top of page
eVantage Technology - Latest Stories
Search
Therese Park
Sep 8, 20223 min read
Why Small to Medium-sized Businesses are a Hacker’s favourite playground
Here’s a common misconception – that data breaches only happen with large companies, when in fact, small companies are a hacker's playground
Therese Park
Aug 11, 20222 min read
11 Cyber Security Questions Every Small Business Should Ask Themselves
Here are some questions every small business owner must ask themselves to ensure that they are indeed prepared for a cyber-attack...
Therese Park
Jun 23, 20226 min read
10 Common IT Security Mistakes made by Small Businesses
Here's the issue with security breaches - complacency! Why is this so, and what are some of the common IT security mistakes made?
Therese Park
Jun 16, 20222 min read
How to mitigate a potential Ransomware attack
If you don’t pay a ransom, how do you recover? Well, here are some key measures you can take to prepare for and mitigate a potential attack
Therese Park
Apr 21, 20223 min read
How can SMS Eavesdropping affect your phone security?
Hackers are using mirroring apps to monitor your SMS activity. So how can SMS Eavesdropping affect your phone security?
Therese Park
Apr 7, 20223 min read
The 4 Common Types of Scams in Singapore and how to recognise them
Here’s the sad truth – scams are on the rise. So what are some of the most common types of scams going around Singapore?
Therese Park
Mar 24, 20221 min read
6 Essential Cyber Security Tips to Stay Safe Online
What are some essential cyber security tips to stay safe online and strengthen your organisation’s cyber defence?
Therese Park
Mar 17, 20223 min read
How to Check your Devices for Stalkerware
53,870 mobile users were survivors of stalkerware in 2020. So what exactly is it, and how do you check your devices for stalkerware?
Therese Park
Mar 3, 20222 min read
How do you spot the red flags of Cyberstalking and what should you do if you fall victim to it
The number of cyberstalking cases increased from 12 cases in 2018, to 26 cases in 2021. So how do you spot the signs of cyberstalking?
Therese Park
Feb 10, 20222 min read
How to Avoid Online Romance Scams
People ages 40 to 69 reported losing the most money to romance scams! So how do you identify a scam and protect yourself online?
Therese Park
Jan 13, 20222 min read
10 Common Cybersecurity Misconceptions for Small and Medium Businesses
It is important that small and medium businesses do not have misconceptions about cybersecurity, because the consequences can be dire...
Therese Park
Dec 16, 20213 min read
14 Business Travel Security Tips You Must Know Before Your Next Trip
While you are travelling, here are some simple practices you can adopt to help keep your devices safe and secure...
Therese Park
Oct 28, 20215 min read
How To Set Up Two-Factor Authentication On All Your Online Accounts
Two-factor authentication (2FA) is a process that gives web services an extra layer of security. So how do you set it up?
-
Jul 29, 20214 min read
How to prevent Online Impersonation
I have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...
-
Jul 22, 20213 min read
Your 2021 Cybersecurity Habits
Another year of COVID-19, but still the same cybersecurity hacks. In fact, cybercrime is continuing on a rampant incline and shows no...
-
Jul 15, 20213 min read
The Jane Doe Case: Making Safe Payments Online
What do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...
-
Jul 8, 20213 min read
The Jane Doe Case: When To Trust Others Online
Do you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...
Therese Park
Mar 18, 20214 min read
What is a Man-in-the-middle Attack?
What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...
Therese Park
Mar 4, 20212 min read
How do Hackers commit Cyber Crime?
The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...
Therese Park
Oct 1, 20204 min read
The Importance of Investing in Cybersecurity Right Now
Let me ask you this, doesn’t it seem like new major cybersecurity breaches are happening almost every day? Of course, the bigger the...
Therese Park
Aug 27, 20207 min read
11 Cybersecurity Myths you need to Stop Believing to Protect your Business
Cybersecurity preparedness is one of the major obstacles businesses are facing today. Yet, despite the increased focus on making...
Therese Park
Jul 30, 202010 min read
12 Common Scams in Singapore
Tell me if this is not true. You probably have read many stories about people being scammed in Singapore. But here’s the thing. You...
Therese Park
Jul 23, 20204 min read
How to Spot Signs of Phishing
This article was taken from the Cyber Security Agency of Singapore (CSA). When you learn to spot the signs of phishing, you can better...
Therese Park
Jul 16, 20209 min read
How to Work-From-Home Securely
COVID-19 has indeed turned what used to be our “normal”, one eighty! And in response to this pandemic, everyone had been suddenly and...
bottom of page