April 07, 2020
Of your peers have already read this article.
Minutes you'll spend on this story!
Data as a resource is crucial for Malaysia’s development and growth, former Minister of Communications and Multimedia Gobind Singh Deo has said.
“I’m of the view that data as a resource is essential in realising visions of the smart digital future, consisting of smart cities, and even autonomous cars,” he said at a cybersecurity conference in Singapore recently.
However, data is more often becoming the target of cybercriminals across the region and Malaysia is no exception. “Over half of all reported cyber crimes have data theft as their goal”, he added.
The free and trusted flow of data and information is a “strategic asset” for economies. Gobind further said, “Failing to embed effective security measures will erode trust and thereby undermine the stability of our information society. Our digital economies, and the platforms on which they are built, cannot be more of a source of risk than a source of development.”
Malaysia has seen a series of data breaches across industries in the last two months, which should serve as serious warnings to what’s possible in the future. In October, hackers targeted the country’s oldest university, and defaced its payments website. They went on to leak 24,000 login IDs and passwords online, according to reports.
And the month before that, attackers claimed a TV network as a victim, accessing customers’ IC data – including names, ID numbers, dates of birth, and address. The network, that serves 23 million people and 77% of households in Malaysia, said 0.2% of its customers were affected.
Also in September 2019, a Malaysian airline subsidiary had its passenger data stolen and put up for sale on the dark web. The data was stolen by two former employees of a contractor in India, the company found.
CyberSecurity Malaysia has said that there were 178 data breaches as of September this year, compared to 63 and 19 in 2018 and 2017, respectively. Meanwhile, a survey by insurer Chubb showed that 84 percent of local SMEs were attacked last year.
In response, the government has proposed stricter penalties and stronger data regulations. “We should impose a heavier penalty for data breach offenders, including companies that neglected security aspects when it comes to safeguarding customers’ data,” the CEO of CyberSecurity Malaysia, Datuk Dr Amirudin Abdul Wahab, has said.
Gobind said that the country’s data protection laws need to be updated. “We have laws that have been in place since 2010, and I think we have reached a point where we need to improve on it,” he said.
While regulations are catching up, hackers are getting more ambitious and resourceful. For instance, the attack on Singapore’s healthcare system last year “was a deliberate, targeted and well-planned cyber attack” and that “it was not the work of casual hackers or criminal gangs”, the CEO of the Singapore’s Cyber Security Agency said.
Gobind also warned that Malaysia is at risk as long as security remains an “afterthought”. He called on businesses to do more to protect customers. “By working together, we ensure that we not only anticipate, but also protect ourselves against cyber threats and cyber attacks”.
TM ONE, recognising that cybersecurity is most crucial in today’s Hyperconnected Ecosystem, continuously strengthens its security offering for customers. In November 2019, we launched three new products during the Cybersecurity Day which was held at TM ONE Experience Centre recently.
The three new products are: a Next Generation Firewall, a Managed Security Operations Centre, and Intelligent Threat Defence. These tools will provide comprehensive coverage for the critical industries that we serve every day, while allowing them to focus on their customers.
The Next Generation Firewall is powered by artificial intelligence to continuously analyse weaknesses in networks and applications, detect malwares and botnets, and protect against DDOS attacks, amongst other sophisticated attacks.
It is the world’s first AI-enabled application firewall and powered by Engine Zero and Neural-X. Engine Zero is a AI-enabled gateway anti virus provide both signature and behavior based malware detection. And Neural X, is a AI enabled cloud-based intelligence and analytic platform against unknown cyber threats. Artiﬁcial Intelligence (AI) has powered and expands security detection capabilities for TM ONE’s network, endpoint, and security-as-a-service offerings.
The Managed Security Operations Centre helps centrally manage user access and provides real-time dashboard for vital security insights on network, data and application, incident reports and analysis. Customers have the option to deploy this for on-premise data or to monitor activities in their cloud.
