KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
If you’re like me who grew up consuming spy movies, you would have already been familiar with the notion of geolocation trackers in all sorts of digital devices (which both heroes and villains can use to their advantage). On the flip side, you would also have gotten hold of some tips on limiting location data
Keeping up with the demands of a growing business in an increasingly digitalised world can be cumbersome for any organisation. This is especially true when it comes to system maintenance. Organisations that rely solely on their internal IT team for system management may find that their IT has become more reactive than proactive. Initially, the
A penetration test (which can also go by the terms ‘pen test’, ‘pentest’, or ethical hacking), is defined as an authorised simulated cyber attack on a computer system, which is done to evaluate the security of that system. A full risk assessment is completed when both vulnerabilities and strengths are identified. Sadly, some organisations treat
By definition, a data breach pertains to any unauthorised access, collection, use, disclosure, copying, modification, or disposal or personal data in an organisation’s possession or under its control. Data breaches must be taken seriously as it often leads to financial losses, not to mention a loss of consumer trust for the organisation. In Singapore, the