Report an Incident
Contact Us
Explore CSA
Explore CSA
Who We Are
Mission, Vision and Values
Our Identity
About SingCERT
Committees and Panels
What We Do
Careers
Working in CSA
How We Recruit
Job Opportunities
Cybersecurity Development Programme (CSDP)
Internships
Scholarships
Mission, Vision and Values
Our Identity
About SingCERT
Committees and Panels
Working in CSA
How We Recruit
Job Opportunities
Cybersecurity Development Programme (CSDP)
Internships
Scholarships
Information For
Information For
CII Sectors
Enterprises
Security & IT Professionals
General Public
Parents & Educators
Students
Seniors
Alerts & Advisories
Alerts & Advisories
Alerts
Advisories
Bulletins
Subscribe for Updates
News & Events
News & Events
Events
Upcoming Events
Past Events
Press Releases
Public Consultations
Speeches
News Articles
Upcoming Events
Past Events
Legislation
Legislation
Cybersecurity Act
Codes of Practice
Calculators
Cybersecurity Service Provider Licence Renewal
Cybersecurity Audit Report/ Risk Assessment Report Submission
Notification of Material Change(s)
Notification of Change in Ownership of Critical Information Infrastructure
Forms
Handbook
Notices
Consultations
Supplementary References
Whistleblowing
Cybersecurity Service Provider Licence Renewal
Cybersecurity Audit Report/ Risk Assessment Report Submission
Notification of Material Change(s)
Notification of Change in Ownership of Critical Information Infrastructure
Our Programmes
Our Programmes
Talent & Skills Development
Cybersecurity Career Mentoring Programme
SG Cyber Talent
Support for Enterprises
SG Cyber Safe Programme
PSG Cybersecurity Solutions
Innovation Schemes
CSA Cybersecurity Co-Innovation and Development Fund (CCDF)
CyberSG Talent, Innovation and Growth Collaboration Centre (TIG Centre)
Certification and Labelling Schemes
CSA Common Criteria
Cybersecurity Labelling Scheme (CLS)
Cybersecurity Labelling Scheme for Medical Devices - CLS(MD)
CLS-Ready
National IT Evaluation Scheme (NITES)
Cybersecurity Outreach
SG Cyber Safe Seniors
SG Cyber Safe Students
Cybersecurity Campaigns
Cybersecurity Career Mentoring Programme
SG Cyber Talent
SG Cyber Safe Programme
PSG Cybersecurity Solutions
CSA Cybersecurity Co-Innovation and Development Fund (CCDF)
CyberSG Talent, Innovation and Growth Collaboration Centre (TIG Centre)
CSA Common Criteria
Cybersecurity Labelling Scheme (CLS)
Cybersecurity Labelling Scheme for Medical Devices - CLS(MD)
CLS-Ready
National IT Evaluation Scheme (NITES)
SG Cyber Safe Seniors
SG Cyber Safe Students
Cybersecurity Campaigns
Tips & Resources
Tips & Resources
SingCERT
Cyber Aid
Incident Response Playbooks
Incident Response Checklist
Tech Support Scam
Report a Phishing Email
CSA as a CVE Numbering Authority
Useful Links
Internet Hygiene Portal
Internet Health Lookup Tool
Internet Hygiene Rating
Information Resources
Hall of Fame - Website
Hall of Fame - Email
Ransomware Portal
Interactive Tools
Calculators
Password Checker
View all >
Resources
GoSafeOnline
View all >
Publications
Forms and Documents
Videos
Infographics and Posters
Cyber Aid
Incident Response Playbooks
Incident Response Checklist
Tech Support Scam
Report a Phishing Email
CSA as a CVE Numbering Authority
Useful Links
Internet Health Lookup Tool
Internet Hygiene Rating
Information Resources
Hall of Fame - Website
Hall of Fame - Email
Calculators
Password Checker
View all >
GoSafeOnline
View all >
When autocomplete results are available use up and down arrows to review and enter to select.
Home
Tips & Resources
Resources
GoSafeOnline
GoSafeOnline
Filter By:
January
February
March
April
May
June
July
August
September
October
November
December
2023
2022
2021
2019
2018
2017
2015
2014
2013
2012
2011
Reset
The Risky Business of Outdated Technology
Spending money on IT solutions can be a costly outlay for small and medium enterprises (SMEs), ...
Implementing BYOD in the Workplace Securely
With more companies realising the benefits of allowing their employees to use their personal ...
Top Tips for Cybersecurity at Work
Companies are only as strong as their weakest link when it comes to cybersecurity.
Next Wave of Ransomware Attacks - Are You Prepared
It's not a matter of “if” but “when” it will happen again.
Distributed Denial of Service Attack
The number of distributed denial-of-service (DDoS) attacks is growing, and it is a key cause of ...
Watch Your Backyard - Data Exfiltration
Organisations these days have to be prepared for various types of cyber-attacks, from sophisticated ...
Cyber Tip - Spot Signs Of Phishing
Be vigilant and learn to spot signs of phishing
Better Cyber Safe Than Sorry
Check out our new “Better Cyber Safe than Sorry” awareness campaign
Cyber Tip - Use An Anti-Virus Software
Use anti-virus software to prevent malware infections
Cyber Tip - Update Your Software Promptly
Patch your software promptly
You’ve been hacked. What’s your response plan?
Is your organisation prepared for a cyber-security incident? Hacking and other forms of ...
OpenSSL Heartbleed Bug
OpenSSL is an open-sourced tool kit that implements the Secure Sockets Layer (SSL) and Transport ...
Dealing with a Cyber Security Incident
There is no silver bullet in cyber security. There is always a possibility for your devices, such as ...
Advanced Persistent Threats - Types of Associated Attacks
Advanced Persistent Threat – What is it?Advanced persistent threat (APT) usually refers to a ...
Denial of Service
Denial of Service (DoS) attack refers to the attempt to prevent the availability of ...
How to Securely Access Corporate Resources Remotely
The provision of remote access services to employees and business partners to access corporate ...
Metadata - Usage and Security Concerns
Metadata is data that describes another piece of data. Metadata can be found in almost every ...
Catch the "Phish"
“Congratulations!”Have you ever come across emails or social media posts with such ...
Guide to Securing Web Presence for Businesses
Preventive MeasuresOnce your organisation decides to have a web presence (such as having a website), ...
Destroying Sensitive Information How Enterprises Can Do It Safely and Securely
In the corporate world, infocomm technologies are widely used; files are stored, sent and retrieved ...
Back To Top