Blogs
Battling Social Engineering Tactics in Malaysia

Battling Social Engineering Tactics in Malaysia

In an increasingly interconnected world, the risks we face have gone beyond traditional forms of combat. Social engineering is one such hazard lurking in the shadows of our digital age. This article serves as an important reminder to recognise the sneaky nature of...

The Need for Threat Intelligence

The Need for Threat Intelligence

Introduction Threat intelligence is described at its core as the art and science of understanding, analyzing, and countering potential and present cyber threats. It entails the proactive collection and analysis of data and information pertaining to dangerous digital...

Tackling Cybersecurity in the New Hybrid Office

Tackling Cybersecurity in the New Hybrid Office

The traditional workplace environment has experienced major alteration in recent years, giving rise to what is now known as the "Hybrid Office Model." This creative approach to work marks a major shift in how organizations establish their operations and suit their...

Top 10 Creative Scams That Will Trick You

Top 10 Creative Scams That Will Trick You

Internet users surely do offer some kind of personal information whenever they create an account on the Internet (NortonOnline, 2022). Furthermore, information like date of birth, social security number, or security questions are things that the user has shared online...