It uses SIEM, an Intelligent tool that predict and alert customer on the attacks by using data collected from customer logs on security devices such Firewall & IPS, Network, Server and End-Point. It also notifies customer when incidents, threats and anomalies occur, to help organization ensure that their network is secure.
TM ONE’s Intelligent Threat Defence system provides an automated solution to secure the entire network, without having to deploy additional systems. It stops the loss of confidential data and uses machine learning to block data exfiltration attacks.
It is a cybersecurity solution that utilises analytics and machine learning technology. Through real-time streaming analytics of live DNS queries and machine learning to accurately detect presence of data in DNS queries, it detects and automatically blocks attempts to steal intellectual property via DNS without the need for endpoint agents or additional network infrastructure.
“For businesses, where IT network and data are extremely valuable assets, it is crucial for all to take cybersecurity seriously. No organisations, whether they are small or large, are immune from cyberattacks.” Mohd Roslan Mohd Rashidi, Vice President of Sales at TM ONE, said during the launch. “These new products are evidence of TM ONE’s continuous readiness and commitment to provide the latest solutions, working together with our partners and cybersecurity experts, to ensure that our customers are able to protect their most critical assets, so that they can conduct their business with peace of mind,” he added.
April 28, 2021
Of your peers have already read this article.
Minutes time you’ll spend for this story!
Despite the enormous values Cloud brings to enterprises globally, it is undeniable that Cloud security has been the biggest barrier preventing technology teams from adopting Cloud at a rapid scale.
According to a recent survey by Cybersecurity Insiders, 75 per cent of respondents stated they were ‘very concerned’ or ‘extremely concerned’ about public Cloud security.
Their concerns are largely driven by data residency and security reasonings, as sensitive data will be stored off-shore due to the absence of local region. Data residency refers to where a business, industry body or government specifies that their data is stored in a geographical location of their choice, usually for regulatory or policy reasons. Data Sovereignty refers to the laws of the country in which the data is stored. Data residency and sovereignty are extremely important when considering Cloud services. Malaysian key/strategic data resides on Malaysian soil safeguarded by a national provider.
However, over recent years, cloud security is getting debunked. Many are now realising that perhaps Cloud, especially the public model, provides the best and most innovative security solution any enterprises can obtain. With such knowledge, the adoption of public Cloud has increased globally across legacy enterprises and this trend is forecasted to continue within the next 36-48 months.
By 2025, the digital economy will contribute 22.6% of the Malaysian Gross Domestic Product (GDP). In the recently announced MyDIGITAL Digital Economy Blueprint, the Prime Minister provided the assurance that “the Government will monitor the information security of data management to avoid any future cyber threats. He also mentioned that “cybersecurity and data security will be one of the main focus of the Government in realising the vision of a digitally technological nation. The data of the citizens will be managed based on the security policy provided by National Cyber Security Agency (NACSA) as the implementation agency”.
With reference to the previous article, Cloud can be divided into three (3) models – private, public and hybrid Cloud. Private Cloud stores data in a private environment exclusive to the enterprise and allows them to fully manage their Cloud security. Public Cloud, on the other hand, stores data in a shared environment, where enterprises surrender Cloud security management to the Cloud provider. Hybrid Cloud falls in between both models, allowing flexibility in storage and management.
Although private Cloud ensures data locality and sovereignty, there remain to be pitfalls from migrating data to this model. Three (3) of the key reasons are as follows:
Private Cloud is the most expensive model. The use of private Cloud requires enterprises to maintain a considerable budget for comparable personnel, administration and technology infrastructure on top of security. Often times, due to varying costs and a self-governance model, enterprises are able to only allocated a limited budget to secure their Cloud; denying their access to top-notch innovative solutions. Although private Cloud maintains the exclusivity for enterprises, it can result in poorer protection, as a result of higher cost with a limited budget which can be detrimental to the business.
The use of private Cloud is largely dependent on dedicated in-house resources to ensure frequent testing and maintenance. However, this can lead to inefficiency due to common roadblocks such as bandwidth issues, redundant testing or narrowed coverage and the need to have the right personnel with the right skills in place to keep up with evolving technology and cyber threats. As a result, the security of the Cloud is at risk despite a private infrastructure.
