Share This

Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday 19 July 2023

‘Focus on long-term gains’: benefits of pursuing tertiary studies far outweigh upsides of being a gig worker

 

Brighter future: Numerous studies suggest that college life most often leads to more holistic individuals. – 123rf.com

 

Benefits of pursuing tertiary studies far outweigh upsides of being a gig worker

THE last couple of weeks had been a rather busy period for many universities and colleges which had their open days where they showcased their courses.

While most education fairs witnessed a fair share of visitors, the decline in the number of students completing their Sijil Pelajaran Malaysia (SPM), and the issues surrounding this, has caught the media’s attention.

In 2022, for instance, 3.8% or 14,858 of first-time SPM candidates were absent for at least six subjects. In 2021, the figure was close to 10,700 students.

In another report, a staggering 72.1% of SPM graduates surveyed revealed that they had no intention of pursuing a higher qualification. The same report also purported that Malaysia is not alone in witnessing this trend. In the United Kingdom, for example, only a third of school-leavers feel that obtaining a university qualification is vital.

Naturally, the following questions warrant answers: Why aren’t all qualified school-leavers excited to continue their studies? Where are they in the economy if they do not? Is obtaining a higher education qualification still vital given the massive role technology plays in our lives?

Reports by various commentators suggest that three possible reasons explain this trend.

Firstly, this may have to do with the prevalence and growth of the gig economy. Malaysia Digital Economy Corporation (MDEC), in a published report, projected that the Malaysian gig economy would grow to a minimum of RM650mil in 2025, largely due to the growth and development of local platforms.

The growth in the gig sector seems to be in tandem with the number of school-leavers in search of gig jobs.

Research suggests that gig workers can earn anything between RM2,500 and RM5,000 per month, with some claiming to even exceed RM6,000 per month.

One could argue that gig jobs seem more lucrative relative to the median salary of RM2,062 as per the Department of Statistics Malaysia (DOSM) reports in 2020.

In essence, the allure of gig money seems to be driving segments of school-leavers away from pursuing higher education.

The temptation of becoming a professional social media influencer could be another factor.

The ubiquitous nature of the Internet, coupled with the ease of using social media platforms to create content, is seen by some to be an alternative to higher education.

A third reason could be the belief that a higher education qualification may not necessarily guarantee better employment prospects.

While these are fair and logical arguments, there are many points in favour of having a higher education qualification. Let’s examine some of them.

Issues with gig jobs 

A gig worker is someone who works based on freelance contracts, usually short-term, in contrast to a longer-term fixed-salary position with an organisation.

Various industries hire gig workers, and these include the information technology, administrative, and creative sectors.

However, close to 72% of surveyed SPM school-leavers in Malaysia expressed interest to work in either the e-hailing or social media influencer sector of the gig economy.

The short-term benefits of working in such positions in the gig sector include flexible work hours, a low level of commitment expected from employers, and opportunities for working anywhere, anytime.

However, the main challenge of gig workers, particularly in the e-hailing sector, is the lack of a safety net. Typically, gig workers are not entitled to perks such as healthcare and retirement benefits.

In Singapore, Grab recently announced laying off 1,000 employees to remain competitive.

When companies in the gig sector decide to slash payrolls, gig workers are often to be first at risk.

In sum, while the allure of short-term gain is there, securing long-term and more sustainable employment, with a better safety net, may require higher education qualification.

Personal development

Numerous studies suggest that college life most often leads to more holistic individuals.

According to a recent study by the Utah State University in the United States, the major benefits of a college education include producing individuals who are more mature, confident and have a stronger sense of self.

This report also suggests that individuals with higher qualifications tend to have higher ethical and moral standards.

A three-to-four-year college process and activities allow individuals to work in teams and with people from different cultural backgrounds, thus allowing them to make more balanced, reasoned, and generally unbiased judgements.

Some studies also state that a college education often leads to individuals who are more disciplined and professional in nature.

Networking opportunities

Larry Page and Sergey Brin, the founders of Google, met while pursuing a doctoral degree in computer science at Stanford University in the US.

