<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.brocent.com.sg/blogs/selections/feed" rel="self" type="application/rss+xml"/><title>Managed IT Services Singapore - Blog , Selections</title><description>Managed IT Services Singapore - Blog , Selections</description><link>https://www.brocent.com.sg/blogs/selections</link><lastBuildDate>Fri, 12 Sep 2025 07:51:42 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[BOOKLET - CYBER SECURITY FOR BUSINESS OWNERS]]></title><link>https://www.brocent.com.sg/blogs/post/Booklet_CyberSecurity</link><description><![CDATA[<img align="left" hspace="5" src="https://www.brocent.com.sg/Post202301/TTT_Blog-Post-Social-Media-Image-What-Cybersecurit1674485051595.png"/>The CIS Controls™ is a set of security best practices that help businesses mitigate and protect themselves against the most common Cyber-Attacks and Threats out there. These were developed and are maintained by IT and Security Experts at the Center for Internet Security (CIS)]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_d3_CBs8OTYKSZVoLBev5xQ" data-element-type="section" class="zpsection "><style type="text/css"> [data-element-id="elm_d3_CBs8OTYKSZVoLBev5xQ"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hOZ-Rh-GTVqJ77OMU9ARgA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"> [data-element-id="elm_hOZ-Rh-GTVqJ77OMU9ARgA"].zprow{ border-radius:1px; } </style><div data-element-id="elm_5uo0yBBYQ1KYQw9ars_Mow" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_5uo0yBBYQ1KYQw9ars_Mow"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_ycTjVe2CSZmHmYSZCn8X0w" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_ycTjVe2CSZmHmYSZCn8X0w"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-left " data-editor="true"><div style="color:inherit;"><h2>CYBER SECURITY FOR BUSINESS OWNERS</h2></div></h2></div>
<div data-element-id="elm_J6ME6adjRWut0oxgOZB7ag" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_J6ME6adjRWut0oxgOZB7ag"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(0, 0, 0);">Cybercrime and Cyber-Attacks are becoming more prevalent with each passing day. Over half of small and medium businesses (SMB) have reported being the victims of cybercrimes. Every day, there are new headlines about data breaches, hackings, Cyber-Attacks, and various forms of crimes against businesses. In a survey, over two-thirds of the participating businesses had suffered at least one cyber attack, while one-third had experienced the same in the last 12-months.</span><br></p><p><span style="color:rgb(0, 0, 0);"><br></span></p><p><span style="color:rgb(0, 0, 0);">The CIS Controls™ is a set of security best practices that help businesses mitigate and protect themselves against the most common Cyber-Attacks and Threats out there. These were developed and are maintained by IT and Security Experts at the Center for Internet Security (CIS) and are recognized by Businesses and Governments globally.&nbsp;<br></span></p></div>
</div></div></div></div></div><div data-element-id="elm_yeRiksj1ZC9vDpHN5ZwT0A" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_yeRiksj1ZC9vDpHN5ZwT0A"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_aSY0UD70fkfJdlSLMye3UA" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_59ESdiyUcn7tXCLp281Oww" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_59ESdiyUcn7tXCLp281Oww"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_bBKriOZ8WFOsWfYJ1CoXBA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_bBKriOZ8WFOsWfYJ1CoXBA"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true">CONTENT OF BOOKLET</h2></div>
<div data-element-id="elm_prbxYCtGoiRknmLgqGXOog" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_prbxYCtGoiRknmLgqGXOog"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:rgb(0, 0, 0);">we can help you navigate the complicated world of IT &amp; Cybersecurity so you can better protect your Data and your Business.&nbsp;</span><br></p></div>
