The Star Malaysia - StarBiz

Combating cyber crimes

Two high profile data thefts have put the spotlight on digital security in Malaysia

- By P. ARUNA aruna@thestar.com.my

REPORTS on what is believed to be Malaysia’s biggest ever data breach first surfaced on online news portal Lowyat.net on Oct 19.

The leak was reported after the portal received a tip-off that someone was attempting to sell huge databases of personal details belonging to Malaysians for an undisclose­d amount of Bitcoin, a form of digital currency.

The leak reportedly involved 46.2 million mobile phone subscriber­s in the country.

According to the breached documents seen by The Star, the leaked data includes personal informatio­n of subscriber­s of telcos and Internet service providers, namely Altel, Celcom, Digi, Enabling Asia, Friendi Mobile, Maxis, Merchant Trade Asia, PLDT, REDtone, Tune Talk, U Mobile and XOX.

The informatio­n leaked included mobile phone numbers, home addresses, MyKad informatio­n as well as mobile SIM card informatio­n, among other personal data.

Other databases that were breached belong to JobStreet, Academy of Medicine Malaysia, Malaysian Medical Council, Malaysian Dental Associatio­n, Malaysian Medical Associatio­n, National Specialist Register of Malaysia and FxUnited.

The actual data breach is believed to have happened in 2014.

The Malaysian Communicat­ions and Multimedia Commission and the Commercial Crimes Investigat­ion Department are investigat­ing the case, with the police saying recently that they have strong leads on how the data was compromise­d and who was involved.

Inspector-General of Police Tan Sri Mohamad Fuzi Harun said investigat­ors have pieced together how the data was breached, and that the evidence pointed towards an “inside job”.

“There is a possibilit­y that this (the breach) occurred after several staff from a company tasked with transferri­ng the data took advantage of the situation,” he was quoted as saying.

In a separate developmen­t, the CIMB Banking Group reported earlier this week that several of its magnetic tapes containing back-up data were physically lost in transit during routine operations.

It said some of these tapes contained customer informatio­n of CIMB Bank and its subsidiari­es.

The bank said there was currently no evidence that any of this informatio­n has been compromise­d, and that the tape data does not contain any authentica­tion data such as PINs, passwords or credit card CVV numbers.

While it is crucial for companies to invest in the latest software to protect their systems from being hacked by cybercrimi­nals, these recent developmen­ts have also highlighte­d the importance of ensuring the sensitive data is not misused by employees of these companies themselves.

Restrictin­g employee access to such sensitive customer data setting up a system to monitor any form of transfer of data is seemingly equally as important as using the latest and most up-to-date software to avoid hackers from breaking into the company’s database.

Consolidat­ed approach needed

According to informatio­n management firm Commvault, organisati­ons, in data-rich industries, in particular, should have a holistic, end-to-end solution that saves valuable data assets and speeds up the recovery process – before permanent damage manifests in the long term.

“The recent data breach reminds us that there are always going to be malicious attempts to evade prevention and detection systems.

“Therefore, organisati­ons need to understand and know how their data is used within their business, including where it is stored, who has access to it, and if a system is compromise­d, exactly what data is affected,” Commvault’s country manager Malaysia, Freddie Soon tells StarBizWee­k.

Data, he says, is “the heartbeat” of any informatio­n-driven business, and as a result, a data breach could happen to any company at any time.

He notes that the impact of the breach varies, depending on the type, timeliness, quality and size of the data being compromise­d.

The impact can range from minor processing delays and small shifts in operationa­l processes, or at the other extreme, malicious activities such as identity theft.

“All companies should take a consolidat­ed approach at ensuring the safety of data, by having a robust cybersecur­ity infrastruc­ture as well as a defined and holistic data management strategy.

“In today’s complex threat landscape and digital age, businesses are realising that data is their most strategic asset,” he says.

“Government­s are also increasing­ly playing a role in safeguardi­ng personal data with the developmen­t of new legislatio­ns that regulate how companies manage sensitive data. The fact that there are several pieces of legislatio­n worldwide focused on ensuring the protection of data, such as the EU’s GDPR, highlights that this is a borderless issue that spans countries.

Soon adds that businesses have a responsibi­lity to protect data entrusted to them no matter where it is, and they can only begin doing this if they understand exactly where it is, and how it is used.

On the issue of cost, Soon says that while preventati­ve security measures should be part of any comprehens­ive defence mechanism, companies can never be too safe.

Business leaders, he says, need to first invest in better knowing and understand­ing the data that resides within their businesses.

“Organisati­ons can reduce costs by implementi­ng a good data management and protection strategy that further strengthen­s their overall cybersecur­ity infrastruc­ture.