A major benefit of pursuing tertiary education in this context is the vast networking opportunities that it offers.

Many successful companies have been founded based on the strong bond individuals built and developed as they ventured on the college journey together.

Although there are successful entrepreneurs who never finished college, the numbers who do, and start something after that, are significant.

Simply put, higher education is not about the pursuit of knowledge alone, but should be viewed through the lens of opportunities that it has to offer by connecting people. This is something that short-term monetary gains can never buy!

Keeping it relevant

To ensure young adults are lured into the mainstream higher education pathway, colleges and universities have a major role to play.

Firstly, these institutions must ensure that the programmes they offer are in line with what industries require.

Stated differently, the onus is on these institutions to produce highly employable graduates. This means continuous improvement to the curriculum, and taking input from industry players, is a must across all disciplines.

Programmes related to computing, technology, and engineering must be developed with future industry trends in mind. For example, in the tech sector, jobs such as prompt engineers, full-stack developers, blockchain developers, and cybersecurity experts are set to command higher salaries.

Institutions that offer such programmes will be sought after and thus remain relevant in the long run – and perhaps attract teenagers who may otherwise opt out and become part of the gig sector.

My son, a budding musician who wants to make it big and seek a career in the digital music industry, assured me that despite his deep interest in music, he will pursue a college degree as a backup. For a conservative and somewhat traditional family, this is reassuring indeed.

One may play a part in the gig sector. Nevertheless, do consider the long-term benefits of having a higher education qualification. Just in case.

Prof Dr Murali Raman is the deputy vice-chancellor (Academic Development & Strategy) overseeing postgraduate and continuous education at Asia Pacific University of Technology & Innovation (APU). Focused on executive training and consultancy, his niche training areas include design thinking, coloured brain communication and emotional drivers, digital economy, crafting digital strategies, and mindset change. The views expressed here are the writer’s own. 

 Source link

 

Related:

Protection, aid for gig workers

 

Gig economy commission to improve welfare of workers ...


In support for better protection for Gig workers

The gig economy has experienced rapid growth in Malaysia, becoming a significant source of income for numerous Malaysians. - NSTP/L.MANIMARAN

 https://www.nst.com.my/opinion/letters/2023/06/922968/support-better-protection-gig-workers

Wednesday 28 June 2023

Banks to delay fund transfers in latest move to fight fraud

PUTTING THE HEAT ON SCAMMERS

 PETALING JAYA: In its latest move to fight scammers, the banking industry has introduced several safety measures including delaying the movement of “abnormal” funds by 12 hours.

Public Bank introduced the half-day cooling-off transfer period, which would allow people who have been scammed to stop their funds from being moved out. The new policy came into effect from yesterday.

In a statement to customers, it said it was introducing the transaction cooling-off period for abnormal transfers.

A cooling-off period is a precautionary measure that allows banks to review and assess transactions that display “characteristics of abnormal behaviour.”

This additional step was proposed by Bank Negara Malaysia and is designed to minimise the risk of unauthorised transactions and potential fraudulent activities, ensuring the safety of customers’ funds.

“As an added security feature to protect your financial interests, the bank will be introducing a transaction cooling-off period for abnormal transfers with effect from June 22, 2023,” Public Bank said in its statement.

It explained that when the bank detects a transaction deemed to be abnormal, the transaction will be put on hold.

“The bank will notify you of the status of your transaction via SMS, email and push notification.

“Alternatively, you may track your transactions by logging into PBe, clicking ‘Account’ and selecting ‘View Pending Verification’. Any transaction that is undergoing the transaction cooling-off period will be listed here.”

On June 11, in an email reply to The Star, Bank Negara said it would be up to banks to implement cooling-off periods of between 12 and 48 hours.

Meanwhile, Bank Islam Malaysia Bhd has also executed a cooling-off period – a 12-hour waiting interval for any new application or request made on its IB, GO and GO Biz banking apps this week.

