What else we provide?
Do you want to ...
Know more about WCN?
Know what our latest updates?
In the early 2000s, the acquisition of the latest Information Technology (IT) has seen a significant increase, especially in companies and businesses. However, there are few companies that can provide affordable IT support to small and medium businesses, which usually did not have an IT-focused department. Hence, WCN (S) Pte Ltd was incorporated in 2005 to offer affordable yet effective IT support and solutions to all small and medium businesses.
In the current technological age of rapid advancement, it is no longer enough to simply provide IT services. Therefore, WCN provides many aspects of services, such as mobile application support, and reliable solution integration for small and medium businesses.
In order to offer effective and reliable services, WCN had accomplished forming many connections in the different fields over the years; further expanding WCN products and support. Customer referral is the main source of gathering WCN customer pool. With the array and sheer number of connections that are formed through this way, it is expected that the pool of customers would continue to increase exponentially.
WCN is exploring to provide solutions for the customer who intends to adopt flexi-work for staffs. In WCN, we believe that the solutions for each customers’ problems are different. Thus, we will provide a tailored solution every customer’s problems. Web and mobile application service will be one of the focus of WCN in the coming years. With the increase in demand of content collaboration platforms, such as Dropbox, Microsoft OneDrive and etc., and the increase in the number of plans supporting online learning and usage, such as Bring Your Own Device’ (BYOD) for school usage and Enterprise Mobility Management (EMM) being progressively applied across the full spectrum of business, it is apparent that this will be the direction the IT industry is heading in the next few years. Hence, it is becoming increasingly important to provide a safe, effective and efficient working environment virtually. As of today, WCN has already adapted to the changes in the industry and begun to provide service and support for these environments.
Alvin is constantly improving his skills and knowledge in order to provide better services to his clients. As such, Alvin has went through various courses and certifications over these recent years.
- Specialist Diploma in Information Security – 2015 by Nanyang Polytechnic
- CISA (Certified Information Systems Auditor) – 2016 by ISACA
- Specialist Diploma in Business and Big Data Analytics – 2017 by Nanyang Polytechnic
- CEH (Certified Ethical Hacker) – 2018 by EC-Council
- Specialist Diploma in Mobile Computing – 2018 by Nanyang Polytechnic
- CASE .NET (Certified Application Security Engineer .Net) – 2018 by EC-Council
- CASE JAVA (Certified Application Security Engineer Java) – 2018 by EC-Council
Where does the attacker get our information? Our information can be found in the following Facebook Unless the privacy setting in the Facebook is set correctly, else the public can view your post and personal information. Linkedin Your personal detail : education history, employment history and other can be found. Unless privacy is properly set. Public Phone Directory Name and address can be found Website Some company website have their organization chart, contact and other information published in the Internet. […]
Our inbox received lots of emails per day. Most of the email received were junk mails or useless emails to us. What is the danger opening those malicious email? They can be ransomware, delete your information in the system and network, steal your information (address book), use your system as the C&C attack, Email can be divided into the following category: Legitimate Advertisement Phishing Malicious Malicious attachment can be prevented through user training and improving user clicking behavior. The user needs […]
How to harden computer system? It is easy to harden the security of your computer system. Running on Microsoft Windows System. Perform Windows Update Perform Anti-Virus Update Set Password Policy Close or disable unused port and service Perform Windows Update Please do not use system that Microsoft had stop supporting. Example : Microsoft Windows XP This open opportunities for “Zero Day Attack”. As there is no more updates on security patches once Microsoft stop their support, it is only up […]
How can we protect ourselves against Malware Attack? The Answer is NO way to protect 100%. We need to understand how is the attack being carried out. Malware come from the following source Email attachment (.exe,.com and any executable file) and phishing email. Download program: especially freeware. Usually install more than 1 program Unsecure site : Porn site, illegal Gambling Site, illegal download site (Music, Movie and Software) What can Malware do to our system? ATP (C&C) Attack Exploit vulnerabilities […]
Ransomware is computer malware that encrypts the victim’s working files. The attacker will ask the victim for ransom to decrypt the victim’s files. Please note that there is no promise that the victim’s file can be recovered even the ransom is paid. Once the file is being encrypted, there is almost impossible to decrypt the affected files. Example: My client being hit by ransomware in one of the end-user systems. As the files are stored in the shared folder, the malware […]