top of page
![](https://static.wixstatic.com/media/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.webp)
![General Data Protection Law (Lei Geral de Proteção de Dados - LGPD) from Brazil](https://static.wixstatic.com/media/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_27a5d9fdd5354caf93814fea0c5cd57d~mv2.webp)
Christy Chung
Feb 12, 2023
General Data Protection Law (Lei Geral de Proteção de Dados - LGPD) from Brazil
The General Data Protection Law (Lei Geral de Proteção de Dados, or LGPD) in Brazil establishes the rules for the protection of personal...
![](https://static.wixstatic.com/media/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.webp)
![Information Technology Rules from India](https://static.wixstatic.com/media/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_46746ef23c7047a28f831b9ebb298296~mv2.webp)
Christy Chung
Feb 12, 2023
Information Technology Rules from India
Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 The...
![](https://static.wixstatic.com/media/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.webp)
![The Privacy Act 1993 from New Zealand](https://static.wixstatic.com/media/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_c84e53c20ac24a849077d45f156f4b3e~mv2.webp)
Christy Chung
Feb 12, 2023
The Privacy Act 1993 from New Zealand
The Privacy Act 1993 sets out the framework for the protection of personal information in New Zealand The provisions related to security...
![](https://static.wixstatic.com/media/080b1a_36e5236cf5384f24989a114d16c13450~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_36e5236cf5384f24989a114d16c13450~mv2.webp)
![Personal Information Protection Act (PIPA) from South Korea](https://static.wixstatic.com/media/080b1a_36e5236cf5384f24989a114d16c13450~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_36e5236cf5384f24989a114d16c13450~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection Act (PIPA) from South Korea
The provisions related to security log monitoring in South Korea's Personal Information Protection Act (PIPA) can be found in several...
![](https://static.wixstatic.com/media/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.webp)
![Personal Information Protection Act (PIPA) from Japan](https://static.wixstatic.com/media/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_fdc31b51b0784877b973dcfb8e707d87~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection Act (PIPA) from Japan
The provisions related to security log monitoring in Japan's Personal Information Protection Act can be found in several sections of the...
![](https://static.wixstatic.com/media/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.webp)
![Personal Data Protection Act (PDPA) from Singapore](https://static.wixstatic.com/media/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3a9a92050970467783db539c80ba0cd1~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Data Protection Act (PDPA) from Singapore
The Personal Data Protection Act (PDPA) in Singapore requires organizations to implement appropriate security measures to protect...
![](https://static.wixstatic.com/media/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.webp)
![Personal Information Protection and Electronic Documents Act (PIPEDA) from Canada](https://static.wixstatic.com/media/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3c83fdccb6124d9392ebf50bf3f57628~mv2.webp)
Christy Chung
Feb 12, 2023
Personal Information Protection and Electronic Documents Act (PIPEDA) from Canada
The PIPEDA is a federal privacy law that sets out standards for the collection, use, and disclosure of personal information by...
![](https://static.wixstatic.com/media/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.webp)
![Privacy Act 1988 from Australia](https://static.wixstatic.com/media/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_f5e655e2086b41d6b7c8afdace812b99~mv2.webp)
Christy Chung
Feb 12, 2023
Privacy Act 1988 from Australia
Security log monitoring in Australia's Privacy Act 1988 can be found in several sections of the act, including: * Section 11A,...
![](https://static.wixstatic.com/media/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.webp)
![General Data Protection Regulations from the European Union (EU)](https://static.wixstatic.com/media/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_60f3cf2824ce471b98545272d036ea7a~mv2.webp)
Christy Chung
Feb 12, 2023
General Data Protection Regulations from the European Union (EU)
The General Data Protection Regulation (GDPR) is a regulation on personal information published by the European Union (EU) in 2016. The...
![](https://static.wixstatic.com/media/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.webp)
![Federal Information Security Modernization Act of 2014 (FISMA) from the US](https://static.wixstatic.com/media/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/080b1a_3e6f1802410b4a3d8e4cb436fb548852~mv2.webp)
Christy Chung
Feb 12, 2023
Federal Information Security Modernization Act of 2014 (FISMA) from the US
United States: Federal Information Security Modernization Act of 2014 (FISMA) The provisions related to security log monitoring in the...
![](https://static.wixstatic.com/media/7c5c62_47452d4e46324edcbb3df98138adeacc~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_47452d4e46324edcbb3df98138adeacc~mv2.webp)
![I don't want an AI defence system now, but I want to save my network log to build it later](https://static.wixstatic.com/media/7c5c62_47452d4e46324edcbb3df98138adeacc~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_47452d4e46324edcbb3df98138adeacc~mv2.webp)
-
Oct 11, 2022
I don't want an AI defence system now, but I want to save my network log to build it later
For most small to middle size company, cybersecurity is such a headache. There are so many things stopping you, budget, KPI, human...
