Physical or Cloud Firewall?
I get asked this million-dollar question a lot: Physical or Cloud Firewall? Well, I must say that that’s a great question, and... Read More
The 12 Days of Cybersecurity
I am sure all of you know of the famous Christmas caroling song “The 12 Days of Christmas” – you know, the... Read More
The Puppet and its Puppeteer: “Helpful” Smart Devices turn Sinister
In the world of technology, digitalization is becoming more prominent. It is thus very common to see smart devices installed in people’s... Read More
Your Smart Speaker could become an Acoustic Weapon
Look around your home – how many smart speakers do you have scattered around? For many of us, smart speakers have become... Read More
Recipe to Becoming the Boss of Your Passwords
Do you own your Passwords, or do your Passwords OWN YOU? Let me put this out there – there are 2 kinds... Read More
Mirror Mirror on the Wall, who is the Least Protected of them All?
There was a time where blackberry and apple were just fruits in a supermarket. It’s true. The Internet has blurred the lines... Read More
The Relentless Chore of Testing your Backup
I am relentless. I’m always pounding people to back up. And I will continue to do so! Because, if you care about... Read More
All about the Vulnerability Scan
Vulnerabilities are a part of life. You have them, I have them, his dog has them, her cat has them. Basically, everyone... Read More
Pen Test: The Why, The When and The How
Imagine it is midnight, and you already got under the covers and switched off the lights, when suddenly, you thought to yourself... Read More
Do I really need an Antivirus?
It was November 2, 1988. The time was approximately 8 p.m. No one predicted that within hours, around 10% of all machines... Read More
13 Ransomware Statistics all Businesses MUST Know
What is Ransomware? Let’s get this straight. Ransomware is NOT Malware, and it is NOT Ransom. Instead, Ransomware is a type of... Read More
10 Cyber Security Tips for Frequent Travellers
If you travel for work, you are a target. Let me say that again. If you travel for business, YOU. ARE. A.... Read More
What to do if your company laptop gets stolen
Imagine this: You are in San Francisco for a work trip when you realized the conference you have to attend is a... Read More
What to do if your personal laptop gets stolen
In a country other than Singapore, the scenario would go something like this: Last Friday in Boston, I headed to a bar... Read More
If I have a Firewall, do I still need Endpoint Protection?
Network Security VS Endpoint Security Cyber attacks, such as the 2018 SingHealth cyber attack, affect 556 million victims per year. This amounts... Read More
3 Lessons to learn from the SingHealth Cyber-Attack in 2018
The hacking of SingHealth’s database on June 2018, labelled as Singapore’s worst Cyber-Attack, was brought back into the spotlight as the Committee... Read More
3 Simple Cybersecurity Tips for the Public Holidays
During the Public Holidays, businesses are particularly vulnerable to Cyber-Attacks. Here are some tips to help you enjoy the Public Holidays with... Read More
Managing Cyber Security – one “bite” at a time
The ransomware WannaCry has been creating a big buzz in the world of IT Security these past days. At the time of... Read More
Security Advisory: Ransomware Attack – WannaCry
On May 12, 2017 a new strain of the Ransom.CryptXXX (WannaCry) ransomware began an unprecedented attack on organisations worldwide. Affected organisations and... Read More
IT Security: Your best chance at the cyberwar
Cybercrime is not new. It has been around as early as the 70s and will continue to threaten the world. Experts predict that... Read More