European Cyber Security Month

October 4, 2019

A device’s default password is incredibly easy to bypass. It’s basically an open door to your device and all your activity and data. Creating your own personal password is easy and gives you control over what information comes in and goes out.

Spotlight

GovTech Singapore

The Government Technology Agency of Singapore (GovTech) aims to transform the delivery of Government digital services by taking an "outside-in" view, putting citizens and businesses at the heart of everything we do. We also develop the Smart Nation infrastructure and applications and facilitate collaboration with citizens and businesses to co-develop technologies.

Other Infographics
news image

Cybersecurity Best Practices Every Enterprise Should Follow in 2020

Infographic | February 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help.

Read More
news image

Alarming Cyber Security Stats to Know for 2022 & Beyond

Infographic | June 7, 2022

The best way to achieve security is to implement proper controls in place, train well on cyber-security, and follow the recommended best practices.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

Cybersecurity Statistics for 2022

Infographic | June 10, 2022

If you work in the private sector (and provided you don’t live under a rock) you probably already know that cybercrime is a serious problem. A dastardly cybercriminal can expose finances, compromise customer information, and bring businesses to a halt. Skilled hackers are always finding creative ways to execute data breaches, setting a constant arms race into motion — cybersecurity professionals against cybercriminals.

Read More
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More

Spotlight

GovTech Singapore

The Government Technology Agency of Singapore (GovTech) aims to transform the delivery of Government digital services by taking an "outside-in" view, putting citizens and businesses at the heart of everything we do. We also develop the Smart Nation infrastructure and applications and facilitate collaboration with citizens and businesses to co-develop technologies.

Events