CYBER HYGIENE: Start securing your enterprise with the basics

The fact that our world is increasingly digitized and cybercriminals are becoming more agile and intelligent with time, deploying security software is a great strategy to do; however, cybersecurity does not just stop there… In our previous newsletter issue, we … Continue Reading

Complete Protection For Your Organization

In the past decades, the continuous progress of Information and communication technology brought us a revolution that changed not only our lives but also the way how people do business. … Continue Reading

Essential Cybersecurity Practices to secure your organization this 2019

It’s 2019!  After all the celebrations for the holiday season last year, we still need to get back to face the same reality that cyber attackers are just lurking around and does not waste any single time to break through … Continue ReadingContinue Reading

2018: A YEAR IN REVIEW …and what lies ahead in 2019

In 2018, we have witnessed the increasing amount of threats in the global industries. Unexpectedly, we still get surprised and blown up with the massive impact of cyberattacks.  … Continue Reading

SIEM: Complete your security defenses with visibility and control

Companies employ various security technologies and techniques to guard their networks but why do cyber-attackers seems to always wade its way off and still execute cyber-attacks? … Continue Reading

Cloud Access Security Brokers: Protection beyond firewall

Technology advancement brought by today’s era has revolutionized business operations across industries. But with rapid transformation in technology, comes greater risks on the enterprise security… Traditionally, firewalls placed to protect enterprise networks seem to effectively do its job in securing and … Continue Reading

Keeping your Sensitive Data Safe from Leaks

Employees are the pillar of your organization, but they’re also the biggest risk to the very data that makes your business thrive… Whether in the form of a malicious insider that attempts to take your confidential data for personal gain, … Continue Reading

Privileged Accounts: Pathway to cyber-attacks?

Seeing cyber-attack incidents in the daily news is no longer new to us now. From ransomware, to data breaches down to DDoS (Distributed Denial of Service) attacks, and other types of attacks hitting small and big enterprises alike– we’ve heard … Continue Reading

With today’s cyber-attacks getting rampant, is Preventive Protection enough?

It seems like every month there’s a report of another high-profile cyber-attack or security breach. And the most recent data breach which is being described as Singapore’s “worst” cyber-attack on record happened just this month! SingHealth—the largest public healthcare cluster … Continue Reading

Should you outsource your IT Security?

In the previous blogs, we have talked about how a successful deployment of security operations center in place can help you combat cyber-attacks effectively. Seems promising, isn’t it? But, are we implementing it? … Continue Reading