Although enterprises are given the option to outsource hardware and infrastructure in a private Cloud model, the biggest issue is the high reliance on a service provider. Private Cloud is a service delivery technique where enterprises are forced to continue with the same service provider, thus preventing them to migrate to another vendor. On the security front, it can be a challenge as options to improve Cloud security such as multi-Cloud adoption and new solutions integration become more rigid as enterprises would need to seek permission from the service provider and ensure compatibility of solution.
Contrary to private Cloud, public Cloud operates in a shared infrastructure model – which means data from various enterprises are stored in the same stack. However, it does not account for data being accessed by unauthorised personnel. In fact, it is quite the contrary. Public Cloud, though widely misconstrued as unsafe, offers one of the best security options to its users. Below are the key reasons:
In the public Cloud model, enterprises big and small pool together billions of dollars in security budgets for public Cloud providers to constantly discover and deliver best in class innovative solutions. Through this, enterprises’ data are well protected and secured by solutions that are often times beyond their range of affordability, if done in solitary.
Public Cloud providers’ top priority is to ensure data security. With that in mind, renowned global providers conduct round-the-clock surveillance on their hardware and software to ensure any malicious attempts is addressed and eliminated.
In Southeast Asia, talent crunch is the huge barrier barring enterprises from securing their Cloud. Most of these top security talents have an unspoken preference to build their career with leading public Cloud hyperscalers. This preference could be driven by the learning opportunities and global access public Cloud providers offer. Henceforth, new security solutions are constantly being created, further securing their Cloud technology.
How did Cloud gain negative sentiments? Unfortunately, due to notable incidents of cyberattacks and security breach in the region, it led to a sense of doubt in Cloud security amongst enterprises and governments. For instance, back in February 2021, Singtel, Singapore’s biggest telecom provider, reported a data breach resulting in 130,000 of customer data stolen by hackers.
However, security in Cloud, especially public, is often underestimated and misunderstood. Despite a data centre sharing model, leading global providers have made it a point to invest billions to secure the data of their customers with innovative automation. These providers often set a much higher bar than most enterprises when it comes to this. That said, the vulnerability to attacks sometimes lies in the migration to the Cloud process, which is managed by service partners, but it is not at the processing and storage end. A notable example is the cyber-attack on SingHealth, where IHIS was faulted for mishandling of the data causing security breaches. While on the Cloud itself, there are often limited security mishaps especially with mature providers. Therefore, Cloud security is more secure than many have perceived.
Cloud and cybersecurity must come hand in hand for any enterprises which are considering or in the midst of digital transformation.
The selection of partners and providers is important. Enterprises should value the service vendors who practice a rigorous protocol and invest in innovative security solutions. They should place security at the centre stage of their infrastructure, to ensure the same is delivered to the customers.
TM ONE, the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) offers a comprehensive suite of solutions covering connectivity, Cloud, data centres and cybersecurity where TM ONE’s Cloud & Cybersecurity ecosystem is portrayed in the establishment of its Klang Valley Core Data Centre (KVDC) in Cyberjaya.
Meanwhile, TM ONE CYDEC Professional Services offers a complete set of cybersecurity posture assessment, consulting and advisory services that transform and enhances an organisation’s risk management capabilities by analysing and identifying the existing cyber risks in different environments (IT, OT, Cloud, IoT, etc.) and offers the solution to mitigate that risks, which best meets the customers’ needs.
A key factor that differentiates TM ONE’s full cloud capabilities delivered through TM ONE Cloud α from other Cloud services is the comprehensive offerings and multiple deployment models that align with its customer’s Cloud adoption strategy and business objectives. The innovative digital solutions are set to accelerate the digital transformation journey of our enterprise and public sector customers, and this perfectly fits our role as part of TM Group as the enabler of Digital Malaysia.
