Our services
Desktop Support
As business heavily relies on computer systems for their daily operation, the computer system notebook cannot afford to be offline or down.
As connectivity get more complicated as the day goes by, system support personnel need to be compliant and capable to provide solutions for client’s operational issue.
O2O Services
Online to Offline data collaboration is a feature of getting your data anytime anywhere.
Working with Dropbox Business provides collaboration of corporate data to internal and external users.
Cyber Security
Safeguard ones IT properties and data is one of the most important aspect in recent years. Protecting business data and customer data is an important part of the business.
Reputation and monetary loss is unable to foreseen once there is a breach of system and data is lost or being leaked out to the public, worst fall into the wrong hand.
What else we provide?

Digital Marketing
From website, blog, email, e-commerce and mobile app, these are some example of interaction we do daily with Internet.
Business relies on Internet to get connected with their suppliers and customers. A good website will let your targeted audiences know what kind of products and services your business are providing.
Essential Protection
All end point system in the environment need some form of protection against virus, malware, malicious code and other bad thing.
IT Infrastructure
We deal with computer infrastructure and telecommunication environment. We provide professional advise to our clients, layout the pros and cons of different solutions.
We ensure that we provide the most professional solution to meet your requirements.
Office Relocation
Client that relocate their operation to another premises.

About WCN
In the early 2000s, the acquisition of the latest Information Technology (IT) has seen a significant increase, especially in companies and businesses. However, there are few companies that can provide affordable IT support to small and medium businesses, which usually did not have an IT-focused department. Hence, WCN (S) Pte Ltd was incorporated in 2005 to offer affordable yet effective IT support and solutions to all small and medium businesses.
In the current technological age of rapid advancement, it is no longer enough to simply provide IT services. Therefore, WCN provides many aspects of services, such as mobile application support, and reliable solution integration for small and medium businesses.
In order to offer effective and reliable services, WCN had accomplished forming many connections in the different fields over the years; further expanding WCN products and support. Customer referral is the main source of gathering WCN customer pool. With the array and sheer number of connections that are formed through this way, it is expected that the pool of customers would continue to increase exponentially.
WCN is exploring to provide solutions for the customer who intends to adopt flexi-work for staffs. In WCN, we believe that the solutions for each customers’ problems are different. Thus, we will provide a tailored solution every customer’s problems. Web and mobile application service will be one of the focus of WCN in the coming years. With the increase in demand of content collaboration platforms, such as Dropbox, Microsoft OneDrive and etc., and the increase in the number of plans supporting online learning and usage, such as Bring Your Own Device’ (BYOD) for school usage and Enterprise Mobility Management (EMM) being progressively applied across the full spectrum of business, it is apparent that this will be the direction the IT industry is heading in the next few years. Hence, it is becoming increasingly important to provide a safe, effective and efficient working environment virtually. As of today, WCN has already adapted to the changes in the industry and begun to provide service and support for these environments.
THE Founder
Alvin is constantly improving his skills and knowledge in order to provide better services to his clients. As such, Alvin has gone through various courses and certifications over these recent years.
- Specialist Diploma in Applied Artificial Intelligence – 2020 by Nanyang Polytechnic
- CASE JAVA (Certified Application Security Engineer Java) – 2018 by EC-Council
- CASE .NET (Certified Application Security Engineer .Net) – 2018 by EC-Council
- Specialist Diploma in Mobile Computing – 2018 by Nanyang Polytechnic
- CEH (Certified Ethical Hacker) – 2018 by EC-Council
- Specialist Diploma in Business and Big Data Analytics – 2017 by Nanyang Polytechnic
- CISA (Certified Information Systems Auditor) – 2016 by ISACA
- Specialist Diploma in Information Security – 2015 by Nanyang Polytechnic
- Diploma in Information Technology – 2006 by Nanyang Polytechnic
Latest updates
Support for Windows 7 is ending …
Windows 7, Windows Server 2008 and Windows Server 2008 R2 will be an end of support by 14 Jan 2020. Microsoft will no longer provide security updates and support after 14 Jan 2020. It is time to look into alternative if you have the above operating system in your office […]
Where does attacker get our information?
Where does the attacker get our information? Our information can be found in the following Facebook Unless the privacy setting in the Facebook is set correctly, else the public can view your post and personal information. Linkedin Your personal detail : education history, employment history and other can be found. […]
Phishing Email
Our inbox received lots of emails per day. Most of the email received were junk mails or useless emails to us. What is the danger opening those malicious email? They can be ransomware, delete your information in the system and network, steal your information (address book), use your system as […]
Hardening Computer System
How to harden the computer system? It is easy to harden the security of your computer system. Running on the Microsoft Windows System. Perform Windows Update Perform Anti-Virus Update Set Password Policy Close or disable unused port and service Perform Windows Update Please do not use the system that Microsoft […]
Malware Attack
How can we protect ourselves against Malware Attack? The Answer is NO way to protect 100%. We need to understand how is the attack being carried out. Malware comes from the following source Email attachment (.exe,.com and any executable file) and phishing email. Download program: especially freeware. Usually, install more […]