Latest Ransomware Threats

Ransomware can be devastating to an individual or an organization, period. The Cybersecurity and Infrastructure Security Agency (CISA) has observed an increase in ransomware attacks across the world and most of these attacks caused the businesses or individual huge sums of monies to recover from their backups as services to their clients went down.

Some victims pay to recover their files. However, there is no guarantee that individuals will recover their files if they pay the ransom. CISA recommends the following precautions to protect users against the threat of ransomware:

  • Update software and operating systems with the latest patches. Outdated applications and operating systems are the target of most attacks.
  • Never click on links or open attachments in unsolicited emails.
  • Backup data on a regular basis. Keep it on a separate device and store it offline.
  • Follow safe practices when browsing the Internet. Read Good Security Habits for additional details.

In addition, CISA also recommends that organizations employ the following best practices:

  • Restrict users’ permissions to install and run software applications, and apply the principle of “least privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through a network.
  • Use application whitelisting to allow only approved programs to run on a network.
  • Enable strong spam filters to prevent phishing emails from reaching the end users and authenticate inbound email to prevent email spoofing.
  • Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.
  • Configure firewalls to block access to known malicious IP addresses.

Visit for more details on latest 10 Ransomware Attacks You Should Know About in 2019.

100% Web Isolation

Threat detection works? Nah! If it works you wouldn’t be reading headlines all over the world about companies been breached and black mailed for bitcoins. The fact is, detection can’t work 100% because the technology just cannot catch every single attack when hundreds of thousands are being launched every day.

Isolation is different. By isolating all web content in cloud-based, alwayson secure browsers, our partner solution, Menlo Security prevents attacks from ever reaching your user’s devices. That’s why customers report total elimination of malware infections, 95+% declines in credential loss, and similar reductions in corporate data leakage. All with no change to the user experience NOR sky high subscription costs (easily digestible by SMEs!).

Interested to find out more? Call us or leave your contact at our contact page and our professional consultant will call you back.

Recovery and Cloning

Successfully recovered SCO Unix HDD and cloned the recovered HDD for a maritime customer!

This customer came to us with a very old SCO Unix HDD that failed and it’s data are very important to them. They’ve went around trying to get the right recovery company to help them recover but hit a snag when quotations came back as well as some recovery companies rejected this job as they are not able to service it.

Another successful job done from our team of specialists!

More of our data recovery service detail here.

OneApp Promotion

For now until end Jan 2019, we offer our OneApp subscription at a discounted price of S$350.00 per month. Usual is at S$400.00 per month thus saving you a total of S$600.00 for 1 year subscription!

More details of OneApp can be found HERE.