Therese ParkJun 236 min10 Common IT Security Mistakes made by Small BusinessesHere's the issue with security breaches - complacency! Why is this so, and what are some of the common IT security mistakes made?
Therese ParkJun 162 minHow to mitigate a potential Ransomware attackIf you don’t pay a ransom, how do you recover? Well, here are some key measures you can take to prepare for and mitigate a potential attack
Therese ParkApr 73 minThe 4 Common Types of Scams in Singapore and how to recognise themHere’s the sad truth – scams are on the rise. So what are some of the most common types of scams going around Singapore?
Therese ParkMar 241 min6 Essential Cyber Security Tips to Stay Safe OnlineWhat are some essential cyber security tips to stay safe online and strengthen your organisation’s cyber defence?
Therese ParkMar 173 minHow to Check your Devices for Stalkerware53,870 mobile users were survivors of stalkerware in 2020. So what exactly is it, and how do you check your devices for stalkerware?
Therese ParkMar 102 minHow to Prevent your Phone from being StalkedWhat is stalkerware (or spyware) and how can you prevent your phone from being stalked? ...
Therese ParkMar 32 minHow do you spot the red flags of Cyberstalking and what should you do if you fall victim to itThe number of cyberstalking cases increased from 12 cases in 2018, to 26 cases in 2021. So how do you spot the signs of cyberstalking?
Therese ParkFeb 243 min9 Online Security Tips for SeniorsI don’t know about your mother, but my dear dear mother is very trusting of people online – especially Carousell buyers. Even if the...
Therese ParkFeb 173 minTo Click or Not To Click: That is the QuestionBut remember, if you are even a little bit suspicious of a text message or email – do not click it. Let me repeat that. DO NOT CLICK IT...
Therese ParkFeb 102 minHow to Avoid Online Romance ScamsPeople ages 40 to 69 reported losing the most money to romance scams! So how do you identify a scam and protect yourself online?
Therese ParkJan 132 min10 Common Cybersecurity Misconceptions for Small and Medium BusinessesIt is important that small and medium businesses do not have misconceptions about cybersecurity, because the consequences can be dire...
Therese ParkDec 16, 20213 min14 Business Travel Security Tips You Must Know Before Your Next TripWhile you are travelling, here are some simple practices you can adopt to help keep your devices safe and secure...
Therese ParkDec 9, 20213 min7 Holiday Season Security Tips for Small MerchantsWith online shopping growing, what steps can merchants take to protect their business and customer data from cyber criminals...
Therese ParkDec 2, 20213 min8 Tips for a Safe Online Holiday ShoppingWhile doing your holiday shopping, what steps can consumers like you and me take to better secure our online accounts and transactions?...
Therese ParkOct 28, 20215 minHow To Set Up Two-Factor Authentication On All Your Online AccountsTwo-factor authentication (2FA) is a process that gives web services an extra layer of security. So how do you set it up?
eVantage TechnologyJul 29, 20214 minHow to prevent Online ImpersonationI have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...
eVantage TechnologyJul 22, 20213 minYour 2021 Cybersecurity HabitsAnother year of COVID-19, but still the same cybersecurity hacks. In fact, cybercrime is continuing on a rampant incline and shows no...
eVantage TechnologyJul 15, 20213 minThe Jane Doe Case: Making Safe Payments OnlineWhat do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...
eVantage TechnologyJul 8, 20213 minThe Jane Doe Case: When To Trust Others OnlineDo you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...
Therese ParkMar 18, 20214 minWhat is a Man-in-the-middle Attack?What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...
Therese ParkMar 4, 20212 minHow do Hackers commit Cyber Crime?The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...
Therese ParkOct 1, 20204 minThe Importance of Investing in Cybersecurity Right NowLet me ask you this, doesn’t it seem like new major cybersecurity breaches are happening almost every day? Of course, the bigger the...
Therese ParkAug 27, 20207 min11 Cybersecurity Myths you need to Stop Believing to Protect your BusinessCybersecurity preparedness is one of the major obstacles businesses are facing today. Yet, despite the increased focus on making...
Therese ParkAug 20, 202012 minHow to Improve your Email SecurityEmail is a popular messaging method used by many, particularly in organisations. However, dangerously it is also an effective entry for...