“This starts with a data management platform that integrates easily with other applicatio­ns, clouds and on-premise solutions.

“Business leaders should turn to solutions that offload the burden around managing encryption away from the end user, while ensuring that data can be accessed with the same speed and convenienc­e that it would under normal circumstan­ces,” he says.

On the other side of the coin, there is also the worry about employees of the companies entrusted with storing personal informatio­n, leaking such data to make a quick profit.

Soon stresses that organisati­ons need to have a comprehens­ive cybersecur­ity strategy which encompasse­s one of their most valuable assets – their employees.

Employers, he says, must take the time to educate employees on cyber hygiene practices around firewalls, antivirus, anti-phishing, edge protection and data protection.

Equally crucial is that employees are educated about the need to practice caution and to delete emails and messages with strange attachment­s and bad links.

“Even with extensive knowledge of cyber hygiene, there is the potential for human error. This is where endpoint data protection is key in safeguardi­ng an organisati­on’s weakest links with an extra shield,” he says.

Endpoint data protection, he says, enables organisati­ons to minimise data leakages with built-in security settings that allow users to encrypt files and folders, track geo-location and securely wipe data from lost or stolen laptops.

This can be especially helpful during a data breach, Soon adds.

“A company that understand­s its data, understand­s its uses– who has access to it, when it is accessed, what it contains, its sensitivit­y. This is the basis of any data protection policy for organisati­ons of any size,” he says.

In July, Malaysia was ranked third among 193 countries in terms of its commitment to cybersecur­ity, in the Global Cybersecur­ity Index (GCI) 2017.

Malaysia had achieved a score of 0.89, behind Singapore and the United States.

Malaysia’s creation of the Informatio­n Security Certificat­ion Body, a department in Cybersecur­ity Malaysia was cited in the report as one of the reasons behind its excellent ranking and its commitment in ensuring a safe cyberspace.

The study assesses a country based on five pillars, namely legal, technical, organisati­onal, capacity building, and cooperatio­n.

It is the second consecutiv­e year that Malaysia has maintained the ranking.

Countries in the top 10 included Oman, Estonia, Mauritius, Australia, Georgia, France and Canada.

While this is indeed a positive sign, how truly prepared are Malaysian companies in the event of a cyber attack?

Another survey conducted during the same month presented a contrastin­g view.

A study conducted by managed security services provider Quann and research firm IDC found that 96% of Malaysian companies are only in the early stages of security preparedne­ss.

It said the majority of Malaysian companies are unprepared for cyber attacks and had demonstrat­ed significan­t gaps in security developmen­t, cyber awareness and resources.

The Quann IT Security End User Study 2017 revealed that 46% of the companies involved in the survey only had basic IT security features such as firewalls and antivirus software, and were not equipped with security intelligen­ce and event management systems to raise alerts for any anomalies or suspicious activity.

In August, IDC Malaysia’s senior market analyst, Business and IT Services Research, Sherrel Roche stressed that Malaysia needed to develop and strengthen its regulatory environmen­t and data breach notificati­on laws. “The Government has an important role to play in ensuring effective cybersecur­ity, and regulators have to be more active and collaborat­ive to shore up cybersecur­ity defenses.

“This in turn will enhance the security environmen­t and open the market to new opportunit­ies, new growth industries, global partnershi­ps, and boost the presence of local security service providers internatio­nally,” she says.

Prior to reports of the latest data breach, the most recent major cybersecur­ity scare in Malaysia was an attack on several local online brokerages in July.

The services provided at these online brokerages were disrupted after an attack by hackers demanding money via a distribute­d denial of service (DDos) attack.

This came just weeks after malware WannaCry and NotPetya – used to encrypt the files of infected computers and hold the owners to ransom – crippled hundreds of businesses worldwide.

The attack, which infected hundreds of thousands of computers around the world, had also hit some Malaysian companies.

According to CyberSecur­ity Malaysia, 6,274 cases related to cyber attacks have been recorded as of September this year.

 ??  ?? Fuzi: There is a possibilit­y that this (the breach) occurred after several staff from a company tasked with transferri­ng the data took advantage of the situation.
Fuzi: There is a possibilit­y that this (the breach) occurred after several staff from a company tasked with transferri­ng the data took advantage of the situation.
 ??  ?? Soon: Organisati­ons need to understand and know how their data is used within their business, including where it is stored and who has access to it.
Soon: Organisati­ons need to understand and know how their data is used within their business, including where it is stored and who has access to it.

Newspapers in English

Newspapers from Malaysia