top of page
eVantage Technology - Latest Stories
Search


The Relentless Chore of Testing your Backup
I am relentless. I’m always pounding people to back up. And I will continue to do so! Because, if you care about it, then back it up!...
Therese Park
Aug 29, 20194 min read


Technology in a Potluck State – BYOD
How many of you have attended a potluck before? Well, I’m sure many of you reading this have indeed been to one before, where you are...
Therese Park
Aug 22, 20196 min read


All about the Vulnerability Scan
Vulnerabilities are a part of life. You have them, I have them, his dog has them, her cat has them. Basically, everyone has them. Even...
Therese Park
Aug 15, 20196 min read


Pen Test: The Why, The When and The How
Imagine it is midnight, and you already got under the covers and switched off the lights, when suddenly, you thought to yourself “Did I...
-
Aug 8, 20195 min read


Do I really need an Antivirus?
It was November 2, 1988. The time was approximately 8 p.m. No one predicted that within hours, around 10% of all machines connected to...
Therese Park
Aug 1, 20195 min read


13 Ransomware Statistics all Businesses MUST Know
What is Ransomware? Let’s get this straight. Ransomware is NOT Malware, and it is NOT Ransom. Instead, Ransomware is a type of malicious...
-
Jul 25, 20193 min read


Why should I update to Windows 10?
Most people don’t like change. They revolt against it unless they can clearly see the advantages it brings. It’s like if my parents...
-
Jul 18, 20195 min read


The Great (fire)Wall of China
Traveling to China soon? Then you might want to read this article to know how to work around The Great Firewall of China. If you’re...
-
Jul 11, 20193 min read


10 Cyber Security Tips for Frequent Travellers
If you travel for work, you are a target. Let me say that again. If you travel for business, YOU. ARE. A. TARGET. And it’s not just...
-
Jul 4, 20194 min read


What to do if your company laptop gets stolen
Imagine this: You are in San Francisco for a work trip when you realized the conference you have to attend is a 3-hour drive away. Armed...
-
Jun 27, 20195 min read


What to do if your personal laptop gets stolen
In a country other than Singapore, the scenario would go something like this: Last Friday in Boston, I headed to a bar near my hotel with...
-
Jun 20, 20194 min read


If I have a Firewall, do I still need Endpoint Protection?
Network Security VS Endpoint Security Cyber attacks, such as the 2018 SingHealth cyber attack, affect 556 million victims per year. This...
-
Jun 13, 20194 min read


No more Passwords in 2019?
Saying adiós to Multifactor authentication and hola to Windows Hello Logging into most systems requires two things – a username, and a...
-
Jun 6, 20194 min read


Why every business should use EFSS solutions
Benefits of using Enterprise File Sync and Share (EFSS) solutions Whether you are an executive, a member of IT staff or a user in a line...
Therese Park
May 30, 20193 min read


4 Reasons why companies choose Managed Service Providers (MSP)
A more cost effective way to manage your Company’s IT As your organisation expands, you might find your current IT solutions inadequate....
-
May 23, 20193 min read


Why it matters: Business Continuity and Disaster Recovery (BCDR)
Remember when you were working on a document and suddenly, the computer crashed. It could be due to a multitude of reasons – the power...
-
May 16, 20194 min read


3 Lessons to learn from the SingHealth Cyber-Attack in 2018
The hacking of SingHealth’s database on June 2018, labelled as Singapore’s worst Cyber-Attack, was brought back into the spotlight as the...
-
Mar 14, 20192 min read


3 Simple Cybersecurity Tips for the Public Holidays
During the Public Holidays, businesses are particularly vulnerable to Cyber-Attacks. Here are some tips to help you enjoy the Public...
-
Mar 7, 20192 min read


Backup vs Business Continuity – What’s the Difference?
When we look at Data Backups, we would normally believe that it is a form of Business Continuity Planning where firms secure their data....
-
Jul 4, 20183 min read


Managing Cyber Security – one “bite” at a time
The ransomware WannaCry has been creating a big buzz in the world of IT Security these past days. At the time of this writing, WannaCry...
-
May 30, 20173 min read


Security Advisory: Ransomware Attack – WannaCry
On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) ransomware began an unprecedented attack on organisations worldwide. ...
-
May 15, 20172 min read


IT Security: Your best chance at the cyberwar
Cybercrime is not new. It has been around as early as the 70s and will continue to threaten the world. Experts predict that by 2021,...
-
Feb 4, 20173 min read


Smells Phishy? Here’s some IT security tips.
IT Security is increasingly important this year. A shocking statistic by the Anti-Phishing Working Group (APWG), reported that the...
-
Dec 8, 20162 min read


Top 5 practical tips to protect your business today
Did you know… that 90% of large organisations suffered an information security breach in 2015?[1] Your organisation could be next! Most...
-
Oct 19, 20162 min read
bottom of page