Another Successful Deployment

BioXten Systems was engaged recently to provide

Matrix Networks Pte Ltd with a biometric solution to replace their card based access control system, which was failing and obsoleted.

Our consultant did some studies and recommended a solution from ZKTeco, which comprises both biometric fingerprint and card based authentication. As they are in the process of ISO certification which requires higher security, control and reports, our solution fits nicely into that requirements. Client was impressed by the proposed solution that included elevator control, we were engaged to deploy the solution.

Another satisfied customer using BioXten Systems solution.

If you have any needs for biometric (fingerprint, iris or facial) based access control solution, contact us using our contact page.

Launching of our new logo

New BioXten Logo

We are proud to announce the launch of the new logo as part of the ongoing evolution of our brand and services.

Our business has grown and evolved over the last 18 years, and now it is time for a change. We have altered our logo to reflect who we are today and to symbolize our dynamic future and professionalism.

Our new logo represents our continual commitments with dynamic colours displaying youthful energy with great ideas to solve our customers’ needs. With this change, we are looking forward to another 18 years to help solve your computing headaches.

Latest Ransomware Threats

Ransomware can be devastating to an individual or an organization, period. The Cybersecurity and Infrastructure Security Agency (CISA) has observed an increase in ransomware attacks across the world and most of these attacks caused the businesses or individual huge sums of monies to recover from their backups as services to their clients went down.

Some victims pay to recover their files. However, there is no guarantee that individuals will recover their files if they pay the ransom. CISA recommends the following precautions to protect users against the threat of ransomware:

  • Update software and operating systems with the latest patches. Outdated applications and operating systems are the target of most attacks.
  • Never click on links or open attachments in unsolicited emails.
  • Backup data on a regular basis. Keep it on a separate device and store it offline.
  • Follow safe practices when browsing the Internet. Read Good Security Habits for additional details.

In addition, CISA also recommends that organizations employ the following best practices:

  • Restrict users’ permissions to install and run software applications, and apply the principle of “least privilege” to all systems and services. Restricting these privileges may prevent malware from running or limit its capability to spread through a network.
  • Use application whitelisting to allow only approved programs to run on a network.
  • Enable strong spam filters to prevent phishing emails from reaching the end users and authenticate inbound email to prevent email spoofing.
  • Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.
  • Configure firewalls to block access to known malicious IP addresses.

Visit for more details on latest 10 Ransomware Attacks You Should Know About in 2019.

100% Web Isolation

Threat detection works? Nah! If it works you wouldn’t be reading headlines all over the world about companies been breached and black mailed for bitcoins. The fact is, detection can’t work 100% because the technology just cannot catch every single attack when hundreds of thousands are being launched every day.

Isolation is different. By isolating all web content in cloud-based, alwayson secure browsers, our partner solution, Menlo Security prevents attacks from ever reaching your user’s devices. That’s why customers report total elimination of malware infections, 95+% declines in credential loss, and similar reductions in corporate data leakage. All with no change to the user experience NOR sky high subscription costs (easily digestible by SMEs!).

Interested to find out more? Call us or leave your contact at our contact page and our professional consultant will call you back.

Recovery and Cloning

Successfully recovered SCO Unix HDD and cloned the recovered HDD for a maritime customer!

This customer came to us with a very old SCO Unix HDD that failed and it’s data are very important to them. They’ve went around trying to get the right recovery company to help them recover but hit a snag when quotations came back as well as some recovery companies rejected this job as they are not able to service it.

Another successful job done from our team of specialists!

More of our data recovery service detail here.

Wink Studio Pte Ltd

We are engaged to provide Wink Studio Pte Ltd, a curtains/blinds and wallpaper specialist, a turn-key solution for their web presence including social media built-up.

OneApp Promotion

For now until end Jan 2019, we offer our OneApp subscription at a discounted price of S$350.00 per month. Usual is at S$400.00 per month thus saving you a total of S$600.00 for 1 year subscription!

More details of OneApp can be found HERE.