Find out how to build digital trust and cybersecurity resilience for Malaysian businesses operating in a digital ecosystem. Detect, protect and respond to your business cost-effectively, easily and flexibly. Click here to download the IDC Managed Security – Building Trust for Digital Business Success.
Of your peers have already read this article.
Minutes time you’ll spend for this story!
Cloud solution has been a trending boardroom topic amongst leadership in Southeast Asia long before COVID-19. Now with business continuity and remote working become the agenda to survive the pandemic, many have accelerated their cloud adoption and migration strategy. These proactive approaches to transform digitally can be witnessed across legacy enterprises from manufacturing to logistics.
Southeast Asian Governments, Malaysia included, are shifting to a more favourable stance on cloud by amending national policies, creating frameworks and launching digital transformation (DX) initiatives. The Malaysia Digital Economy Blueprint, MyDIGITAL, for instance, is Malaysia’s national response to drive digitalisation amongst businesses and government agencies while bridging the digital divide across the country. To realise this ambition, in the first phase of the blueprint (2021-2022), the Government aims to move towards a paperless environment and migrate 80% of public data to hybrid Cloud systems by the end of 2022, but why?
Although Cloud is well spoken of, the concept of how it is imperative to digital transformation remains vague to many. Hence, to understand its synonymity, it is important to debunk the technology.
Foremost, the technology can be differentiated into three (3) models:
Top three (3) advantages:
Top three (3) advantages:
Top three (3) advantages:
Within each model, Cloud is further defined by its service types with differing level of responsibilities between the user and service providers.
Unlike traditional infrastructure, the flexibility, accessibility and scalability of Cloud prepare enterprises and governments to stand resilient against any given circumstances and allow them to act quickly to ensure competitive advantage in the market.
Cloud in action – how Cloud is used in Southeast Asia?
All enterprises, across industries and sizes, experience data loss caused by unintentional events such as system failures and natural disasters. While there are methods to prevent data-loss events, the most effective data-protection method is having an enterprise-wide backup solution.
However, with the exponential growth of data worldwide, backup solutions are required to be comprehensive. Traditional backup methods such as tape libraries are unable to quickly scale to this growth and maintaining them can be extremely cost-intensive.
Thus, a growing number of organisations are moving on-premises backup capabilities to the Cloud in order to accommodate this data growth. Some of the benefits include:
In today’s data-driven environment, enterprises are required to overcome data silo challenges and find efficient and innovative ways to uncover hidden insights within their data to remain competitive. However, to build constantly evolving capabilities in-house is no easy task, hence leading digital companies e.g. Netflix, or regional favourites e.g. Grab, look towards Cloud providers and their partners for such solutions. They provide real-time analytics, big data processing and more which enable enterprises to streamline its business intelligence process of gathering, integrating and presenting insights to enhance business decision making.
What are the values for enterprises?
In Southeast Asia, more and more enterprises are using Cloud for innovation projects. Those that do not look lean on Cloud for R&D, seem to lack behind their counterparts who do. This is simply because upfront technology investment into on-premise infrastructure is heavy and procurement periods are long, barring them from constant innovation to address consumer needs. On the contrary, Cloud is readily available, can be scaled down or up, and is armed with various tools and software to support innovation. Thus in terms of cost, timeframe and manpower, Cloud is an indisputable option for R&D.
Cloud optimisation demands for partners
One of the biggest challenges for Cloud adoption in Southeast Asia remains to be the talent crunch. This challenge is extremely prevalent in Indonesia as they house only about 75,000 IT engineers in the country, while they require at least 10x the number to fully sustain a digital economy.
Furthermore, digital talent often aims to work in digital companies, which impedes the digital journey of legacy enterprises. Hence, Cloud service providers play a vital role in the region as they have the people, experience and capability and they provide end-to-end support to ensure true Cloud optimisation.
Of your peers have already read this article.
Minutes time you’ll spend for this story!
Every major service sector is under pressure to adapt to the current circumstances, and the education sector is no exception. Significant adjustments were needed across educational institutions to move onto the reality of having minimal face-to-face interaction. This case is especially true with the tertiary education sector, which has to provide its services across international borders.
