Cyber crime affects millions of organisations and individuals throughout the world, but the accelerating digital transformation taking place in the Asia-Pacific region makes the area particularly susceptible. In fact, in 2017, about one-third of cyber attacks perpetuated globally targeted the …
Many organisations overlook physical security risks when dealing with network security. Networks primarily exist as a set of complex connections revolving around physical anchors such as hard drives and servers that hold sensitive data. These components are vulnerable to physical …
Threats in the digital world are continually evolving and becoming increasingly diverse. It doesn’t matter if you are working in the most mature enterprise environment, unemployed or retired, whether you have a smartphone in your hand or only use an e-reader, you are …
ISO/IEC 27001:2013 outlines the requirements for establishing, implementing, maintaining and continually improving an ISMS (information security management system). As cyber security threats continue to proliferate, it has become vital to implement a robust ISMS. This has resulted in the remarkable …
Cyberspace is expanding rapidly, and so are the risks associated with it. The more we hear about scams, hacks, malware and other threats, the more the Internet feels like a dangerous place – which, to some extent, it is. Cyber …
Last week, the CSA (Cybersecurity Agency of Singapore) presented its findings regarding July’s SingHealth data breach. The incident affected 1.5 million people – just under a third of the country’s population – with criminal hackers accessing patients’ names, dates of …
A KPMG study has found that 49% of CEOs believe a successful cyber attack against their organisation is inevitable. This shouldn’t come as a surprise: the volume of attacks has soared in the past few years and there are simply …
Information security is often perceived to be all about technology. Although technology is a key element in any organisation’s security measures, on its own it cannot protect you from modern cyber threats. Instead, it is one of the three pillars …
While technological advancements have enabled the expansion of businesses beyond conventional practices, it’s no secret that they have attracted the attention of cyber criminals more than ever. Consequently, cyber crimes are on the rise, and it is essential that organisations …
A data breach at Perth Mint initially thought to have affected 13 customers turns out to have been far more extensive. The government-owned bullion mint and precious metals trader confirmed that about 3,200 records were breached, with names, addresses, passport …