</div><div data-element-id="elm_DghWwAekU26rW3AMVjgqXA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_DghWwAekU26rW3AMVjgqXA"] .zpimage-container figure img { width: 1070px ; height: 350.31px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_DghWwAekU26rW3AMVjgqXA"] .zpimage-container figure img { width:723px ; height:236.70px ; } } @media (max-width: 767px) { [data-element-id="elm_DghWwAekU26rW3AMVjgqXA"] .zpimage-container figure img { width:415px ; height:135.87px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="" data-mobile-image-separate="" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://static.zohocdn.com/sites/stock-images/images/zpstock-image-53.jpg" width="415" height="135.87" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_qXrPgaXWHUcasDj5clgXOA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qXrPgaXWHUcasDj5clgXOA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><table border="0" cellpadding="0" cellspacing="0" width="703" style="text-align:center;"><colgroup><col width="117" style="width:88pt;"><col width="469" style="width:352pt;"><col width="117" style="width:88pt;"></colgroup><tbody><tr height="33"><td style="width:88pt;"><span style="font-size:20px;font-weight:700;">Index</span></td><td style="width:46.7572%;"><span style="font-size:20px;font-weight:700;">Content Section</span></td><td style="width:35.2989%;"><span style="font-size:20px;"><span style="font-weight:700;">Page</span></span><br></td></tr><tr height="119"><td style="width:88pt;"><span style="font-size:16px;">1</span></td><td style="text-align:left;width:46.7572%;">Cybersecurity Technology and Market Overview</td><td style="width:35.2989%;">Page 1 - 14</td></tr><tr><td style="width:88pt;">2</td><td style="text-align:left;width:46.7572%;">Cybersecurity Control Framework </td><td style="width:35.2989%;" class="zp-selected-cell">Page 15 - 19</td></tr><tr><td style="width:88pt;">3</td><td style="text-align:left;width:46.7572%;">Inventory and Control of Enterprise Asset </td><td style="width:35.2989%;">Page 20</td></tr><tr><td style="width:88pt;">4</td><td style="text-align:left;width:46.7572%;">Inventory and Control of Software Asset </td><td style="width:35.2989%;">Page 21</td></tr><tr><td style="width:88pt;">5</td><td style="text-align:left;width:46.7572%;">Data Protection </td><td style="width:35.2989%;">Page 22</td></tr><tr><td style="width:88pt;">6</td><td style="text-align:left;width:46.7572%;">Security Configuration Control of Enterprise Assets and Software </td><td style="width:35.2989%;"> Page 23</td></tr><tr><td style="width:88pt;">7</td><td style="text-align:left;width:46.7572%;">Accounts Management</td><td style="width:35.2989%;">Page 24</td></tr><tr><td style="width:88pt;">8</td><td style="text-align:left;width:46.7572%;"> Access Control Management</td><td style="width:35.2989%;">Page 25</td></tr><tr><td style="width:88pt;">9</td><td style="text-align:left;width:46.7572%;">Continuous Vulnerabilities Management </td><td style="width:35.2989%;">Page 26</td></tr><tr><td style="width:88pt;">10</td><td style="text-align:left;width:46.7572%;">Audit Log Management</td><td style="width:35.2989%;">Page 27</td></tr><tr><td style="width:88pt;">11</td><td style="text-align:left;width:46.7572%;">Email and Web Browser Protection</td><td style="width:35.2989%;">Page 28</td></tr><tr><td style="width:88pt;">12</td><td style="text-align:left;width:46.7572%;">Malware Defenses</td><td style="width:35.2989%;">Page 29</td></tr><tr><td style="width:88pt;">13</td><td style="text-align:left;width:46.7572%;">Data Recovery</td><td style="width:35.2989%;">Page 30</td></tr><tr><td style="width:88pt;">14</td><td style="text-align:left;width:46.7572%;">Network Infrastructure Management</td><td style="width:35.2989%;">Page 31</td></tr><tr><td style="width:88pt;">15</td><td style="text-align:left;width:46.7572%;">Network Monitoring and Defenses</td><td style="width:35.2989%;">Page 32</td></tr><tr><td style="width:88pt;">16</td><td style="text-align:left;width:46.7572%;">Security Awareness and Skills Training</td><td style="width:35.2989%;">Page 33</td></tr><tr><td style="width:88pt;">17</td><td