It also introduced a new “kill switch” feature allowing customers to protect their funds from online scams and temporarily deactivate access to several Bank Islam Internet banking services.

Last year, Bank Negara announced several measures for banks to implement, including migrating from SMS OTP to more secure forms of authentication, implementing a cooling-off period for first-time enrolment of online banking services and limiting the number of registered devices for authenticating transactions.

It also wanted banks to establish dedicated scam hotlines for victims and to have a “kill switch” for victims to freeze their accounts temporarily to stop the loss of funds.

“In addition, public awareness remains important in preventing online banking fraud,” said Bank Negara.

On May 2, in The Star’s front-page report titled “Fighting chance to beat scammers”, cybersecurity law expert and lawyer Derek John Fernandez mooted the idea of adopting a 48-hour “cooling period” when funds above a certain threshold are transferred to new bank accounts.

This, he said, would give scam victims time to pull their money back from the brink.

Fernandez said that was one way to stop financial scams as victims usually realise they have been scammed after 24 hours.

He had proposed the 48-hour cooling-off period to the government, including Bank Negara and the Malaysia Communication and Multimedia Commission (MCMC).

“During the cooling-off period, if the new bank account seems suspicious or if the bank receives complaints, the accounts can be tracked down by MCMC and action taken.

“If consumers suspect they have been scammed, they can cancel immediately. MCMC can then publish these account numbers to its website to alert others,” Fernandez said in his proposal.

On May 12, MCMC chairman Tan Sri Mohamad Salim Fateh Din said that RM1.2bil was lost to scammers between 2021 and April 2023. 

Source link

 

Dangerous deepfakes 

 

CLICK TO ENLARGECLICK TO ENLARGE

 PPETALING JAYA: Deepfake technology, which uses artificial intelligence to manipulate videos, has become a tool for scammers.

The celebrity promoting a product may not really be that person. Instead, it could be scammers posing as the celebrity.

Celebrity impostor scams are fake posts using photographs and artificial intelligence (AI) videos of famous people on social media accounts to lure people into making financial investments or buy products.

ALSO READ : Enough warnings given

These days, Facebook, Twitter and Instagram are filled with such fake celebrity accounts set up to deceive devoted fans.

Scammers con the real star’s followers into making donations to charity, buying exclusive tickets or entering into investment deals which will definitely be profitable or a fee to win big prizes.

Cyberlaw expert Derek Fernandez said the scammers now were very clever, pointing out a recent case in China where the latest technology – the new AI face-changing app – was used to defraud the head of a company of 4.3 million yuan (RM2.8mil) in just 10 minutes.

Local scammers are not far behind, he said, as local celebrities and famous people like politicians seem to be popping up on social media accounts urging one to invest or buy currencies.

“Celebrity impostor scammers can be charged under Section 233 of the Communications and Multimedia Act 1988 (Act 588),” said Fernandez.

The Malaysian Communications and Multimedia Commission (MCMC) could even haul up internet service providers (ISPs) and their directors for misuse of their network by scammers.

The MCMC, in a statement, said it was urging all over-the-top (OTT) platforms, like YouTube and Netflix, to cooperate in this regard.

“MCMC will be reminding internet service providers (ISPs) regarding their legal obligations under Section 263 of the Communications and Multimedia Act 1998 (Act 588).

“ISPs are required to use their best endeavour to prevent their network facilities from being used for any illegal activities in Malaysia.

“This includes improving their detection, identification and elimination of scam sites and contents, and cooperating with MCMC in combating such illegal activities.

“MCMC takes a firm stance against any form of scamming and fraud,” it said.

Fernandez said that Section 233 criminalises online content that is obscene, indecent, false, menacing or offensive in character with intent to annoy, abuse, threaten or harass another person.

If convicted, an offender could be fined not more than RM50,000 or imprisonment for up to one year or both.

He also said that, depending on the case details, celebrity impostor scammers can be charged under the Penal Code. 