![](https://static.wixstatic.com/media/7c5c62_bd0fc418545549a0b4d5721327dcb22f~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_bd0fc418545549a0b4d5721327dcb22f~mv2.webp)
![The impact of cybersecurity on the medical profession under Covid-19](https://static.wixstatic.com/media/7c5c62_bd0fc418545549a0b4d5721327dcb22f~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_bd0fc418545549a0b4d5721327dcb22f~mv2.webp)
-
Jan 11, 2022
The impact of cybersecurity on the medical profession under Covid-19
With the impact of Covid-19, the working patterns of the community have been changed, it was not only affecting citizens, but also the...
![](https://static.wixstatic.com/media/7c5c62_3615b549fe204211af3892f65fb5b8c1~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_3615b549fe204211af3892f65fb5b8c1~mv2.webp)
![What is RFID?](https://static.wixstatic.com/media/7c5c62_3615b549fe204211af3892f65fb5b8c1~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_3615b549fe204211af3892f65fb5b8c1~mv2.webp)
-
Dec 24, 2021
What is RFID?
In recent years, Hong Kong citizens have been required to replace their smart ID cards, the awareness of personal data protection,...
![](https://static.wixstatic.com/media/7c5c62_37c3023d7830471e8b22572ed0cdc6e4~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/7c5c62_37c3023d7830471e8b22572ed0cdc6e4~mv2.webp)
![Data sales: "I agree"](https://static.wixstatic.com/media/7c5c62_37c3023d7830471e8b22572ed0cdc6e4~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/7c5c62_37c3023d7830471e8b22572ed0cdc6e4~mv2.webp)
-
Dec 14, 2021
Data sales: "I agree"
In recent years, privacy has become an issue of concern. No matter you are using an app or applying for a store membership, there will be...
-
Aug 13, 2021
Leaking your Digital Possession in 1 Careless Click
Leaking your Digital Possession in 1 Careless Click IBanking and digital membership identities are on trend. Corporation launched a lot...
![](https://static.wixstatic.com/media/7c5c62_65b7c014bf654395bb0131ab9eafc19d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/7c5c62_65b7c014bf654395bb0131ab9eafc19d~mv2.webp)
![What is Cobit 5? Why is it important for companies?](https://static.wixstatic.com/media/7c5c62_65b7c014bf654395bb0131ab9eafc19d~mv2.jpg/v1/fill/w_300,h_184,fp_0.50_0.50,q_90,enc_auto/7c5c62_65b7c014bf654395bb0131ab9eafc19d~mv2.webp)
-
Jul 15, 2021
What is Cobit 5? Why is it important for companies?
What is Cobit 5? How do this framework works? Basically, this framework is business focused and it defines the processes of the IT...
![](https://static.wixstatic.com/media/7c5c62_576019ca3ff64ccb944db484ccb851f8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/7c5c62_576019ca3ff64ccb944db484ccb851f8~mv2.webp)
![Know more about APT! What is it use for?](https://static.wixstatic.com/media/7c5c62_576019ca3ff64ccb944db484ccb851f8~mv2.jpg/v1/fill/w_300,h_200,fp_0.50_0.50,q_90,enc_auto/7c5c62_576019ca3ff64ccb944db484ccb851f8~mv2.webp)
-
Jul 6, 2021
Know more about APT! What is it use for?
What is APT?APT(Advanced Package Tool), is a free-software user interface that works with core libraries to handle the installation and...
![](https://static.wixstatic.com/media/7c5c62_5188d33eb65645fe8376b22253d55ccd~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/7c5c62_5188d33eb65645fe8376b22253d55ccd~mv2.webp)
![Know more about SSL! 3 reasons explaining why do we need it](https://static.wixstatic.com/media/7c5c62_5188d33eb65645fe8376b22253d55ccd~mv2.jpg/v1/fill/w_225,h_300,fp_0.50_0.50,q_90,enc_auto/7c5c62_5188d33eb65645fe8376b22253d55ccd~mv2.webp)
-
Jun 30, 2021
Know more about SSL! 3 reasons explaining why do we need it
What is SSL?Secure Sockets Layer (SSL), is a cryptographic protocol designed to provide communications security over a computer network....
![](https://static.wixstatic.com/media/7c5c62_3178986421f04b2695b87e587457cf80~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/7c5c62_3178986421f04b2695b87e587457cf80~mv2.webp)
![Non-stop Cyber Crime: New Era of Cyber Threats](https://static.wixstatic.com/media/7c5c62_3178986421f04b2695b87e587457cf80~mv2.jpg/v1/fill/w_300,h_200,fp_0.50_0.50,q_90,enc_auto/7c5c62_3178986421f04b2695b87e587457cf80~mv2.webp)
-
Jun 28, 2021
Non-stop Cyber Crime: New Era of Cyber Threats
What is Cyber Crime? Cyber crime, or computer crime, is a crime that involves a computer and a network. The computer may have been used...
bottom of page