style="text-align:left;width:46.7572%;">Service Provider Management</td><td style="width:35.2989%;">Page 34</td></tr><tr><td style="width:88pt;">18</td><td style="text-align:left;width:46.7572%;">Application Software Management</td><td style="width:35.2989%;">Page 35</td></tr><tr><td style="width:88pt;">19</td><td style="text-align:left;width:46.7572%;"> Incident Response Management</td><td style="width:35.2989%;">Page 36</td></tr><tr><td style="width:88pt;">20</td><td style="text-align:left;width:46.7572%;">Penetration Test</td><td style="width:35.2989%;">Page 37</td></tr></tbody></table></div></div>
</div><div data-element-id="elm_RoKIXjEXYnoz44GBQbzy0Q" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_RoKIXjEXYnoz44GBQbzy0Q"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><br></p><p><span style="color:rgb(0, 0, 0);"><br></span></p></div>
</div></div></div></div></div><div data-element-id="elm_IVM1baociLMfDF7YH4ldVg" data-element-type="section" class="zpsection zplight-section zplight-section-bg "><style type="text/css"> [data-element-id="elm_IVM1baociLMfDF7YH4ldVg"].zpsection{ border-radius:1px; } </style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kIybstq5JmVFlxGDziywTQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_nQ1-_UzLGuWpmAjLUVXC3w" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-4 zpcol-sm-12 zsflex-stretch-align zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_nQ1-_UzLGuWpmAjLUVXC3w"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_7EThrmaj6Fr5lcZ20Rx95w" data-element-type="box" class="zpelem-box zpelement zpbox-container zsinlineflex-vertical-center-box zsboxshadow-medium zspadding-space-allside-thin zpdefault-section zpdefault-section-bg "><style type="text/css"> [data-element-id="elm_7EThrmaj6Fr5lcZ20Rx95w"].zpelem-box{ background-color:#ffffff; background-image:unset; } </style><div data-element-id="elm_CXIGgnkzZnMaeDBBg0ydPQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_CXIGgnkzZnMaeDBBg0ydPQ"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-style-none zpheading-align-center " data-editor="true">Contact Us</h2></div>
<div data-element-id="elm_6lWsUK2lnQdhEJVCmT4kfg" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6lWsUK2lnQdhEJVCmT4kfg"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-justify " data-editor="true"><p><span style="color:rgb(0, 0, 0);">The <span style="font-weight:700;">booklet&nbsp; of Cyber Security Essentials</span> serves a guide of Enterprise Owner and security controller to understand and furthermore establish the IT Security Governance framework. Click the &quot;Download&quot; to get a copy of the document or view online version. Contact us for more Cyber Security Information</span></p></div>
</div><div data-element-id="elm_W61AyY5i9qoDgICVZ9nCIw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_W61AyY5i9qoDgICVZ9nCIw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-roundcorner " href="mailto:accounts@brocent.com?subject=Inquiry%20IT%20Sercurity%20Service&amp;body=Hi%2C%20%0AI'm%20very%20interesting%20in%20your%20IT%20service.%20%0ACan%20we%20setup%20a%20call%20to%20discuss%20our%20requirement%3F%20%0ARegards.%20%0A"><span class="zpbutton-content">Contact</span></a></div>
</div></div></div><div data-element-id="elm_FpPm6PiVFx5yxHfFG0QOEg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-8 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_SkivrXIH4KW4nYLS5HcAGA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_KptmOAYGTQatoJEfOHmYug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_YgNqOgQCHSAL1nVkmORItA" data-element-type="image" class="zpelement zpelem-image zsmargin-space-none "><style> @media (min-width: 992px) { [data-element-id="elm_YgNqOgQCHSAL1nVkmORItA"] .zpimage-container figure img { width: 364.65px !important ; height: 241px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_YgNqOgQCHSAL1nVkmORItA"] .zpimage-container figure img { width:364.65px ; height:241px ; } } @media (max-width: 767px) { [data-element-id="elm_YgNqOgQCHSAL1nVkmORItA"] .zpimage-container figure img { width:364.65px ; height:241px ; } } [data-element-id="elm_YgNqOgQCHSAL1nVkmORItA"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://static.zohocdn.com/sites/stock-images/images/zpstock-image-34.jpg" width="364.65" height="241" loading="lazy" size="custom"/></picture></span></figure></div>
