MALAYSIAN TECHNOLOGY STRATEGIC OUTLOOK 2019/2020

INFRASTRUCTURE

Digital technology has revolutionised information delivery in our world today. However, it also comes with its vulnerabilities spanning from cyber security threats like data security, attack to critical infrastructures, cyber espionage, hacktivism, terrorist use of Internet and cyber-crime. Cyber threats refer to threats arising from the internet or networks using data communication pathways that affect the confidentiality, integrity and availability of information systems. This can happen within an organisation as well as remotely and may threaten national security. With the advent of digital technology, more data and information are being fluidly transacted online and inter borders. However, with many security breaches now well publicised by the media, people are increasingly becoming aware about data security and have looming privacy concerns about what is being stored and processed, and by whom. In response, policymakers around the globe aremodernising data protection laws for today’s fast-paced, digital environment— starting with the EU’s General Data Protection Regulation (GDPR), which came into effect in May 2018. Privacy concerns are much farther reaching than in the past, ranging from poor actors to authorised users. Even the latter may be in violation when the original intent of collecting, processing, transferring, or storing personal data changes. Protecting personal data extends far beyond setting up basic internal security controls today. Digital security continues to rise in importance as business and daily life are increasingly digitised. Many businesses are increasing their security investments or elevating their security focus, but these actions often follow a defensive approach that utilises technology tools including firewalls and antivirus. More and more, firms

will realise they must be proactive in probing for weaknesses or detecting possible breaches. This will involve new skills like penetration testing, vulnerability assessment and security analytics. Beyond the technical aspects, organisations will also begin building business processes that enhance security, and they will implement end user training mitigating human error. There is no doubt that companies are taking security more seriously, but now they must realise that modern security demands a different mentality rather than merely more of the same. In a nutshell, effective and robust data security requires an information security management system built on three pillars, namely people, process and technology.

THE SURVEY

Among the industry’s concern is data privacy, with 17% expressing a high or moderate concern about the issue. Despite the dangers, more than half of respondents are very confident about their organization’s ability to detect a data breach. 17% high or moderate concern

17

Malaysian Technology Strategic Outlook 2019/2020 Intergration of High Technology

Made with FlippingBook. PDF to flipbook with ease