Therese ParkOct 13, 20223 min readThe Anatomy of a Data Breach: what are they and what do you do when you spot oneWhat is a data breach, what kind of data can be breached, what are some tactics cyber criminals use, and how do you spot one?...
Therese ParkJun 16, 20222 min readHow to mitigate a potential Ransomware attackIf you don’t pay a ransom, how do you recover? Well, here are some key measures you can take to prepare for and mitigate a potential attack
Therese ParkJan 13, 20222 min read10 Common Cybersecurity Misconceptions for Small and Medium BusinessesIt is important that small and medium businesses do not have misconceptions about cybersecurity, because the consequences can be dire...
Therese ParkApr 29, 20212 min readWhat your Business can do regarding E-Waste in SingaporeDid you know that Singapore generates about 60,000 tonnes of e-waste a year? That’s equivalent to discarding about 70 mobile phones per...
Therese ParkApr 1, 20212 min readHow to (Really) Erase a Hard Drive CompletelyThere are many reasons why organizations need to wipe hard drives. Whether you want to repurpose the drives, resell them or completely...
Therese ParkFeb 27, 20203 min readHow to Secure your Company’s Data“How do you secure your Company’s data?” is the key question that all businesses want to know. Whether is it from cyber attacks, data...
Therese ParkOct 10, 20197 min readMirror Mirror on the Wall, who is the Least Protected of them All?There was a time where blackberry and apple were just fruits in a supermarket. It’s true. The Internet has blurred the lines between the...