Don’t Get Hooked By Phishing

Don’t Get Hooked By Phishing

Phishing is a kind of social engineering attack. Often it is a low-tech attack as opposed to high-tech attacks like security system hacking or password hacking. These malicious attacks employ psychological tricks to lead users into divulging sensitive information or unknowingly providing security access. The most common form of social engineering is email phishing. Steps perpetrators use: 1. Casting a wide

Read More
Securing-PDFs-with-Digital-Signatures

Securing PDFs with Digital Signatures

Securing PDFs with Digital Signatures The Portable Document Format (PDF), an acronym that I dare say that everyone is familiar with, has become an integral part of everyday life for most employees and employers alike. Used and preferred as it operates across multiple Operating Systems (OS) e.g. Windows & Mac. , it is the de-facto standard for electronic documents ranging from

Read More
See More, Respond Faster with Trend Micro Vision One™

See More, Respond Faster with Trend Micro Vision One™

See More, Respond Faster with Trend Micro Vision One™ With the recent increase in cyberattacks due to the Russia-Ukraine conflict, it is more critical than ever to be aware of your organization’s security posture. The threat landscape is constantly changing, and as malicious actors are always using new tools and tricks, it becomes imperative for organizations to have visibility in their

Read More
Recognition of Electronic Signatures Around the World

Recognition of Electronic Signatures Around the World

Understanding the validity of electronic signatures around the world In today’s globalised world, most organisations have a presence or at least have business dealings with an organisation in another country. Together with the COVID-19 pandemic accelerating digitalization and the adoption of electronic signatures, many are asking the question if electronic signatures are accepted as legally binding in countries around the world.

Read More
Digital Signature

Why the Need to Sign with a Digital Signature?

Why the Need to Sign with a Digital Signature? Electronic signing allows you to perform all signing operations remotely and from almost any device. All you need is an Internet connection. Plus, an electronic signature is just as legally binding as a handwritten one in ink on paper. Businesses are also switching to e-signature software solutions to reduce paper usage, cut

Read More
Team Photo

My Journey as a Professional Services Consultant in Netrust

My Journey as a Professional Services Consultant in Netrust Every graduate’s biggest dilemma is finding the right job. How do we actually define the “right” job? The highest paying job? A job in a well-known company? The one that offers the best working hours? The job that allows me to pick up the most relevant skills? Like every typical graduate, these

Read More
Transaction Signing

Transaction Signing for All

A Must Have “Transaction Signing” for All Recently in Singapore, a major bank was facing losses up to S$13.7 million dollars in a month during December 2021 alone. All this was due to phishing. The main culprit was due to victims who fell prey and provided their online banking log in credentials and one time pins to phishing websites thus multi-factor

Read More

Netrust Customer Support During The Pandemic

Netrust Customer Support During The Pandemic Being a Certification Authority of Singapore, we were part of essential services that needed to be operational during the pandemic. Netrust customer support team was available for customers who needed the digital services more than ever. Given the situation, the customers were apprehensive about the need for travel and exposure to the virus. However, Netrust

Read More

DevSecOps with Checkmarx

DevSecOps with Checkmarx Have you ever encountered a situation whereby you are not able to deploy an application due to vulnerabilities in the codes? Remediation measures are generally time consuming and expensive when vulnerabilities are discovered in the later stages of the development cycle. Worst still, having a vulnerable code pushed to production could lead to exploitation causing downtime or data

Read More