Report an Incident
Contact Us
Explore CSA
Explore CSA
Who We Are
What We Do
Careers
Mission, Vision and Values
Our Identity
About SingCERT
Committees and Panels
Working in CSA
How We Recruit
Job Opportunities
Cybersecurity Development Programme (CSDP)
Internships
Scholarships
Information For
Information For
CII Sectors
Enterprises
Security & IT Professionals
General Public
Parents & Educators
Students
Seniors
Alerts & Advisories
Alerts & Advisories
Alerts
Advisories
Bulletins
Subscribe for Updates
News & Events
News & Events
Events
Press Releases
Speeches
News Articles
Upcoming Events
Past Events
Legislation
Legislation
Cybersecurity Act
Codes of Practice
Calculators
Forms
Handbook
Notices
Industry Consultation
Supplementary References
Whistleblowing
Cybersecurity Service Provider Licence Renewal
Cybersecurity Audit Report/ Risk Assessment Report Submission
Notification of Material Change(s)
Notification of Change in Ownership of Critical Information Infrastructure
Our Programmes
Our Programmes
Talent & Skills Development
Support for Enterprises
Innovation Schemes
Certification and Labelling Schemes
Cybersecurity Campaigns and Outreach
Cybersecurity Career Mentoring Programme
SG Cyber Talent
SG Cyber Safe Programme
PSG Cybersecurity Solutions
CSA Cybersecurity Co-Innovation and Development Fund (CCDF)
ICE71
CSA Common Criteria
Cybersecurity Labelling Scheme (CLS)
Cybersecurity Labelling Scheme for Medical Devices - CLS(MD)
CLS-Ready
National IT Evaluation Scheme (NITES)
SG Cyber Safe Seniors
SG Cyber Safe Students
"The Unseen Enemy" Campaign
Tips & Resources
Tips & Resources
SingCERT
Internet Hygiene Portal
Ransomware Portal
Interactive Tools
Resources
Publications
Forms and Documents
Videos
Infographics and Posters
Calculators
IHP Internet Health Lookup Tool
Games
Password Checker
View all >
GoSafeOnline
View all >
When autocomplete results are available use up and down arrows to review and enter to select.
Home
Tips & Resources
Resources
GoSafeOnline
GoSafeOnline
Filter By:
January
February
March
April
May
June
July
August
September
October
November
December
2023
2022
2021
2019
2018
2017
2015
2014
2013
2012
2011
Reset
Information Handling - Data Leak Prevention in the Corporate World
Sensitive data such as emails, images, or other documents, are all subjected to potential theft or ...
The Risky Business of Outdated Technology
Spending money on IT solutions can be a costly outlay for small and medium enterprises (SMEs), ...
Implementing BYOD in the Workplace Securely
With more companies realising the benefits of allowing their employees to use their personal ...
Top Tips for Cybersecurity at Work
Companies are only as strong as their weakest link when it comes to cybersecurity.
Next Wave of Ransomware Attacks - Are You Prepared
It's not a matter of “if” but “when” it will happen again.
Distributed Denial of Service Attack
The number of distributed denial-of-service (DDoS) attacks is growing, and it is a key cause of ...
Watch Your Backyard - Data Exfiltration
Organisations these days have to be prepared for various types of cyber-attacks, from sophisticated ...
Cyber Tip - Spot Signs Of Phishing
Be vigilant and learn to spot signs of phishing
Better Cyber Safe Than Sorry
Check out our new “Better Cyber Safe than Sorry” awareness campaign
Cyber Tip - Use An Anti-Virus Software
Use anti-virus software to prevent malware infections
Cyber Tip - Update Your Software Promptly
Patch your software promptly
You’ve been hacked. What’s your response plan?
Is your organisation prepared for a cyber-security incident? Hacking and other forms of ...
OpenSSL Heartbleed Bug
OpenSSL is an open-sourced tool kit that implements the Secure Sockets Layer (SSL) and Transport ...
Dealing with a Cyber Security Incident
There is no silver bullet in cyber security. There is always a possibility for your devices, such as ...
Advanced Persistent Threats - Types of Associated Attacks
Advanced Persistent Threat – What is it?Advanced persistent threat (APT) usually refers to a ...
Denial of Service
Denial of Service (DoS) attack refers to the attempt to prevent the availability of ...
How to Securely Access Corporate Resources Remotely
The provision of remote access services to employees and business partners to access corporate ...
Metadata - Usage and Security Concerns
Metadata is data that describes another piece of data. Metadata can be found in almost every ...
Catch the "Phish"
“Congratulations!”Have you ever come across emails or social media posts with such ...
Guide to Securing Web Presence for Businesses
Preventive MeasuresOnce your organisation decides to have a web presence (such as having a website), ...
Back To Top