Privasec Content

Navigating Cloud Security | CSA STAR Level 2 Certification 

In today’s digital landscape, the rapid adoption of cloud technology has brought forth a myriad of security challenges. Businesses entrust critical operations and sensitive data to cloud service providers (CSPs), making robust security measures paramount. This is where the Cloud Security Alliance (CSA) STAR Level 2 comes in, offering a comprehensive framework for assessing and

Navigating Cloud Security | CSA STAR Level 2 Certification  Read More »

InfoSec Registered Assessors Program (IRAP) Explained

Just like other businesses, the Australian federal government has undertaken substantial digital transformation in projects such as myGov, Digital Entity, cloud.gov.au, data.gov.au etc. But with more digitalisation, comes more risk. In recent years, malicious actors have been successfully finding ways to overcome government capabilities. For this reason, Information security has been a top national priority

InfoSec Registered Assessors Program (IRAP) Explained Read More »

spear-phishing-privasec

Understanding Spear Phishing and How to Prevent It

According to an article by Smart Company (one of Australia’s premier publication for growth businesses and entrepreneurs), 516,380 small businesses fell victim to cyber-crime last year. The first step in falling for a cyber-attack is believing that you won’t be attacked. Prevention starts with educating your employees about some of the most common types of

Understanding Spear Phishing and How to Prevent It Read More »

what-is-PT-landscape-privasec

Understanding Penetration Testing: What Is It & the Types

In the ever-evolving landscape of cybersecurity, staying one step ahead of potential threats is paramount for businesses. Penetration testing stands as a robust strategy to fortify digital defences, safeguard sensitive information, and ensure the resilience of an organisation’s systems. As companies in Singapore and beyond seek to bolster their security measures, the importance of conducting

Understanding Penetration Testing: What Is It & the Types Read More »

spear-phishing-attacks

Phishing and How to prevent it

In 2019, attackers are phishing targets to retrieve sensitive information that ultimately leads to data compromise. Phishing is the technique where a malicious actor lures a victim into revealing sensitive information. This can be through large “spray-and-pray” type campaigns involving multiple recipients or, a more targeted approach crafting attacks for specific individuals, known as Spear

Phishing and How to prevent it Read More »

data-privacy-event

Data Privacy Panel Discussion: DPTM Vs CBPR

DPTM (Data Protection Trustmark) is the go-to standard for organisations in Singapore to demonstrate compliance with sound data protection practices. It helps to highlight a company’s commitment to protecting their client’s personal information, building assurance and trust with both clients and stakeholders.

In light of this, where does CBPR come in? Are both initiatives complementary or mutually exclusive? In the context of cross-border data flows, what are the differences between the two?

Join us in unpacking some of the intricacies behind these initiatives and gaining more insight into all sides of the Data Privacy compliance equation.

Data Privacy Panel Discussion: DPTM Vs CBPR Read More »

Scroll to Top