Intelligent CIO APAC Issue 20 | Page 33

EDITOR ’ S QUESTION
JAMES ROSS , ANZ REGIONAL VICE
PRESIDENT OF FORGEROCK

The start of 2022 represents a very different cybersecurity climate to that of even two years ago . As businesses both big and small continue to navigate the new normal , the rise of Digital Transformation heralds a brand new world , characterized by increasing innovation and simultaneously , rising threats .

While some priorities around what is needed to meet customer and business needs will shift , what will always remain is a focus on security for APAC businesses . Organizations will continue to face rising instances of data breaches and cyberattacks , along with the challenges of a hybrid workforce and managing legacy systems . To address this , security must remain a priority for information and technology leaders .
A greater need for a hybrid workforce , mobilized through the use of digital technologies , brings new challenges for businesses . Hybrid workplaces mean an increasing number of access points for malicious actors , contributing to the 56 % of SMBs surveyed by CISCO in Asia Pacific who have experienced rising breaches . With a globally mobile workforce , traditional security systems designed for a static workforce are no longer appropriate to keep sensitive information safe The solution is found in the adoption of digital identity management platforms and Zero Trust architecture which put the user at the center of security . Investing in biometric identification provides a unique form of identity access , putting users at the center of their logins in a way that can ’ t be replicated by malicious actors .
Adopting a Zero Trust architecture also helps restrict access controls to applications , networks , and data by different groups of staff members or external stakeholders . This provides a more comprehensive overview of what data is accessible by whom in the process . The benefit is a comprehensive solution minimizing where points of attack can occur . With a nearly 13 % increase in the volume of cybercrime reported within Australia alone in 2021 , business leaders must continually invest in stronger and more resilient systems . They must also ensure none of the applications or programs they currently use contain any potential vulnerabilities . On-going monitoring is key . Setting procedures in place to constantly monitor and re-evaulate every application and program used will help businesses identify programs no longer in use so they can remove them from their systems . Having these procedures in place will also provide visibility into programs that need regular patching , to minimize instances where malicious actors can use these programs as potential back doors to facilitate cyberattacks .
Finally , APAC organizations are experiencing an increase in the number of ransomware incidents and identity breaches . In Singapore , the rise of the pandemic saw ransomware incidents dominate the cyber landscape , and within Australia , there was a 30 % increase in data breaches compared to 2020 . While greater protections , monitoring and tech stack upgrades can help to mitigate this , investing time in building employee and customer awareness around threat management is equally important .
The 2021 ForgeRock Consumer Identity Breach Report found that passwords and usernames ( often shared across multiple platforms and websites ) resulted in a 450 % increase in cyberattacks . While not an uncommon practice , users fail to recognize the threat behind shared passwords and as a result , the lack of security can result in crippling losses . Updated security policies and practices to encourage the use of login methods that require multi-factor authentication will be crucial to minimizing instances of breaches occurring this way . APAC is facing an increasing number of security threats .
With the way we work , and how we utilize online services constantly shifting , businesses need to ensure cybersecurity is top of mind as they implement new services for customers and employees alike . By getting into the habit of reviewing legacy systems and implementing more secure login methods like multifactor authentications , APAC businesses can help minimize instances of cyberattacks occurring .
www . intelligentcio . com INTELLIGENTCIO APAC 33