</div><div data-element-id="elm_PnP6eTV3luXY76euE2s-UQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_PnP6eTV3luXY76euE2s-UQ"].zpelem-button{ border-radius:1px; margin-block-start:3px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-full-width " href="/newsletter/The-Cybersecurity-Essentials-Booklet-2.0.pdf" target="_blank"><span class="zpbutton-content">View Online Cyber Security Booklet</span></a></div>
</div></div><div data-element-id="elm_ucfUMS5_jtOhjo77UjF2Zg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_0dxZCpRHdw2RpWmIYycWYw" data-element-type="image" class="zpelement zpelem-image zsmargin-space-none "><style> @media (min-width: 992px) { [data-element-id="elm_0dxZCpRHdw2RpWmIYycWYw"] .zpimage-container figure img { width: 342px ; height: 238.60px ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_0dxZCpRHdw2RpWmIYycWYw"] .zpimage-container figure img { width:723px ; height:504.41px ; } } @media (max-width: 767px) { [data-element-id="elm_0dxZCpRHdw2RpWmIYycWYw"] .zpimage-container figure img { width:415px ; height:289.53px ; } } [data-element-id="elm_0dxZCpRHdw2RpWmIYycWYw"].zpelem-image { border-radius:1px; margin-block-start:-23px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/images/g7c5fc74663a3d98a91ba9f4cff2198308f0c118c44d2ed47420f2cf6d8179016762677b4bcc006b7f406694a72509c1def889fa29f5a60c8432498311aeff05c_1280.jpg" width="415" height="289.53" loading="lazy" size="fit"/></picture></span></figure></div>
</div><div data-element-id="elm_FoCFYBq0TFmpVTS3uePfDA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_FoCFYBq0TFmpVTS3uePfDA"].zpelem-button{ border-radius:1px; margin-block-start:3px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none zpbutton-full-width " href="/newsletter/The-Cybersecurity-Essentials-Booklet-2.0.pdf" download target="_blank"><span class="zpbutton-content">Download Security Essentials Booklet</span></a></div>
</div></div></div><div data-element-id="elm_ZLWiowvkQcdxx4EzdLnU-w" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Q4cHux-HhLXH057TRKWCaw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_RYRuU9GqOtSNl1H1OTLd9w" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_RYRuU9GqOtSNl1H1OTLd9w"] .zpimage-container figure img { width: 703px ; height: 268.31px ; } } [data-element-id="elm_RYRuU9GqOtSNl1H1OTLd9w"] .zpimage-container[class*='zpimage-overlay-effect-'] figure:hover figcaption , [data-element-id="elm_RYRuU9GqOtSNl1H1OTLd9w"] .zpimage-container[class*='zpimage-overlay-effect-'] figure figcaption { background:#013A51 ; } [data-element-id="elm_RYRuU9GqOtSNl1H1OTLd9w"].zpelem-image { border-radius:1px; margin-block-start:4px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="true" data-mobile-image-separate="true" class="zpimage-container zpimage-align-center zpimage-size-fit zpimage-overlay zpimage-overlay-effect-static-bottom "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><source class="mobile-image-source" media="(max-width: 767.8px)" srcset=""><source class="tablet-image-source" media="(max-width: 991.8px) and (min-width: 768px)" srcset=""><img class="zpimage zpimage-style-none zpimage-space-none " src="https://static.zohocdn.com/sites/stock-images/images/zpstock-image-35.jpg" width="415" height="158.39" loading="lazy" size="fit"/></picture></span><figcaption class="zpimage-caption zpimage-caption-align-center"><span class="zpimage-caption-content">Cybercrime is a significant threat to businesses. It can lead to disruption of operations, breach of business and customer data, unauthorized access to networks, and more</span></figcaption></figure></div>
</div></div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Sun, 23 Apr 2023 08:24:27 +0000</pubDate></item></channel></rss>