top of page
eVantage Technology - Latest Stories
Search

How do you spot the red flags of Cyberstalking and what should you do if you fall victim to it
The number of cyberstalking cases increased from 12 cases in 2018, to 26 cases in 2021. So how do you spot the signs of cyberstalking?
Therese Park
Mar 3, 20222 min read

9 Online Security Tips for Seniors
I don’t know about your mother, but my dear dear mother is very trusting of people online – especially Carousell buyers. Even if the...
Therese Park
Feb 24, 20223 min read

To Click or Not To Click: That is the Question
But remember, if you are even a little bit suspicious of a text message or email – do not click it. Let me repeat that. DO NOT CLICK IT...
Therese Park
Feb 17, 20223 min read

How to Avoid Online Romance Scams
People ages 40 to 69 reported losing the most money to romance scams! So how do you identify a scam and protect yourself online?
Therese Park
Feb 10, 20222 min read

10 Common Cybersecurity Misconceptions for Small and Medium Businesses
It is important that small and medium businesses do not have misconceptions about cybersecurity, because the consequences can be dire...
Therese Park
Jan 13, 20222 min read

14 Business Travel Security Tips You Must Know Before Your Next Trip
While you are travelling, here are some simple practices you can adopt to help keep your devices safe and secure...
Therese Park
Dec 16, 20213 min read

7 Holiday Season Security Tips for Small Merchants
With online shopping growing, what steps can merchants take to protect their business and customer data from cyber criminals...
Therese Park
Dec 9, 20213 min read

8 Tips for a Safe Online Holiday Shopping
While doing your holiday shopping, what steps can consumers like you and me take to better secure our online accounts and transactions?...
Therese Park
Dec 2, 20213 min read

Cybersecurity and Disaster Recovery: Why You Need the Best of Both Worlds
With cyberattacks a constant threat and the ever-present danger of downtime and data loss, what can a business do to reduce its risks?..
Therese Park
Nov 25, 20213 min read

How To Set Up Two-Factor Authentication On All Your Online Accounts
Two-factor authentication (2FA) is a process that gives web services an extra layer of security. So how do you set it up?
Therese Park
Oct 28, 20215 min read

How to Create a Strong Password
Not everything in life should be simple. Just like your passwords. And when your passwords are the star of the show, complicated is good...
Therese Park
Oct 21, 20213 min read

How to prevent Online Impersonation
I have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...
-
Jul 29, 20214 min read

Your 2021 Cybersecurity Habits
Another year of COVID-19, but still the same cybersecurity hacks. In fact, cybercrime is continuing on a rampant incline and shows no...
-
Jul 22, 20213 min read

The Jane Doe Case: Making Safe Payments Online
What do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...
-
Jul 15, 20213 min read

The Jane Doe Case: When To Trust Others Online
Do you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...
-
Jul 8, 20213 min read

What is a Man-in-the-middle Attack?
What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...
Therese Park
Mar 18, 20214 min read

The Key to Stopping Cyber Attacks
Let me tell you something. The thing that people most often misunderstand about cyber attacks is that they don’t happen at the speed of...
-
Mar 11, 20217 min read

How do Hackers commit Cyber Crime?
The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...
Therese Park
Mar 4, 20212 min read

How to Survive an Email Bomb Attack
It is a Monday morning. You have grabbed your morning coffee, sat at your desk, and switched on your work computer. You open your work...
-
Feb 18, 20216 min read

How to Identify a Sophisticated Email Scam
Yes, yes, I know, you will probably tell me that you can easily spot an email threat. I don’t doubt you one bit! But with email attacks...
Therese Park
Feb 4, 20214 min read

How to stay safe on Public WiFi
Getting Internet access in public areas has never been easier. No matter if you are a business traveler, a student, an employee, etc.,...
-
Nov 12, 20204 min read


How to Protect Yourself from a Data Breach?
You must have heard the recent news this past weekend – 1.1 million RedMart accounts were stolen from e-commerce platform Lazada and sold...
-
Nov 5, 20204 min read


How the Pandemic is Changing Businesses’ Cybersecurity Budgets
As companies sent millions of employees to work from home, and, more recently, kids went back to school remotely via video meetings with...
Therese Park
Oct 22, 20203 min read


How to Stay Cyber Safe During the COVID-19 Situation
This article was adapted from the Cyber Security Agency of Singapore (CSA). Despite offices opening up and more people being allowed to...
-
Oct 8, 20203 min read
bottom of page