effect for more than six years. Mandatory data breach notification

On bank phishing scams: What banking institutions do to reduce them

On bank phishing scams: What banking institutions do to reduce them Singapore is tightening security steps to reinforce the local banking and communications infrastructures, including the need for SMS service providers to check against a registry before sending messages. Banks are also expected to develop “more adaptable” artificial intelligence (AI) programs to detect illicit transactions. The enhanced

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us