This post is also available in: Vietnamese

News & Events

The importance of patch management to avoid business vulnerabilities

The importance of patch management to avoid business vulnerabilities

The way to keep software vulnerabilities from becoming threats is to keep your systems up to date. Therein lies the importance of patch management. Vulnerabilities happen because software always contains errors and oversights, which threat actors exploit. Your best hope of staying ahead of vulnerabilities is to continually patch your systems and keep them current.

read more
ADVICE FOR IMPLEMENTING A DATA DESTRUCTION POLICY

ADVICE FOR IMPLEMENTING A DATA DESTRUCTION POLICY

The perception is that certain industries need a data destruction policy far more than others. Of course institutions like banks and hospitals need to enforce data destruction, as they handle vast amounts of confidential data. At first glance, a business like a restaurant does not even compare. However, as every business is examined, one constant becomes clear: data. All companies – regardless of size or industry – house data.

read more
Top seven reasons your API developer portal is failing

Top seven reasons your API developer portal is failing

API portals should be giving app developers the tools they need to find APIs and you the tools to manage the entire API lifecycle. They’re supposed to make your APIs easier to adopt. And they were supposed to be helping you get a return on your API investments.

read more
Your Security Awareness Program Can Do More Than You Think: Fulfilling the Promise of “Training for All”

Your Security Awareness Program Can Do More Than You Think: Fulfilling the Promise of “Training for All”

In the world of security awareness training, we like to think of ourselves as providing training for each employee in the building. There was a time when training non-cyber staff on cyber threats was a novel idea. But, as it became apparent that end users were increasingly becoming one of, if not the single largest, attack vector for cyber threat actors, the field of Security Awareness entered the mainstream.

read more
9 ways to speed up your Microsoft 365 migration

9 ways to speed up your Microsoft 365 migration

Microsoft 365 migrations can be complex. With so many vital business applications in use—like Teams, OneDrive, SharePoint and Outlook along with the sheer volume of data stored on each of these—there is a lot that can go wrong.

read more
New technology and the refurbished electronics market

New technology and the refurbished electronics market

While the tech world was looking forward to the upcoming release of the iPhone 15 in September, an exciting development is taking place in the market which could have a major impact on those consumers who are seeking almost-current smartphones at lower prices. The trend is the market opening up for recycling, remanufacturing and bringing back to the market used iPhone models 13 and 14.

read more
Phishing – It’s No Longer About Malware (or Even Email)

Phishing – It’s No Longer About Malware (or Even Email)

Phishing has been and continues to be one of the most common methods (TTPs) cyber attackers use because it is so effective. Phishing is a simple attack vector that enables cyber attackers to easily scale their attacks, customize for their intended targets, and bypass many security controls. Reports like the Verizon DBIR or the Microsoft Digital Defense continue to identify phishing as a top risk. While technologies like email filtering (example Proofpoint) and EDR (example Crowdstrike) make it much more difficult to succeed, cyber attackers have continued to adapt.

read more

About Us

From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.

Contact Us

Address

21 Bukit Batok Crescent,
#02-72 WCEGA Tower,
Singapore 658065

Phone

+65 6266 2877