top of page
eVantage Technology - Latest Stories
Search

Therese Park
Oct 28, 20215 min read
How To Set Up Two-Factor Authentication On All Your Online Accounts
Two-factor authentication (2FA) is a process that gives web services an extra layer of security. So how do you set it up?

-
Jul 29, 20214 min read
How to prevent Online Impersonation
I have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...

-
Jul 22, 20213 min read
Your 2021 Cybersecurity Habits
Another year of COVID-19, but still the same cybersecurity hacks. In fact, cybercrime is continuing on a rampant incline and shows no...

-
Jul 15, 20213 min read
The Jane Doe Case: Making Safe Payments Online
What do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...

-
Jul 8, 20213 min read
The Jane Doe Case: When To Trust Others Online
Do you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...

Therese Park
Mar 18, 20214 min read
What is a Man-in-the-middle Attack?
What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...

Therese Park
Mar 4, 20212 min read
How do Hackers commit Cyber Crime?
The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...


Therese Park
Oct 1, 20204 min read
The Importance of Investing in Cybersecurity Right Now
Let me ask you this, doesn’t it seem like new major cybersecurity breaches are happening almost every day? Of course, the bigger the...


Therese Park
Aug 27, 20207 min read
11 Cybersecurity Myths you need to Stop Believing to Protect your Business
Cybersecurity preparedness is one of the major obstacles businesses are facing today. Yet, despite the increased focus on making...

Therese Park
Aug 20, 202012 min read
How to Improve your Email Security
Email is a popular messaging method used by many, particularly in organisations. However, dangerously it is also an effective entry for...

Therese Park
Jul 30, 202010 min read
12 Common Scams in Singapore
Tell me if this is not true. You probably have read many stories about people being scammed in Singapore. But here’s the thing. You...


Therese Park
Jul 23, 20204 min read
How to Spot Signs of Phishing
This article was taken from the Cyber Security Agency of Singapore (CSA). When you learn to spot the signs of phishing, you can better...


Therese Park
Jul 16, 20209 min read
How to Work-From-Home Securely
COVID-19 has indeed turned what used to be our “normal”, one eighty! And in response to this pandemic, everyone had been suddenly and...

Therese Park
May 14, 20204 min read
3 Tips to Protect your Passwords
Each year on the first Thursday in May, World Password Day promotes better password habits. And last Thursday, 7 May 2020, was no...

Therese Park
Aug 15, 20196 min read
All about the Vulnerability Scan
Vulnerabilities are a part of life. You have them, I have them, his dog has them, her cat has them. Basically, everyone has them. Even...


-
Mar 14, 20192 min read
3 Lessons to learn from the SingHealth Cyber-Attack in 2018
The hacking of SingHealth’s database on June 2018, labelled as Singapore’s worst Cyber-Attack, was brought back into the spotlight as the...


-
Mar 7, 20192 min read
3 Simple Cybersecurity Tips for the Public Holidays
During the Public Holidays, businesses are particularly vulnerable to Cyber-Attacks. Here are some tips to help you enjoy the Public...


-
Feb 4, 20173 min read
IT Security: Your best chance at the cyberwar
Cybercrime is not new. It has been around as early as the 70s and will continue to threaten the world. Experts predict that by 2021,...
bottom of page