
What Good Cyber Security Looks Like And How To Achieve It
According to The State of Ransomware 2022, Sopho’s annual study of ransomware experiences of IT professionals worldwide, 65% of organisations in Singapore were hit with ransomware in 2021. This caused organisations to forcefully pay an average ransom of $2.2 million last year to get their data back.
The numbers prove the impact of cyber security attacks on organisations in Singapore and the rest of the world. Organisations claim that these threats impacted their ability to operate, with 83% of the victims saying they had completely lost revenue and, in the worst-case scenario, the business. This is because, aside from the horrendous amounts of money involved, they had to wait at least a month to get their data back.
Fortunately, Singaporeans are now making drastic and massive changes to their cyber defences to protect themselves from cyberattacks.
Living in a digital world makes us vulnerable to cyber threats, including phishing, cryptojacking, form jacking, spam, malware, Denial of Service (DoS) attacks, and negative commentary attacks. This is why it is essential to protect yourself with good cyber security.
As the importance of cyber security cannot be emphasised enough, here is what having good cyber security means.
1. Good password selection
The ideal password should be between 8 and 12 characters and include numbers, upper- and lower-case letters, and at least one unique character (i.e., !, ?, <, @, etc.). Remember not to use simple passwords, such as your birthdate, family name, and other pertinent information about yourself. The reason for this is to make it very difficult for other people to guess the passwords.
2. Application security
Protecting software applications from various threats is not only important to companies that develop and sell applications. Any business that keeps essential data in a cloud service, data centre, or computerised system must customise its security settings. In short, cyber security will help ensure that organisations set up multi-factor and administration privilege controls to strengthen their application security and prevent fraudulent activities.
3. Information security
Businesses that collect and store data from clients, vendors, and customers must adhere to information security standards. The Cybersecurity Bill in Singapore states that organisations that own Critical Information Infrastructure (CII), such as government, media, security and emergency services, transport, healthcare, banking and finance, water, and energy sectors, are obliged to proactively protect CII from cyber threats to protect the economy and people’s way of life.
4. Disaster recovery planning
This has two crucial components: 1) preparations to quickly recover after a cyberattack and 2) strategies that prevent a malware infection or breach. These are vital factors that will prevent enterprises from being among the victims of various cyber security threats.
5. Antivirus software
Antivirus software, such as Norton, Symantec, and McAfee, is essential in keeping your system protected at all times. Although many internet providers offer bundled antivirus software with their plans, you want to ensure you get maximum protection. This is why you need to invest in a powerful antivirus program that will keep your data protected from breach.
When it comes to protecting unauthorised access, businesses should also use a USB port blocker with key in Singapore, which serves as a physical barrier to open ports and prevent others from connecting or inserting foreign objects without permission.
Conclusion
In conclusion , no one should remain in the dark about cyber security risks. Organisations that collect and store essential data must proactively do everything they can to always protect their assets and business operations from unauthorised access.
DBR Systems is a trusted provider of physical cyber security products like USB and LAN port blockers in Singapore. We are also a one-stop supplier of printers’ ink and toner cartridges, imaging units, ribbons, UPS, data storage media, and other IT-related peripherals. If you have something you are looking for, feel free to send us an inquiry.