The restrictions imposed in 2020 on in-person classes resulted in a large-scale shift towards online-based classes. E-learning platforms existed long before the pandemic; however, recently, these platforms took centre stage in delivering educational content. Consequently, it resulted in an upsurge in virtual classrooms, as well as a suite of remote services, including teaching, workshops and examinations.
These options provide support for students disrupted by the closure of universities. However, these e-learning platforms require a scalable yet flexible and reliable IT infrastructure. Hence, this situation requires institutions to re-evaluate the said infrastructure to manage the demands of their staff and students.
Here, we share some success stories from the education institues that have embraced digital transformation as an opportunity to bring better learning experiences for its students.
Universiti Sultan Azlan Shah (USAS), adapting to circumstances
USAS was granted full university status on 15 June 2016. The institution offers a variety of courses from foundational studies to PhDs. Its campus, located at Bukit Chandan, Kuala Kangsar,was completed in 2008. USAS currently offers 47 courses in Islamic Studies and multiple subjects under Management and Information Technology. Currently, USAS has the support of 198 lecturers and serves nearly 5600 students.While it still has traditional systems in place, USAS is a key example on how educational institutions can adapt to changing circumstances. The upgrades implemented by the university enables effective online leaning for students and lecturers too.
Breaking free from traditional systems and their limitations
To manage the demand for remote learning, USAS transformed to a cloud-based IT infrastructure from a traditional on-premise setting. The former on-premise system required high amounts of capital investments, labour, and maintenance. For example, on-premise systems typically require higher investments in hardware,including logistics and setup processes. During the lockdown periods, the response time to scale was severely affected by supply chain disruptions. Moreover, in terms of maintenance, IT teams must be on-site to respond to any system glitches encountered.
Such limitations often result in higher costs to support the IT infrastructure. These experiences limit the ability of USAS to scale efficiently and match the demand for remote learning. Due to these limitations, USAS considered engaging TM ONE to adopt a cloud-based learning management system.
“The decision to engage TM ONE was due to its capabilities of providing end-to-end technological solutions inclusive of connectivity, cloud services and cybersecurity, catered specifically for the education sector,” said a USAS C-Level representative.
Reaping the benefits from cloud migration
The success of cloud and its effects on universities’ performance is spoken of widely in the education industry globally.The surge of users using online platforms, which posed a scalability challenge with on-premise servers, was addressed with cloud solutions. Using cloud platforms, educational institutions can scale depending on the activity and user base in a cost-efficient manner.
In this very manner, USAS could efficiently scale up or down based on its usage. This ability allowed USAS to tap into the readily available capacity from TM ONE on a scalable pay-as-you-go basis. USAS reported that it could have 800 students sit for exam sessions concurrently on the renewed cloud-based system, compared to 200 students on the legacy platform.
Other than scalability, USAS was also able to capture significant cost-saving benefits by migrating onto cloud platforms. For example, leveraging cloud technology allows USAS to have lower hardware dependency. Therefore, USAS can focus more on operational expenses, resulting in higher flexibility on its expenses. Unlike on-premise systems where universities were responsible for upgrades and maintenance – cloud-based systems are primarily managed by the cloud provider. This shift in responsibility significantly reduces the financial burden on universities to manage their data storage systems and infrastructures.
These benefits also extend to the IT department, which can now focus on higher-value services rather than on maintenance work. Moreover, the IT Department has the added advantage of being able to conduct support work online safely. As a result, the IT team of USAS noted improvements in their Mean Time to Restore (MTR). In the case of upgrades, the USAS IT team can activate upgrades within 48-hours, allowing them to increase efficiency and reduce costs.
Improving user experience for both students and staff
Ultimately, these benefits aims towards enhancing the services for students and lecturers. By leveraging the power of the cloud, USAS can now provide higher-quality content to its students. This leverage is crucial to compensate for the difficulties faced by lecturers due to the loss of physical interaction.
