Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Why the 4th industrial revolution is seeing 'an unprecedented increase' of cyberattacks: Malaysia industry interview

AvantiKumar | Aug. 14, 2017
With his cybersecurity hat on, Dell EMC's Saravanan Krishnan details some solid strategies to better protect business-critical data from cyberattacks.

Usually the data sets needed to rebuild are somewhere between 5% and 10% of the overall business. Start with a core set and build from there - additional data and applications can always be added over time.
Cybercrimes have and will continue to evolve, as governments, businesses and the general public strive to keep up. What are your concluding thoughts?
Undeniably, cybersecurity is top of mind of many countries as we enter the 'golden age' of the digital era. Australia appointed a Cyber Ambassador to work in close liaison with other nations on cybersecurity issues. India set up its National Cyber Coordination Centre to provide near real-time situational awareness and rapid response to cyberattacks.

Here in Malaysia, the national agency entrusted to address emerging ICT security issues in the country, CyberSecurity Malaysia (CSM) is doing an excellent job at providing cybersecurity information, best practices, training and awareness programmes to prepare Malaysians - both consumers and businesses - with the ability to act sooner, to predict and prevent. The swift response to the WannaCry and NotPetya incidents are the latest examples of the agency's proficiency in addressing cyber incidents.
That said, there is only so much one entity can accomplish - there is still much that can be done to create a more holistic approach to combating cyberattacks. Governments need to work more closely with the private sector to tackle the matter. The other aspect of cybersecurity that the government should look into is data protection regulations. While Malaysia has the Personal Data Protection Act (PDPA) which was enforced in 2013, the landscape has evolved since then. There is now an urgency to establish a more comprehensive framework to deal with cyberattacks.
For businesses, there is the issue of cross-border regulations for data protection - organisations doing business across borders have to consider US and EU legislations (EU's General Data Protection Regulations, GDPR and the US' International Safe Harbour Privacy Principles). Compliance is a challenge, but it is no longer optional. Compliance requirements differ depending on where a business operates, so organisations have to closely monitor relevant laws and regulation changes.
For the general public, it is a little more straightforward. Unlike businesses, consumers may not have large investments on security defines technologies. As such, they are strongly advised to always update their systems, antivirus and practise safe internet habits such as not downloading pirated software.

To see some latest local digital security news, visit:


Previous Page  1  2  3  4  Next Page 

Sign up for CIO Asia eNewsletters.