loader image
How to Deal With Data Remanence

How to Deal With Data Remanence

Data remanence refers to the leftover data that persists even after deletion, posing a significant security risk. To effectively mitigate the threat of unauthorized data recovery, it’s crucial to address this issue properly. Among the methods to deal with data...
Ninoy Aquino Day

Ninoy Aquino Day

On Ninoy Aquino Day, we remember the life and sacrifice of a man who stood for democracy and freedom. His assassination on August 21, 1983, marked a turning point in Philippine history, inspiring a nation to fight for its rights. Let us honor his legacy and continue...
Common Bluethooth Attacks

Common Bluethooth Attacks

Bluetooth technology offers incredible convenience, allowing seamless connectivity between devices, but it also comes with certain risks. This convenience can expose your devices to various security threats. Here are some of the most common Bluetooth attacks. Stay...
Consent In CyberSecurity

Consent In CyberSecurity

CONSENT in CYBERSECURITY should be FREELY GIVEN, allowing you to choose what data you share. It should be REVERSIBLE, giving you the power to change your mind and retract permissions. It must be INFORMED, making sure you understand the risks and benefits. It should be...
New NPC Circular

New NPC Circular

The National Privacy Commission (NPC) has issued a crucial circular outlining the guidelines for CCTV systems, ensuring that their use aligns with the Data Privacy Act of 2012. This circular emphasizes the importance of protecting individuals’ privacy by setting...
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!