fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

Protecting Data Online in the New Normal

Protecting Data Online in the New Normal

Protecting data online could not be more overemphasized in the "new normal" we are in
Protecting data online could not be more overemphasized in the “new normal” we are in

The Covid-19 pandemic has undeniably taken a toll on everyone’s daily activities and long term plans. Through the implementation of periodic quarantines, economic damage among countries has been mitigated by reducing disease transmission. However, there had been a trade off.

Reports show that cyberattacks have risen 600% as a result of the pandemic! Therefore, protecting data online could not be more overemphasized in the “new normal” we are in. And although a large portion of this statistics is from data breaches among business organizations, private individuals should not be complacent.

Here are some simple ways on how to improve your data security:

Know your status

You can only take appropriate steps in improving your system if you know whether or not any of your data has been compromised. A simple method is by keying in your email or phone number on a data breach detector engine such as Have I Been Pwned?

This site will give you a diagnosis if your personal data has been subjected on past data breaches, mainly from apps, websites, or programs you sign in or access.

Take time to read privacy policies

Almost everyone would just scroll down through a lengthy privacy policy and hit “Accept” without particularly reading and understanding the stipulations therein. In fact, studies show that only 9% of users really takes time to read these.

Taking appropriate actions in protecting data online necessitates knowledge on how and why your data can be utilized. Verily, these information can be found on the privacy policies. Reading these statements should remind you that there may be several companies which are using your data in ways you might not willingly consent to.

Also Read: What is Social Engineering and How Does it Work?

Pay attention to passwords

Passwords are your frontliners in cybersecurity. If you are using the same version of the same password across your accounts, it is like having 1 soldier to guard your whole flank.

A study back in 2019 reveals that about 75% of users have the same password for every account. But nowadays, most of us can admit that this is not a great idea. However, this is not reflective of user behavior as another study found out that although 91% of users online know that reusing a password is a bad idea, 61% still do it anyway.

Consider investing in a password manager especially if you have multiple accounts, both personal and business. A password manager is a software that creates unique secure passwords for all your accounts and stores them in one place. This eliminates the need for you to track numerous complicated passwords.

New circumstances such as remote working could easily entail trade-offs with our privacy and data security
New circumstances such as remote working could easily entail trade-offs with our privacy and data security

Beware of phishing scams

Recent data shows that phishing scam is still the most rampant cybersecurity threat in the new normal. This has been tied up to the frequency of cyberattacks rising significantly, more than doubling from 2019 to 2021 with 214,324 reported attacks.

In simple definition, phishing scam is a method used by criminals to fraudulently obtain your private personal data and/or banking information. It involves the use of an email or a text message that is posed to come from a legitimate party such as bank, insurance, or phone company, with the goal of soliciting personal data and exploiting such.

As these scams continue to be more and more sophisticated and well-crafted, protecting data online has been quite a challenge. That’s why it can be prudent to always approach unsolicited messages with the right amount of skepticism.

Public Wi-Fi can be dangerous

While cafes can be a good place to do some remote work, it is advised that you avoid using their wi-fi, or any public wi-fi for that matter. This open-access makes it extremely easier for hackers to access your devices and exploit your personal data.

The best remedy is to create a hotspot with your phone by using your cellular data. If the Wi-fi of the establishment is password protected, you may also connect, but do so with caution.

If you really have to connect to a public Wi-Fi, refrain from logging onto any website or app that contains your sensitive information such as banking and medical records.

To add another layer of protection, consider using a VPN to further protect your privacy while online. A Virtual Private Network will create just that, a private work connection that masks your IP address and makes it untraceable.

These are just few ways on how you can buff your security online. New circumstances such as remote working could easily entail trade-offs with our privacy and data security. Only when you have sufficient awareness and information could you ensure the safety of your sensitive private data and afford a clear peace of mind.

Also Read: The Top 4W’s of Ethical Hacking

A DPO can help 

An outsourced Data Protection Officer (DPO) oversees data protection responsibilities and ensures that organizations comply with the Personal Data Protection Act (PDPA). Furthermore, every organization’s DPO should be able to curb any instances of data breaches as it is the officer responsible for maintaining the positive posture of an organization’s cybersecurity.

DPOs complement the efforts of organizations in making sure that the organisation’s email environment is safe from any threat actor who wants to infiltrate its servers and system in general. It also ensures that policies are set in place and employees are well aware of the danger that may arise in this new normal that everyone is still adjusting to. 

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us