Feedback from the students noted that the performances of past on-premise servers made it difficult for them to learn through digital platforms. The students claimed that they were affected by long loading times and lags. The alternative at that point was to use the platform during off-peak periods, which was inconvenient.
The scalability, efficiency and performance of the cloud provide the robust infrastructure for a conducive learning environment. For example, during crucial exam periods, the cloud reduces system glitches by providing the needed scale. Students can now enjoy a smoother delivery of classes and have real-time responses with their lecturers, leading to an augmented learning experience.
Local counterpart leveraging cloud beyond the classroom
Apart from delivering in-classroom benefits, education institutions are also able to utilise the cloud to enhance customer servicing. A local counterpart, Universiti Teknologi Petronas (UTP), teamed up with TM ONE in 2018 by adopting a Unified Customer Service (UCS) powered by cloud. The service provided has a consumption-based business model to manage customer interactions for customer experience.
This solution offers an effective way of managing customers by having a one-stop-centre approach. Post-adoption, UTP had expanded its contact centre services from 5 departments in 2018 to 25 departments in 2020. TM assisted UTP by handling more than 1000 interactions monthly, achieving an average of 95% in performance levels. Along with other improvements, these efforts were recognised regionally, with UTP awarded the CXP Best Customer Experience Award in 2020.
The success UTP experienced with the power of cloud technology is not foreign to their peers. UTP was amongst the first educational institution in Malaysia to drive a cloud transformation strategy. After signing a three-year MOU with Microsoft back in 2017, UTP has been a transformative player by integrating tools such as Azure, Power BI, and Machine Learning to future-proof its students and staff. These initiatives were part of a wider goal of improving its capabilities for its educational services and drive operational efficiency.
Learning from global leaders in the education industry
Despite the challenges posed by the pandemic, leading universities are using this period as an opportunity to further drive the adoption of cloud services. For example, The London School of Economics (LSE) followed through with complementary changes to streamline its financial and business management systems. By engaging with a technology partner, LSE now uses a cloud SaaS solution to manage its finances, budgeting and procurements. This enhancement frees up the staff to focus on providing higher levels of service to their students.
On the other hand, Standford University (SU) shows that adequate training must supplement cloud adoption strategies. Observing its cloud transformation journey, the university made clear communication plans to prepare its staff for the upcoming changes. SU deployed several training programs and communication channels to prepare its staff technically in handling the changes. These steps are crucial to provide confidence for lecturers and supporting staff to embrace the cloud’s capabilities.
As cloud technology continues to grow into a necessity in the education sector, adopters need to have the right information and expertise. Whilst the benefits are clear, misconfigurations can often lead to cybersecurity concerns. Hence,a technology partner is often regarded as a preferred option for institutions to integrate cloud-based solutions. Similar to USAS and UTP, cloud services work best with collaboration. This way, institutions can rest at ease knowing that their cloud strategy is backed by reputable expertise, bringing the full potential of the cloud to the forefront.
April 20, 2021
Of your peers have already read this article.
Minutes time you’ll spend for this story!
Cybersecurity remains one of the critical business challenges that business leaders face in their quest to strengthen their resilience in the pandemic-inspired ‘new normal’. The cyber threat landscape has increased both in quantity and sophistication of attack vectors in tandem with rapidly evolving technologies as well as the surge in digital commerce and remote working in the ‘new normal’.
According to the 2020 report on the cyber threat landscape which must be addressed by member countries of the Association of Southeast Asian Nations (ASEAN), the sobering reality is that botnet infections, phishing scams, and ransomware – among others, are evidently on the rise.
International security agency INTERPOL also ranks Malaysia among the top 3 countries in terms of mobile banking malware detections.
Cybersecurity threats have been exacerbated by fallout from Covid-19: Malaysia recorded an 82.5% increase in cybersecurity cases in 2020. In addition, 838 incidents were reported to the Cyber Security Malaysia (CSM) between March 18 and April 7 of last year – when the first phase of movement control order (MCO) commenced.