Source link


Wednesday 15 March 2023

Know how this vital law protects you from fraud

 

Photo: 123rf.com

CONSUMER protection laws are designed to safeguard consumers and ensure they are not subjected to fraudulent or unethical practices by businesses. One such law in Malaysia is the Financial Consumer Services Act 2013, which aims to protect consumers from unfair or deceptive practices by financial institutions.

One issue that has received increased attention in recent years is “mis-selling” by banks selling investment products to its depositors. Mis-selling refers to the practice of selling financial products to consumers that are not suitable for their needs or financial situation, which can often result in significant financial losses.

Banks have been known to engage in mis-selling by aggressively pushing investment products such as mutual funds, stocks, and insurance policies to their depositors without adequately disclosing the risks involved.

The Financial Consumer Services Act (FCSA) seeks to address this issue by imposing strict requirements on financial institutions to ensure that they act in the best interests of their clients.

FCSA requires financial institutions to disclose information about their products and services in a clear and concise manner, to ensure that consumers can make informed decisions.

It also provides for the establishment of a dispute resolution mechanism to enable consumers to seek redress for grievances.

In addition, the Act requires financial institutions to obtain sufficient information about their clients’ financial situation and investment goals before recommending any investment product.

This is particularly important if customers do not have the same level of knowledge or experience as more seasoned investors.

The Act also provides consumers with greater protection in the event of a dispute. It establishes an independent dispute resolution mechanism that is fair and impartial to resolve complaints and disputes between consumers and financial institutions.

In addition to this, the FCSA provides for compensation for consumers who have suffered losses as a result of mis-selling. Financial institutions are required to establish complaint handling procedures that enable consumers to make complaints and seek redress. These procedures must be transparent and accessible, and financial institutions must take reasonable steps to resolve complaints in a timely and efficient manner.

The FCSA also provides for enforcement measures to be taken against financial institutions that engage in unfair and deceptive practices. This includes fines, penalties, and other sanctions that may be imposed by the regulator.

These measures are designed to deter financial institutions from engaging in practices that are harmful to consumers.

It is important to note, however, that consumer protection laws are only effective when they are enforced. Financial institutions that engage in mis-selling must be held accountable for their actions, and consumers must be empowered to seek redress when they are harmed. This requires a strong and effective regulatory framework, as well as consumer education and advocacy to ensure that consumers are aware of their rights and able to protect themselves.

The FCSA is an important piece of legislation that plays a vital role in protecting consumers in the financial sector.

It provides consumers with greater transparency and clarity in financial transactions, and ensures that they are not subject to unfair and deceptive practices.

The provisions of the Act relating to the mis-selling of investment products by banks are particularly important, as this is a problem that has affected many consumers in the past.

With the FCSA in place, consumers can have greater confidence in the financial sector and can be assured that their rights and interests are being protected.

- PROF DR ONG TZE SAN School of Business and Economics Universiti Putra Malaysia 

Source link

 

Financial Services Act 2013 - Bank Negara Malaysia

 


https://www.bnm.gov.my/documents/20124/820862/Financial+Services+Act+2013.pdf

 

Related posts:

 

Investors duped by fake mutual funds firm lose almost everything  

  The Star on Twitter: "Investors duped by fake mutual funds firm ... KUALA LUMPUR: She wanted to grow her retirement nest, so she p...

 

 

How Fake News Shapes World Order: Atrocity Fabrication and its Consequences

 

Atrocity fabrication – the invention and reporting of atrocities committed by an adversary without knowledge that they ever occurred – ha...

 

 

 

Taiwan telecom fraud suspects repatriated

 from Malaysia and Kenya

Thursday 23 February 2023

World peace a top priority

 Core concepts and principles of the Global Security Initiative Concept Paper

Graphic: Deng Zijun/GT

China released "The Global Security Initiative Concept Paper" on Tue, elaborating ideas and principles, clarifying cooperation mechanisms and underscoring China's responsibilities and firm determination to safeguard world peace. 

