Blogs
Beware of new methods of phone chat application hacking

Beware of new methods of phone chat application hacking

The usage of mobile phones has become indispensable in today's world. The majority of the world's hackers now have their sights set on mobile phone users.On the 24th of March, 2022, it was reported that there is a growing number of perpetrators adopted a certain modus...

Ransomware Attacks in 2022: Malaysia’s Ultimate Guide

Ransomware Attacks in 2022: Malaysia’s Ultimate Guide

Table of Contents1. Ransomware Overview2. Ransomware cases in Malaysia20212020201920182017201620153. Ransomware Recovery4. Ransomware Prevention5. Ransomware Dilemma: To pay or not6. ConclusionReport to us Ultimate Guide to Ransomware Attacks This is the ultimate...

Condition Zebra achieves ISO 27001:2013 certificate

Condition Zebra achieves ISO 27001:2013 certificate

We are delighted to announce that we have achieved ISO 27001:2013 certificate.This recognition ensures that our services adhere to international standards that meet the best practice for an information security management system. Through this certification, Condition...

Cybersecurity: 5 Great Ideas for Small Businesses

Cybersecurity: 5 Great Ideas for Small Businesses

As companies, people, and equipment become more connected, vulnerabilities and threats that computer systems face rise. From phishing to more advanced attacks on connected devices, threats are becoming more sophisticated and increasing in numbers. FBI's Internet Crime...

Physical security in the realm of cybersecurity

Physical security in the realm of cybersecurity

This article discusses the importance of physical security in the realm of cybersecurity. Understanding Physical Security ThreatsMany organizations think after migrating their infrastructures which are commonly referred to as "the cloud", will reduce the reliance on a...