ALERT: Stay vigilant and exercise caution against online scams. Never share confidential information, passwords, OTPs and bank details over calls, emails or SMSes.

Cybersecurity

Most cyberattacks begin with a phishing email

Most cyberattacks begin with a phishing email “it’s not if, but when” that organisations will be impacted by a cyberattack has been promoted by cybersecurity practitioners for many years. ‘If, not when’ is undoubtedly true for most organisations today, with attackers developing and deploying ever-more-advanced and sophisticated techniques, and organisations battling to address cybersecurity concerns, …

Most cyberattacks begin with a phishing email Read More »

5 Reasons Microsoft Teams Calling Will Replace Traditional Business Phone Systems

5 Reasons Microsoft Teams Calling Will Replace Traditional Business Phone Systems The telephone has served us well for nearly 150 years. The great strides in telephony innovation have seen us through industrialisation and globalisation. For enterprises, we are now at a point in technology adoption where we may be close to the next phase in …

5 Reasons Microsoft Teams Calling Will Replace Traditional Business Phone Systems Read More »

5 Ransomware Attacks that Shocked the World

5 Ransomware Attacks that Shocked the World The coronavirus has really done a number on information security infrastructure. As if a public health crisis weren’t enough, threat actors have been taking advantage of sharp changes in IT behaviour and business imperatives to sneak into unsuspecting networks. Ransomware criminals have been around for decades, but the …

5 Ransomware Attacks that Shocked the World Read More »

Securing Your Network with a Dispersed Workforce

Securing Your Network with a Dispersed Workforce In a report published in 2019, the Cyber Security Agency (CSA) highlighted 5 major security threats that predominated Singapore’s cyber landscape. Malware, short for malicious software, comprised one of these threats. To combat them, business owners typically secure their business with single- or multi-layer security appliances. However, as businesses have …

Securing Your Network with a Dispersed Workforce Read More »