The recent cyberattack threat from Anonymous Malaysia, a group of hacker activists or hacktivists, which resurfaced after a five-year hiatus, has pledged a concerted cyber campaign against government websites and online assets. This in turn has signalled cybersecurity readiness concern through, other industry sectors.
In the current shifting landscape, Malaysian enterprises – many of which lack the resources to have in place the necessary critical cybersecurity skills, technologies and capabilities to mitigate the sophisticated wave of cyber threats – must make urgent strategic decisions – and act on them.
Moving forward, remote working culture is here to stay, and cloud adoption plays a vital role as both an enabler and an operational platform for an organisation’s digital transformation. Business decisions concerning on which elements can be handled in-house and which must be outsourced or brought in as a service are now game changing actions for Malaysian enterprises intent on transforming the “new normal” into an era of opportunity.
Digital trust is now a critical building block
By 2025, the digital economy will contribute 22.6% of the Malaysian GDP. In the recently announced MyDIGITAL Digital Economy Blueprint (DEB), the Prime Minister provided the assurance that “the Government will monitor the information security of data management to avoid any future cyber threats. He also mentioned that “cyber security and data security will be one of the main focus of the Government in realising the vision of digitally technological nation. The data of the citizens will be managed based on the security policy provided by National Cyber Security Agency (NACSA) as the implementation agency”.
Building cyber resilience now must go hand in hand with an organisation’s proactive cyber defence strategy: beneficiaries of this heightened approach include a better protected digital infrastructure, cleaner data in the cloud, and through every end-point.
IDC defines building digital trust as ‘enabling decisions to be made between two or more entities that reflect their level of confidence in each other’.
Today, digital trust between an organisation and its customers, is essential for most if not all economic activity in an increasingly digital-first world.
Furthermore, enterprises are obligated to protect their clients’ data. Mandatory regulatory compliance is designed to enhance an organisation’s security posture through the actions required to maintain the confidentiality, integrity, and relevant accessibility of data and digital services.
The success of an organisation’s digital transformation is guided by high standard of safety and compliance regulatory frameworks. Excellence in regulatory management and compliance translates to robust baseline security standards, which in turn increases digital trust and cyber resilience.
Of course, it is important that we remain aware of certain security risks when using cloud services, especially those concerning non-compliance to regulatory requirements, and the correct management and mitigation of disruptions such as identity theft, online fraud, malware infections, data breaches; and to have in place guidelines to safeguard your brand and reputation.
Companies must carefully balance any digital risks of using cloud computing against the benefits and returns on investment (ROIs).
Why cybersecurity is now an essential for business operations, a must have in Digital transformation.
Malaysia Cyber Security Strategy 2020-2024 (MCSS) outlines the key objectives and five strategic pillars that will govern all aspects of cybersecurity planning and implementation in Malaysia until 2024. One of the focus areas is to improve national cyber resilience against cyber threats, which ranges from advanced persistent threats to cybercrimes and content-related threats.
MCSS is crucial for achieving Malaysia’s Digital Economy Blueprint (DEB) by protecting government and CNII networks, systems, and data, as well as businesses and citizens, while at the same time combating cybercrime and cyber threats. This is where an Active Cyber Defense (ACD) approachis required and for organisations to develop and apply ACD measures to effectively mitigate cyber threats and to enhance the levels of cybersecurity readiness focusing on the capability to detect, analyse, and act upon any cyber threats within Malaysia’s cyber defence ecosystem.
According to various reports, more than a third of organisations globally are striving to implement new technologies to support their digital journey, and Malaysia is no different.
Malaysian organisations are groping for the right approaches to cope with a highly sophisticated cybersecurity landscape.
According to IDC’s 2020 Asia/Pacific (excluding Japan) Enterprise Services Sourcing Survey, more than 70% of Malaysian organisations surveyed agree that security is not within their core portfolio, and they would prefer to engage a trusted partner to address their security requirements.
