top of page
eVantage Technology - Latest Stories
Search

Therese Park
Apr 14, 20223 min read
How to prevent falling to WhatsApp Scams
Did you know that scammers have come up with a new way to cheat people on WhatsApp? So how do you prevent falling victim to it?

Therese Park
Apr 7, 20223 min read
The 4 Common Types of Scams in Singapore and how to recognise them
Here’s the sad truth – scams are on the rise. So what are some of the most common types of scams going around Singapore?

Therese Park
Mar 24, 20221 min read
6 Essential Cyber Security Tips to Stay Safe Online
What are some essential cyber security tips to stay safe online and strengthen your organisation’s cyber defence?

Therese Park
Mar 17, 20223 min read
How to Check your Devices for Stalkerware
53,870 mobile users were survivors of stalkerware in 2020. So what exactly is it, and how do you check your devices for stalkerware?

Therese Park
Mar 10, 20222 min read
How to Prevent your Phone from being Stalked
What is stalkerware (or spyware) and how can you prevent your phone from being stalked? ...

Therese Park
Mar 3, 20222 min read
How do you spot the red flags of Cyberstalking and what should you do if you fall victim to it
The number of cyberstalking cases increased from 12 cases in 2018, to 26 cases in 2021. So how do you spot the signs of cyberstalking?

Therese Park
Feb 17, 20223 min read
To Click or Not To Click: That is the Question
But remember, if you are even a little bit suspicious of a text message or email – do not click it. Let me repeat that. DO NOT CLICK IT...

Therese Park
Feb 10, 20222 min read
How to Avoid Online Romance Scams
People ages 40 to 69 reported losing the most money to romance scams! So how do you identify a scam and protect yourself online?

Therese Park
Jan 20, 20222 min read
How To Block Text Messages On Your iPhone
How do you block text messages on your iPhone? Well, read more here!...

Therese Park
Jan 13, 20222 min read
10 Common Cybersecurity Misconceptions for Small and Medium Businesses
It is important that small and medium businesses do not have misconceptions about cybersecurity, because the consequences can be dire...

Therese Park
Dec 16, 20213 min read
14 Business Travel Security Tips You Must Know Before Your Next Trip
While you are travelling, here are some simple practices you can adopt to help keep your devices safe and secure...

Therese Park
Dec 9, 20213 min read
7 Holiday Season Security Tips for Small Merchants
With online shopping growing, what steps can merchants take to protect their business and customer data from cyber criminals...

Therese Park
Dec 2, 20213 min read
8 Tips for a Safe Online Holiday Shopping
While doing your holiday shopping, what steps can consumers like you and me take to better secure our online accounts and transactions?...

Therese Park
Nov 25, 20213 min read
Cybersecurity and Disaster Recovery: Why You Need the Best of Both Worlds
With cyberattacks a constant threat and the ever-present danger of downtime and data loss, what can a business do to reduce its risks?..

Therese Park
Oct 28, 20215 min read
How To Set Up Two-Factor Authentication On All Your Online Accounts
Two-factor authentication (2FA) is a process that gives web services an extra layer of security. So how do you set it up?

Therese Park
Oct 21, 20213 min read
How to Create a Strong Password
Not everything in life should be simple. Just like your passwords. And when your passwords are the star of the show, complicated is good...

-
Jul 29, 20214 min read
How to prevent Online Impersonation
I have a curious question for y’all. Who is your role model? Who is that someone whom you want to be, or hope to one day grow to become?...

-
Jul 15, 20213 min read
The Jane Doe Case: Making Safe Payments Online
What do y’all think of the name Teddy for a dog? Ok, close your eyes and imagine a cute small white-ish mini labradoodle or poodle with a...

-
Jul 8, 20213 min read
The Jane Doe Case: When To Trust Others Online
Do you like dogs? I like dogs, especially those small mini ones. In fact, I have already decided that if I were to get a dog in the...

Therese Park
Jun 17, 20213 min read
Why your business needs VoIP in 2021
COVID-19 is a roller-coaster. Why do I say that? Well, just this time last year, Singapore was in its Circuit Breaker or “Lockdown”...

Therese Park
Jun 10, 20213 min read
Managed IT Services vs Traditional IT Support: What’s the Difference?
In this day and age, technology plays an integral role for businesses attempting to reach their goals. While the dependence on technology...

Therese Park
Mar 18, 20214 min read
What is a Man-in-the-middle Attack?
What is a Man-in-the-middle Attack (MitM)? A man-in-the-middle attack requires three players. There’s the victim, the party with which...

Therese Park
Mar 4, 20212 min read
How do Hackers commit Cyber Crime?
The key is this: if you want to stop a hacker, you got to think like a hacker! So what are some of the psychological techniques used by...

Therese Park
Feb 4, 20214 min read
How to Identify a Sophisticated Email Scam
Yes, yes, I know, you will probably tell me that you can easily spot an email threat. I don’t doubt you one bit! But with email attacks...
bottom of page