Blog
The new ISO 27001:2022 to address modern cybersecurity challenges.
ISO 27001:2022 has been real
Privasec – 2022 Year in Review
As 2022 draws to a close, join Privasec in this quick recap of the past year. We look forward to another year worth celebrating!
Meet Your Compliance Needs with ISO 27001 Certification
With the implementation of an ISO 27001 certified Information Security Management System (ISMS), organisations can demonstrate and provide security assurance, where security policies, processes and procedures are put in place to secure the information assets.
Inaugural Cyber Risk Meetup in Manila | Philippines Chapter
Proudly supported by Sekuro and Privasec Asia, we are proud to share that our first-ever Cyber Risk Meetup in Manila, Philippines was a great success! It was an honor to have HK Yu PSM, the Australian Ambassador to the Philippines as she discussed the importance of stepping up capability-building initiatives between Australia and the Philippines, which is crucial in ensuring cyber resilience and prosperity. We are greatly appreciative for our panel speakers – Charmaine Valmonte, Mel Migrino, and Jan Encina’s thoughtful sharing of their distinct experiences and opinions on cyber maturity and company resiliency. Additionally, it was pleasant to have Frida Tan, the Philippines’ new chapter lead for Cyber Risk Meetup to host the panel discussion and Prashant Haldankar for moderating it. We express our sincere gratitude to all our partners, Australian Trade and Investment Commission (Austrade) and MySecurity Marketplace, for making the event an excellent success. Panel Discussion | Key Takeaways Our panel evaluates the need to reframe their roles to regain control of organization risk and thrive in this ever-growing business environment. Without finding a means for the IT professionals, cyber experts, risk managers, and business people to communicate in a common language, resilience cannot be built. Without …
Benefits of ISO 27001
With the implementation of an ISO 27001 certified Information Security Management System (ISMS), organisations can demonstrate and provide security assurance, where security policies, processes and procedures are put in place to secure the information assets.
Understand Red Teaming
Our Red Team Lead, Justin Chong, sheds light on Red Teaming in the InfoSec World. The engagement tests and assesses the various aspects of an organisation’s overall security , providing a better understanding of its environment and the effectiveness of its security controls.
Cyber Threats Today
In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.
To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.
Spear Phishing
According to an article by Smart Company (one of Australia’s premier publication for growth businesses and entrepreneurs), 516,380 small businesses fell victim to cyber-crime last year. The first step in falling for a cyber-attack is believing that you won’t be attacked. Prevention starts with educating your employees about some of the most common types of cyber-attacks such as Spear Phishing and how they can be countered.
Privasec’s New Office
To accommodate our growing team and business demands, we have moved to our new Privasec Office in Singapore.
Looking forward to our prosperous and successful future with the growing Privasc team!
Penetration Test
Penetration Testing is an authorised simulation of an attack on a system network, or application where certified and ethical hackers are engaged to identify potential vulnerabilities that can be exploited. Find out more in this article
Phishing and How to prevent it
In 2019, attackers are phishing targets to retrieve sensitive information that ultimately leads to data compromise. Phishing is the technique where a malicious actor lures a victim into revealing sensitive information. This can be through large “spray-and-pray” type campaigns involving multiple recipients or, a more targeted approach crafting attacks for specific individuals, known as Spear Phishing. Phishing has been around since the early days of the Internet as one of the oldest vectors of attack.
Event Recap | Data Privacy Panel Discussion: DPTM vs CBPR
In this panel discussion, hear from industry experts from various industries on how your organisation can address Data Privacy effectively, the importance, and how to maintain it!