Close this search box.

We are creating some awesome events for you. Kindly bear with us.

Singapore Promoting Safe Digital Transactions and Practices

Getting your Trinity Audio player ready...

Law enforcement agencies and cybersecurity authorities have noted a recent surge in cybercriminals exploiting compromised online payment accounts for illicit transactions. Over a period spanning from 01 January to 09 Februarythis year, authorities received reports of 27 such cases.

Victims typically receive automated notifications, purportedly from the payment platform, alerting them to various account activities such as profile alterations and transaction receipts. Upon investigation, victims often find unauthorised funds deposited into their accounts or transfers made to unfamiliar bank accounts added by cyber criminals. Subsequently, the perpetrators initiate chargeback requests, resulting in victims’ accounts being depleted.

Credential compromises stem from multiple factors, including weak passwords, interaction with phishing websites, downloading of unverified applications from unsolicited sources, and exposure to malware-infected websites or files.

To mitigate such risks, users are strongly advised to enhance the security of their online payment accounts by enabling features such as passkeys and two-step verification (2FA). Additionally, regular review of transaction activity for anomalies and installation of reputable antivirus software on devices are recommended. Implementing robust password practices, including the use of unique and complex passwords for each account, is also crucial.

Users should exercise vigilance against suspicious requests for personal or financial information, refrain from clicking on dubious links or downloading unfamiliar attachments, and promptly report any fraudulent activity to the relevant authorities or financial institutions.

For assistance or reporting of cybercrimes, individuals can reach out to the Police Hotline at 1800-255-0000 or visit Further information on scam prevention can be accessed via or by calling the Anti-Scam Helpline at 1800-722-6688. Effective collaboration and community vigilance are paramount in combating cyber threats and safeguarding online security.

Another tech solution provider has recently issued urgent security updates to address critical vulnerabilities found in their Access Rights Manager (ARM) product. These vulnerabilities, if exploited, could potentially enable attackers to execute remote code. It’s crucial for users and administrators utilising the ARM versions 2023.2 and earlier to promptly update to the latest version to mitigate these vulnerabilities.

In today’s digitally interconnected world, safeguarding personal data is more crucial than ever, as highlighted by Data Privacy Day on January 28. However, the ongoing dedication to fostering cybersecurity habits remains imperative throughout the year.

In the realm of cybersecurity, it’s vital to adopt a proactive stance to protect personal data from potential threats. There are common actions that may compromise data privacy, along with simple steps and strategies to mitigate them.

One crucial aspect is exercising caution when accepting cookies, particularly from unsecured sites. It’s essential to regularly review and adjust cookie settings to enhance data protection. Additionally, verifying website security is vital; always check for the lock icon and “https” in the URL. Beware of misspelt site names, as they may signal fraudulent sites aiming to compromise your data.

Promptly addressing password compromises is another key practice in maintaining data security. Upon receiving notifications from password managers about compromised credentials, it’s crucial to investigate and change passwords promptly. Leveraging password manager features for generating and managing complex, unique passwords adds an extra layer of security.

Moreover, exercising discretion in online sharing is essential to prevent exploitation by malicious actors. Reviewing and sanitising online posts can help avoid disclosing sensitive data that could be exploited for scams or cyberattacks.

Monitoring app permissions is crucial for minimising data exposure. Evaluate and restrict app permissions to essential functions, regularly reviewing and disabling unnecessary permissions, and uninstalling unused apps.

Singapore remains committed to leveraging cutting-edge technology to enhance citizen services while prioritising privacy and security. To combat the challenges posed by harmful online content, the Ministry of Communications and Information (MCI) has launched the Online Trust and Safety (OTS) Research Programme.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


CTC Global Singapore, a premier end-to-end IT solutions provider, is a fully owned subsidiary of ITOCHU Techno-Solutions Corporation (CTC) and ITOCHU Corporation.

Since 1972, CTC has established itself as one of the country’s top IT solutions providers. With 50 years of experience, headed by an experienced management team and staffed by over 200 qualified IT professionals, we support organizations with integrated IT solutions expertise in Autonomous IT, Cyber Security, Digital Transformation, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Well-known for our strengths in system integration and consultation, CTC Global proves to be the preferred IT outsourcing destination for organizations all over Singapore today.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.