Blog

cyber-threats-today-privasec

Cyber Threats Today

In a world full of costly data breaches and invasive privacy incidents, Singapore is not immune. It’s not just the big threats such as cyber criminals, nation-state hackers and cyber espionage—even simple employee mistakes can end up exposing private data and costing your organisation millions.

To combat the growing wave of privacy and cybersecurity issues, Singapore passed the Personal Data Protection Act (PDPA) 2012. These regulations are complemented by the Data Protection Trustmark (DPTM), a voluntary certification that helps organisations demonstrate that they have appropriate protection and privacy practices in place to guard their personal data.

spear-phishing-privasec

Spear Phishing

According to an article by Smart Company (one of Australia’s premier publication for growth businesses and entrepreneurs), 516,380 small businesses fell victim to cyber-crime last year. The first step in falling for a cyber-attack is believing that you won’t be attacked. Prevention starts with educating your employees about some of the most common types of cyber-attacks such as Spear Phishing and how they can be countered.

Privasecs-new-office

Privasec’s New Office

To accommodate our growing team and business demands, we have moved to our new Privasec Office in Singapore.

Looking forward to our prosperous and successful future with the growing Privasc team!

what-is-PT-landscape-privasec

Penetration Test

Penetration Testing is an authorised simulation of an attack on a system network, or application where certified and ethical hackers are engaged to identify potential vulnerabilities that can be exploited. Find out more in this article

spear-phishing-attacks

Phishing and How to prevent it

In 2019, attackers are phishing targets to retrieve sensitive information that ultimately leads to data compromise. Phishing is the technique where a malicious actor lures a victim into revealing sensitive information. This can be through large “spray-and-pray” type campaigns involving multiple recipients or, a more targeted approach crafting attacks for specific individuals, known as Spear Phishing. Phishing has been around since the early days of the Internet as one of the oldest vectors of attack.

cyber-hygiene-practices-privasec

Cyber Hygiene: Covering All Bases

When it comes to a business’ cyber hygiene, it pays to secure your extended ecosystem and ensure best practices are followed with all the partners, vendors or any other intermediaries that you work with on a regular basis.

evolution-of-ransomware-attacks-privasec

Evolution of Ransomware attacks

According to recent studies on cyber trends, ransomware attacks will continue to evolve and pave the way for two- stage extortion attacks: attacking victims with ransomware attacks to extract files and then extorting a ransom by threating to disclose sensitive data.

data-privacy-event

Data Privacy Panel Discussion: DPTM vs CBPR

DPTM (Data Protection Trustmark) is the go-to standard for organisations in Singapore to demonstrate compliance with sound data protection practices. It helps to highlight a company’s commitment to protecting their client’s personal information, building assurance and trust with both clients and stakeholders.

In light of this, where does CBPR come in? Are both initiatives complementary or mutually exclusive? In the context of cross-border data flows, what are the differences between the two?

Join us in unpacking some of the intricacies behind these initiatives and gaining more insight into all sides of the Data Privacy compliance equation.

Scroll to Top