APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cognitive
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cognitive
    Editor's Pick (1 - 4 of 8)
    left
    Agile Transformation Journey

    Sachin Nair, VP CIO, Khan Bank

    Responsible AI: The Human-Machine Symbiosis

    Sal Cucchiara, CIO & Head Of Wealth Management Technology, Morgan Stanley

    Seamless Integration into Networking Industry

    Robert Lewis, CIO, Assurant

    Enhancing Customers' Experience through Technology

    Marc A. Hamer, VP & CIO, Babcock & Wilcox Enterprises, Inc.

    Digital Transformation in Fashion Retail - From Efficiency to Experience

    Le Van, CTO, YODY Fashion

    Making Sense of Artificial Intelligence

    Joe Zirilli, Vice President, Artificial Intelligence, Parsons

    Revolutionizing Architecture and Construction: The Synergy of Artificial Intelligence and the Internet of Things (AIoT) in Building Smart Structures

    Raymond Kent, ASTC, Assoc AIA, LEED AP BD+C, Senior Technology Design Leader, Principal, DLR Group

    A Record of RPA

    Osmond Li, Senior Manager, Head of Technology Innovation, Dah Chong Hong Holdings Limited

    right

    Cyber Security in an all-digital world

    Effendy Ibrahim, VP, Asia & Japan, Veeam Software

    Tweet
    content-image

    Effendy Ibrahim, VP, Asia & Japan, Veeam Software

    It’s no secret that we’re living in a digital-first world. According to a report by IDC, two-thirds of the CEOs of Global 2000 companies will have digital transformation at the center of their corporate strategy by the end of 2017. Digital transformation isn’t just a trend; it’s changing how we interact with banks, service providers, and the government. It is leading industries and organisations to refocus and deliver towards the needs of today’s highly connected world. Spring Singapore, a government agency responsible to help local enterprises grow, has supported 120 food service companies in adopting digital service solutions in just the first five months of 2015. Since then, the number has grown and will continue to rise.

    As connectivity has become ubiquitous, consumers, employees, and partners expect that almost every experience will have a digital component. We’re living in the App Age. Today, apps track golf swings (and recommend ways to improve shot performance), as well as give tips to brew the perfect cup of coffee based on personal preference. Digital services help in monitoring the spread of infectious diseases, track criminal activity, and movements of motor vehicles to collectively enable the government to provide a safe, clean, and efficient environment for its citizenry.

    “Creating a solid business continuity plan depends on conducting regular data backups, along with verifying the integrity of those backups and securing them”

    This shift toward digital transformation is a long-term process that will span years, and will leverage digital technologies to increase efficiencies.

    However, the trade-off between convenience and security may inadvertently expose forward-thinking governments to a broader range of vulnerabilities.

    The stakes are getting higher for all as cyber threats have an increased capacity to interrupt a world that prioritises digital interactions. According to a recent report by Trend Micro, 2016 represented a record year for enterprise breaches. Asia-Pacific bore the brunt of cyberattacks with the highest number of attempted threats across different forms, especially for online banking malware and ransomware. 2016 also saw distributed denial-of-service (DDoS) attacks gaining traction worldwide, with breaches turning unsecured Internet of Things (IoT) devices into zombie bots.

    Singapore’s telco infrastructure experienced its first DDoS attacks, unprecedented in scale, nature, and complexity. Arising from malware-infected routers and webcams, the attacks caused temporary downtime and brand damage, forcing some of local telco Starhub’s home broadband users offline. In addition, our neighbours in Australia experienced a nation-wide crisis when their eCensus was hit by a major DDoS attack, preventing thousands of Australians from taking part in the census. Additionally, the attack led to a hardware failure, the overload of a router, and a false alarm about the attack, causing a total downtime of 43 hours and significant embarrassment for the Australian government, prompting outcries from citizens and the opposition.

    While the tools used may evolve over time, the strategy to combat these threats remains focused on two main areas: prevention and creation of solid business continuity plans. Prevention efforts focus on careful treatment of privileged accounts and control of permissions, ensuring regularly updated antivirus and anti-malware scans and awareness training for employees. While prevention remains paramount, the creation of a solid business continuity plan will grow in importance in an all-digital world, where everyone will rely on and expect 24.7.365 availability of data and services.

    Creating a solid business continuity plan depends on conducting regular data backups, along with verifying the integrity of those backups and securing them by ensuring they are disconnected from the computers and networks they are securing. The timeless rule for failure scenarios is the 3-2-1 backup rule–3 copies of the company data should be saved on 2 different media and 1 copy should be offsite. The “1” in the 3-2-1 rule continues to play an important role especially in an all-digital world as it does not allow for direct data access, providing protection against ransomware.

    Even as organisations improve their cyber security plans, a balance needs to be struck between protection and business continuity. Without constant availability to data and services, downtimes caused by cyberattacks will have repercussions beyond simple inconvenience.

    Based in Sydney, Australia, Veeam offers solutions that deliver availability for the Always-On Enterprise. The company was founded in 2006 and has 45,000 ProPartners and over 230,000 customers across the globe.

    tag

    Cyber Threats

    IoT

    Weekly Brief

    loading
    Top 5 Cognitive Solutions Companies in Hong Kong - 2023
    ON THE DECK

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Digital Hands, Human Focus: Rethinking Productivity with Automation and AI

    Samuel Budianto, Head Of Information Technology, Time International
    Transforming Cybersecurity Leadership in Critical Industries

    Transforming Cybersecurity Leadership in Critical Industries

    Joel Earnshaw, Senior Manager, Cybersecurity, Perenti
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    The Blueprint behind Modernizing Branch Networks

    The Blueprint behind Modernizing Branch Networks

    Ronaldo S. Batisan, Senior Vice President - Branch Channel Management Head Of Union Bank Of The Philippines
    Meeting Business Travel Demands with Intelligent Platforms

    Meeting Business Travel Demands with Intelligent Platforms

    Zamil Murji, Chief Technology Officer, Corporate Travel Management – Asia
    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    From Friction to Function: How Winc Turned Customer Feedback into Business Growth

    Cara Pring, Digital & Cx Director, Winc Australia
    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Why Contact Centres are Becoming Strategic Hubs for Social Insight

    Cindy Chaimowitz, GM Wholesale & Customer Service and Karen Smith, Head of Customer Service, Foodstuffs North Island
    Why Compliance Needs a Seat at the Strategy Table

    Why Compliance Needs a Seat at the Strategy Table

    David Koh, Head, Legal & Compliance (Singapore) and Operational Risk Management Country Lead, Perpetual Limited
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cognitive.apacciooutlook.com/cxoinsights/cyber-security-in-an-alldigital-world-nwid-4169.html