Home » Business » Indonesian Spate of Cyber ​​Attacks Highlights Compliance and Public Education

Indonesian Spate of Cyber ​​Attacks Highlights Compliance and Public Education

COMPLIANCE, LACK OF PUBLIC EDUCATION AMONG THE MAIN CAUSES

What are the root causes?

Cyber ​​attacks in Indonesia will continue to persist because people underestimate them and do not understand their characteristics, said Ardi Sutedja, director and founder of the Indonesian Cyber ​​Security Forum (ICSF).

“The various technologies we use today are not the work of Indonesians. We are all just users of technology.

“Today’s technology changes in seconds, so we don’t have the luxury of having time to learn all the technology and its risks,” he said. As a solution, he suggested more human capacity development, as well as better digital literacy education.

Mr. Pratama Persadha, president of the Cybersecurity NGO’s Information and Communication Systems Security Research Center (CISSReC) agreed.

He said that people need to be constantly educated about the dangers of uploading their personal data, including images, online. He also defended the need to configure personal social media accounts in private mode, constantly change passwords, and minimize the use of public Wi-Fi.

There is also the risk of personal data being leaked through the services of the electronic platform.

“This is why we need better regulations so that those who are responsible for our data breaches can be punished,” he said.

Yihao Lim, senior intelligence advisor at cybersecurity firm Mandiant Threat Intelligence, said that since many companies moved online amid the pandemic without much of a wait, they may not have the best security measures in place to ensure that the information is kept secure.

He also said that many organizations have increased their dependence on third-party providers hosted in the cloud for their main business tasks. This has put more pressure on third parties to ensure availability and security.

Lim urged companies to “invest in training and awareness among internal staff, keep them up-to-date on the latest phishing events and methods used by attackers to prevent any successful intrusion ”.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.