Author:
Cheng Lai Ki

Cheng Lai Ki is a Cyber Operations Consultant in Horangi’s headquarters in Singapore. Equipped with advanced degrees in Criminology, Intelligence, and International Security, he brings with him over eight continuous years working and researching in the security field. He was a former military officer from the armed forces, where he was an instructor specializing in strategy and operational tactics. Professionally and academically published within the field of cyber security in Europe and Asia, Cheng Lai Ki brings a unique cross-industry and interdisciplinary perspective towards cyber security. He is actively involved in Horangi’s intelligence, security management and incident response operations with clients in the APAC region.
Work-From-Home Cybersecurity Explained: Best Practices for Secure Remote Work [Infographic]
How can hackers exploit work-from-home vulnerabilities? What impact do the new Work-From-Home arrangements have on vulnerability to cyber threats on an organizational and individual level? Learn how to protect yourself and your company's critical assets.

Everything You Need To Know About Web Server Pentesting
A pentest doesn’t just reveal your vulnerabilities, but also the competence of your security or development team. We discuss the various exploitable target areas in a server.

Adapt and Overcome: The Way of The Remote Workforce
How do you kickstart the cultivation of a remote workforce? What operational and security considerations should be taken into account? And how can a remote working culture be secured-by-design?

Would You Lie To Your Doctor? Healthcare Cybersecurity In A Pandemic
Over the past two decades alone, our planet has experienced different outbreaks and pandemics ranging from SARS, to Swine Flu, and now COVID-19. How should companies in the healthcare industry prepare for the future?

Work-From-Home: Key Security Considerations For Employees
Amid the ongoing coronavirus pandemic, we are seeing a global trend of employees being told to socially distance themselves and Work from Home (WFH).

What Is Cybersecurity?
How does cybersecurity play a part and how do organizations best leverage the available solutions today?

Addressing the skills gap in cybersecurity
With our growing dependence on technology, the cyber security sector is hard-pressed to be agile and adaptive to address increasingly sophisticated threats ranging from tech-savvy criminals to nation-state hackers.

4 Key Things Enterprises Need to Know About Cyber Espionage
The way organizations operate has been revolutionised by advances in technology. What are the implications that enterprises need to know about cyber espionage?

Cybersecurity and Gaming
As games become more advanced, they increasingly leverage on society’s expanding connection to the Internet-of-Things. Whilst a nonetheless a positive element, these developments don’t lessen the cybersecurity risks associated to gaming in general.

Monthly Cyber Security Review — November
November ended a relatively quiet month with a major security bug in macOS High Sierra. However, there has still been a series of developments and leaks that we at Horangi feel you should be aware of as the year of 2017 comes to a close. Date: November 28, 2017 Image Source: https://cdn.macrumors.com/article-new/2016/08/012-macos-sierra-970-80-800x449.jpg?retina MacOS High Sierra Credential Validation Logic Error (CVE-2017–13872)first

Why is cybersecurity important for SMEs?
The uncomfortable answer here is because SMEs are often easy targets for cyber criminals.