A dynamic technology landscape coupled with rising levels of sophisticated artificial-intelligence (AI) powered cyber threats, exacerbated by a shortage of in-house digital and security skills, points to the power of a collaborative approach to as an essential business strategy.
Partnering with the right vendors, with expertise and solutions that include cybersecurity services, functions, is becoming rapidly established as an ideal business strategy in this new digital era.
An example of ideal benefits and required deliverables can be found within TM ONE’s Cyber Defence Centre (CYDEC).
CYDEC is a fully managed security services that brings multiple benefits including global cyber threat intelligence services to protect brand and reputation, online fraud and business disruptions. TM ONE, the business solutions arm of Telekom Malaysia Berhad (TM) has an extensive and distinguished record as an ideal digital transformative partner and is the only local Cloud Services Provider (CSP) for MyDIGITAL.
With CYDEC, organisations can effortlessly ensure that in-house IT resources can remain focused on business core matters. By leveraging on CYDEC’s pool of security professionals, more time and resources can be allocated to an organisation’s internal team, enabling sustained focus on business-critical areas, such as data security, identity monitoring, and internal threat hunting across systems.
CYDEC’s capability and capacity focuses on a business value approach to eliminate potential risks when implementing security technologies by ensuring that the new tools integrate with the organisation’s existing portfolio; which enhances the internal security team’s efficiency and effectiveness.
Furthermore, CYDEC offers real-time visibility with the Global Cybersecurity Operations Centre (G-CSOC) or a 24/7 monitoring of global Cyber Threat Intelligence (CTI) services with Active Cyber Defence (ACD) capabilities.
For businesses, this means real-time cyber defence services, resulting in valuable time and cost savings, avoiding business disruption, providing peace of mind and regulatory compliance when stopping or mitigating cyber threats.
In today’s new reality, ensuring compliance across the many regulations is an essential journey to becoming a trusted business with essential levels of cyber resilience. Global leaders now use compliance audits to further refine the transformational process, advance technology, and the capabilities of their people.
The Malaysia Digital Economy Blueprint is aimed at accelerating the country’s transformation into a technologically-advanced economy by 2030. TM via TM ONE will continue to support the national digital connectivity (fixed and mobile), as well as the digital infrastructure (cloud, data centre) to ensure that it is secured and protected.
TM ONE CYDEC delivers numerous benefit Malaysian enterprises and public sector institutions in building digital trust and cybersecurity resilience. This is done by managing the key five (5) key areas of risk – cybersecurity, compliance, privacy, ethics and social responsibility. These managed security services provide access to real-time, continuous, predictive cybersecurity, quickly and without complexity.
TM ONE being part of TM Group as the enabler of Digital Malaysia, is here to bridge and balance the need for cybersecurity in order to successfully use cloud services; and to enable organisations to focus on their transformation journey, securely and comfortably.
Digital transformation is not a one-off event or isolated effort. It is an ongoing journey that needs a strong management team and partnerships with a multitude of industry participants to realise its far-reaching benefits.
TM ONE CEO Ahmad Taufek said, “Our role as the enabler Digital Malaysia, we have the capabilities to fully support the enterprise sector. From an infrastructure standpoint, a one-stop centre with our network, software and platform and most importantly full data sovereignty."
“The rapid adoption of technology has brought about new challenges to our business. Pos Malaysia knew it must adapt to digitalisation to remain relevant in the industry and to support the changing trend in customer behaviour, from physically going to retail stores to buying goods online,” said Group Chief Executive Officer, Syed Md Najib.
Digital transformation impacted business operations in many organizations. It has changed the customer experience landscape, replacing traditional processes with automation.
TM ONE’s α Edge Cloud platform, strive to work together towards crafting a more profound, digital future for Malaysia.
The accelerated speed of business digital transformation comes with its accompanying cybersecurity risk and vulnerabilities. It is the responsibility of organisations to protect and safeguard their business, customer data and brand reputation from cyberthreats and cybercriminals.
Help us know you better.
One more quick question.
Don't worry, we hate spam too.