{"id":7770,"date":"2016-11-16T10:48:55","date_gmt":"2016-11-16T02:48:55","guid":{"rendered":"http:\/\/exabytes.sg\/blog\/?p=7770"},"modified":"2022-03-01T19:09:54","modified_gmt":"2022-03-01T11:09:54","slug":"how-to-prevent-domain-names-from-being-hijacked-event","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/how-to-prevent-domain-names-from-being-hijacked-event\/","title":{"rendered":"\u201cHow to Prevent Domain Names from BEING HIJACKED\u201d Event"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7771 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/domain-security2-1.jpg?resize=540%2C283&#038;ssl=1\" alt=\"domain security\" width=\"540\" height=\"283\" \/><br \/>\n<span style=\"font-weight: 400;\">Once again, t<\/span><span style=\"font-weight: 400;\">hank you very much for joining us at<\/span><span style=\"font-weight: 400;\"> the \u201cHow to Prevent Domain Names from BEING HIJACKED\u201d event at SGNIC@Mapletree Business City. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The event was a success, and we hope every attendees have learned something new and useful in security, one of the most important topics these days.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7772 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1521.jpg?resize=540%2C360&#038;ssl=1\" alt=\"speaker- John\" width=\"540\" height=\"360\" \/><br \/>\n<\/span><span style=\"font-weight: 400;\">It was a pleasure to have our first speaker, Mr. John Lim Yueh Han, who is the Course Manager of Diploma in Cyber Security &amp; Forensics in Nanyang Polytechnic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> The topic shared was &#8216;The Issue of trust in network\u2019, in which John touched on various security issues over the Internet, and the technology that is used to enable trust.<br \/>\n<\/span><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7773 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1550.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Speaker- John-gift\" width=\"540\" height=\"360\" \/><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After the first speaking session, we had a short break for some light food and drinks.<\/span><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7775 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1434-3.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Food\" width=\"540\" height=\"360\" \/><\/span><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7774 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1434.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Food 2\" width=\"540\" height=\"360\" \/><\/p>\n<p>Everyone was seen socializing and having a great time.<br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7776 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1438-2.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Attendees socializing 2\" width=\"540\" height=\"360\" \/> <img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7777 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1553.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Attendees socializing \" width=\"540\" height=\"360\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Next, it was our honor to invite the second speaker, Mr. William Loh who is the IT Security Manager of Singapore Network Information Centre (SGNIC) Pte Ltd. and shared on &#8220;How to protect your .sg websites from being hijacked\u201d.<br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7778 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1634.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Speaker-William\" width=\"540\" height=\"360\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">For your information, <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">RegistryLock is the extra layer of security protection for SG domain names that protects domain owners from unauthorized modification on <a href=\"https:\/\/www.exabytes.sg\/domains\" target=\"_blank\" rel=\"noopener\">domain name information<\/a> which can lead to, for example, UNAUTHORIZED CHANGES OF DOMAIN NAME OWNERSHIP. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now imagine someone manages to modify the PRIMARY EMAIL ADDRESS attached to your domain. This person can then <a href=\"https:\/\/www.exabytes.sg\/domains\/domain-transfer\" target=\"_blank\" rel=\"noopener\">transfer the domain ownership<\/a> to whoever he wants. When this happens, the original and legitimate domain owner will lose his domain ownership forever.<\/span><\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7782 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1628.jpg?resize=540%2C360&#038;ssl=1\" alt=\"20161103-1628\" width=\"540\" height=\"360\" \/><br \/>\n<span style=\"font-weight: 400;\">Therefore, to equip our valued clients with all the knowledge they need to protect themselves, Exabytes had organized this important event. We believe all our attendees are now more aware of the important security issues that can post great threats their business.<\/span><\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7780 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1522.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Attendees 2\" width=\"540\" height=\"360\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To see some of the photos we took at the exciting event, visit <a href=\"https:\/\/www.facebook.com\/exabytes.sg\/posts\/10154804275718960\" rel=\"noopener\">HERE\u00a0<\/a><\/span><\/p>\n<h3>Domain Names from BEING HIJACKED Events<\/h3>\n<p><span style=\"font-weight: 400;\">Thank you again for your participation. We hope you had a wonderful time learning from the esteemed speakers!<br \/>\n<img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-medium wp-image-7783 alignnone\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/20161103-1459.jpg?resize=540%2C360&#038;ssl=1\" alt=\"Group photo\" width=\"540\" height=\"360\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">See you soon at more upcoming events!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once again, thank you very much for joining us at the \u201cHow to Prevent Domain Names from BEING HIJACKED\u201d event at SGNIC@Mapletree Business City. The event was a success, and we hope every attendees have learned something new and useful in security, one of the most important topics these days. It was a pleasure to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[262],"tags":[],"class_list":{"0":"post-7770","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-all-about-exabytes"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2016\/11\/domain-security2-1.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-21k","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=7770"}],"version-history":[{"count":3,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7770\/revisions"}],"predecessor-version":[{"id":22467,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/7770\/revisions\/22467"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/7771"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=7770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=7770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=7770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}