We can help with SG Cyber Safe Certification

Privasec Content

InfoSec Registered Assessors Program (IRAP) Explained

Just like other businesses, the Australian federal government has undertaken substantial digital transformation in projects such as myGov, Digital Entity, cloud.gov.au, data.gov.au etc. But with more digitalisation, comes more risk. In recent years, malicious actors have been successfully finding ways to overcome government capabilities. For this reason, Information security has been a top national priority for the Australian government.

cyber-threats-today-privasec

Cyber Threats Today

In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.

To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.

spear-phishing-privasec

Spear Phishing

According to an article by Smart Company (one of Australia’s premier publication for growth businesses and entrepreneurs), 516,380 small businesses fell victim to cyber-crime last year. The first step in falling for a cyber-attack is believing that you won’t be attacked. Prevention starts with educating your employees about some of the most common types of cyber-attacks such as Spear Phishing and how they can be countered.

Privasecs-new-office

Privasec’s New Office

To accommodate our growing team and business demands, we have moved to our new Privasec Office in Singapore.

Looking forward to our prosperous and successful future with the growing Privasc team!

what-is-PT-landscape-privasec

Understanding Penetration Testing: What Is It & the Types

In the ever-evolving landscape of cybersecurity, staying one step ahead of potential threats is paramount for businesses. Penetration testing stands as a robust strategy to fortify digital defences, safeguard sensitive information, and ensure the resilience of an organisation’s systems. As companies in Singapore and beyond seek to bolster their security measures, the importance of conducting a penetration test has become increasingly pivotal.

spear-phishing-attacks

Phishing and How to prevent it

In 2019, attackers are phishing targets to retrieve sensitive information that ultimately leads to data compromise. Phishing is the technique where a malicious actor lures a victim into revealing sensitive information. This can be through large “spray-and-pray” type campaigns involving multiple recipients or, a more targeted approach crafting attacks for specific individuals, known as Spear Phishing. Phishing has been around since the early days of the Internet as one of the oldest vectors of attack.

cyber-hygiene-practices-privasec

Cyber Hygiene: Covering All Bases

When it comes to a business’ cyber hygiene, it pays to secure your extended ecosystem and ensure best practices are followed with all the partners, vendors or any other intermediaries that you work with on a regular basis.

data-privacy-event

Data Privacy Panel Discussion: DPTM Vs CBPR

DPTM (Data Protection Trustmark) is the go-to standard for organisations in Singapore to demonstrate compliance with sound data protection practices. It helps to highlight a company’s commitment to protecting their client’s personal information, building assurance and trust with both clients and stakeholders.

In light of this, where does CBPR come in? Are both initiatives complementary or mutually exclusive? In the context of cross-border data flows, what are the differences between the two?

Join us in unpacking some of the intricacies behind these initiatives and gaining more insight into all sides of the Data Privacy compliance equation.

evolution-of-ransomware-attacks-privasec

Evolution of Ransomware attacks

According to recent studies on cyber trends, ransomware attacks will continue to evolve and pave the way for two- stage extortion attacks: attacking victims with ransomware attacks to extract files and then extorting a ransom by threating to disclose sensitive data.

Scroll to Top