Do companies need to have full control over your devices to secure it?
Companies take extreme measures to protect their confidential data. And when they have a Bring Your... Read Blog »
Teng Yew Ang
September 06, 2022
September 06, 2022
Cyber Insurance 101: Cyber Insurance and Risk Management for Beginners
Cyber threats are everywhere! And they are attacking small and medium-sized businesses like never... Read Blog »
Teng Yew Ang
August 31, 2022
August 31, 2022
Firewall 101: What firewalls can and cannot do
Nothing gets through a firewall! – Says no IT geek ever. Read Blog »
Teng Yew Ang
August 16, 2022
August 16, 2022
Essential 8 Cyber Security: The Strategy You Should Implement
You may not have come across the Essential 8 cyber security framework before, however, if you're an... Read Blog »
Teng Yew Ang
June 16, 2022
June 16, 2022
Microsoft Office Zero-Day “Follina" – What is it and how can you prevent it?
There’s a new zero-day vulnerability in Microsoft Office discovered last May 27 by nao_sec, a cyber... Read Blog »
Teng Yew Ang
June 03, 2022
June 03, 2022
7 Steps to recover from a ransomware attack
Ransomware is a type of cyberattack often used against companies of all sizes. Once the malware... Read Blog »
Igor Pavic
May 24, 2022
May 24, 2022