Hero Image Hero Image

IT & Cybersecurity

Latest Posts

Search
Filter
Filter by
Found 14 results
The Dior Data Breach: A Trillion-Dollar Wake-Up Call for Global Cybersecurity

IT & Cybersecurity

The Dior Data Breach: A Trillion-Dollar Wake-Up Call for Global Cybersecurity

Data breaches are a trillion-dollar threat reshaping global cybersecurity. Our latest article examines Dior’s 7 May 2...

Next Level Phishing: Deepfake Scam

IT & Cybersecurity

Next Level Phishing: Deepfake Scam

In the first half of 2024, the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) handled countless...

Requirements on Documentation Submission on GL20 Assessment

IT & Cybersecurity

Requirements on Documentation Submission on GL20 Assessment

The latest Insurance Authority’s Guideline on Cybersecurity outlines three key requirements for documentation subm...

AI: Model Personal Data Protection Framework

IT & Cybersecurity

AI: Model Personal Data Protection Framework

Did you know that over 70% of organisations have experienced a data breach involving AI technologies? With the evolution...

Hong Kong's New Critical Infrastructure Cybersecurity Law

IT & Cybersecurity

Hong Kong’s New Critical Infrastructure Cybersecurity Law

Hong Kong’s government has introduced the Protection of Critical Infrastructure (Computer System) Bill, a significant ...

Navigating the Cloud Security Landscape: Why CSA STAR is Essential for Trusted Cloud Transformation

IT & Cybersecurity

Navigating the Cloud Security Landscape: Why CSA STAR is Essential for Trusted Cloud Transformation

Cloud computing has become the backbone of modern business. Global businesses are confronted by pressing challenges arou...

The Importance of Data Privacy: Safeguarding Sensitive Information in the Digital Age

IT & Cybersecurity

The Importance of Data Privacy: Safeguarding Sensitive Information in the Digital Age

The digital age has ushered in an era of unprecedented data collection, storage, and processing, transforming how busine...

Prevent Financial and Reputational Loss with Effective Security Incident Management

IT & Cybersecurity

Prevent Financial and Reputational Loss with Effective Security Incident Management

The digital age has brought unprecedented convenience, but it has also given rise to a surge of new crimes. The anonymit...

Staying On Top For Potential Information Security Risk -  The Key Updates And Implications Of The Revised ISO27001

IT & Cybersecurity

Staying On Top For Potential Information Security Risk – The Key Updates And Implications Of The Revised ISO27001

In the past few years, the threat landscape had developed into a broader spectrum, reaching from classic attack patterns...

Protect Your Business From Cyber Threats – How Does  Penetration Testing Help?

IT & Cybersecurity

Protect Your Business From Cyber Threats – How Does Penetration Testing Help?

In recent years, data breaches have become more common and sophisticated, affecting organisations of all sizes and indus...