We can help with SG Cyber Safe Certification

Blog

Marriot Data Breach and What Should the Customers do to Protect Themselves

Marriot on Friday reported a data breach affecting the information of 500 million of its Starwood customers. The stolen information includes name, phone number, email addresses, passport number and in some cases credit card numbers and expiry dates. While the company is still taking measures to do damage control for the second-biggest breach in history (after Yahoo’s data breach), here is what consumers can do to protect themselves:

How using Safari can get you Hacked

Dropbox has recently revealed three critical vulnerabilities in the Apple MacOS operating system, which could allow a hacker to execute a malicious code by convincing the victim to visit the malicious web page.

ISACA COBIT framework

The importance of Information and Technology Governance cannot be overstated. With companies trying to maximise the value derived from IT assets while managing the associated risks, the need for a structured approach to designing and implementing enterprise governance for IT is key.

READ MORE …

Daily Backups

One of the most overlooked ACSC Essential Eight strategies in mitigating cybersecurity incidents is daily backups. Think of it as your absolute fail-safe in a scenario when all other security controls have failed. But what are the steps and strategies involved in backing up your data?

Dealing with a Data Breach

The 2019 Threat Report produced by Sophos Labs provides an in-depth analysis of key cyber-attack trends. The report also helps the readers analyse the cybersecurity landscape and trends likely to impact the industry in 2019.

Cost of a Data Breach

IBM sponsored the 13th annual cost of a Data Breach study, the industry’s gold-standard benchmark research, which was independently conducted by Ponemon Institute. The infographic depicts some of the key findings.If you are currently working to strengthen your security posture against any data breach scenarios, we would love to get involved! Reach out to our …

Cost of a Data Breach Read More »

Tips to enhance & strengthen passwords

Password security remains one of the most neglected topics in the cyber world. Despite increasing awareness in this space, there are still a number of people using ‘1234546’ or ‘password’ to secure their account!

Importance of Application Whitelisting Strategy for Businesses

Application whitelisting is the practice of specifying an index of approved software applications to run on a computer system. The Australian Cyber Security Centre (Australian Government’s lead on national cybersecurity) categorises application whitelisting as one of the eight essential cyber risk mitigation strategies.

Scroll to Top