 

 China issued a Global Security Initiative Concept Paper on Tuesday, elaborating on innovative core concept and principles, firmly supporting a UN-led governance structure and the UN's role in preventing war and forming peace: Chinese Foreign Minister Qin Gang

 China is ready to engage in bilateral and multilateral security cooperation with all countries, firmly upholding the consensus that "nuclear war cannot be won and must never fought" while rejecting an arms race and promoting the political settlement of hot spot issues: Qin 

 China will continue playing a constructive role in pushing forward dialogue and negotiation on the Ukraine crisis. We urge relevant countries to stop fanning the flames of war and provoking the claim that "today's Ukraine is tomorrow's Taiwan": Chinese Foreign Minister


BEIJING: China has issued a landmark document to explain in detail its proposed Global Security Initiative, a move diplomats and experts say will help the world better understand China’s approach to building world peace through coordinated efforts between countries.

“The Global Security Initiative Concept Paper” was released on Tuesday at a Lanting Forum event hosted by the Foreign Ministry in Beijing.

The initiative was proposed by President Xi Jinping in April last year. Currently, over 80 countries and regional organisations have endorsed or supported the initiative, Foreign Ministry spokesman Wang Wenbin said on Tuesday.

The paper elaborated on Beijing’s holistic thinking on the initiative’s background, core beliefs and principles and priorities for cooperation as well as platforms and mechanisms to serve such collaboration.

The paper called on nations to stay committed to the vision of “common, comprehensive, cooperative and sustainable security” and “take the legitimate security concerns of all countries seriously”.

Among detailed areas for greater coordinated work are preventing a nuclear war and “promoting political settlement of international and regional hotspot issues”.

China also vowed to hold high-level conferences on the initiative to strengthen policy communication and promote intergovernmental dialogue and cooperation.

Foreign Minister Qin Gang said while addressing the forum that “security should not be monopolised by certain countries”, as it is a legitimate right of all countries.

China has always been committed to promoting peace and dialogue, Qin said, adding that the paper demonstrates China’s sense of responsibility for safeguarding world peace and defending global security.He said outside attempts to suppress and coerce China have been stepped up, posing a serious threat to its sovereignty and security.

“China is a major country and its development will not be achieved without a secure international circumstance. Likewise, the world will not enjoy security without China’s security,” he said.

Siyabonga Cwele, South Africa’s ambassador to China, said what impressed him most in the paper was that China, as a big country, was still committed to not becoming hegemonic or bullying others.

“We hope all developed countries can follow that path of not using their economic or military strength to coerce others, but working with others for common prosperity for all,” he said. — China Daily/ANN 

Source link

Paper details way to achieve world peace - Chinadaily.com.cn

Paper details way to achieve world peace

By ZHANG YUNBI | chinadaily.com.cn | Updated: 2023-02-21 23:42
Foreign Minister Qin Gang addresses the Lanting Forum on Tuesday in Beijing. [Photo by Wang Zhuangfei/ China Daily]

Professor Richard Wolff: Dangerous Motives Behind US Aggression Toward Russia and China


 

 Professor Richard Wolff joins Julianna Forlano to discuss the danger to world peace posed by Biden's recent aggressive rhetoric toward Russia and China. He also unveils the true economic reasons for the attacks. Another must-watch interview. 

Professor Wolff is an American Economist, known for his work on economic methodology and class analysis. He is Professor Emeritus of Economics at the University of Massachusetts Amherst, and currently a Visiting Professor in the Graduate Program in International Affairs of the New School University in New York. Wolff has also taught economics at Yale University, City University of New York, University of Utah, University of Paris I (Sorbonne), and The Brecht Forum in New York City. 

For info on Richard Wolff go to: https://www.rdwolff.com/ 

And make sure to follow him on Twitter at: https://twitter.com/profwolff For more Julianna, follow her on Twitter at https://twitter.com

/juliannaforlano and @juliannaforlano on Instagram and Facebook!

 ——— 

act.tv is a progressive media company specializing in next generation live streaming and digital strategy. Our YouTube channel focuses on animated explainers, livestreams from protests around the country, and original political commentary. Main site: http://act.tv Facebook: http://facebook.com/actdottv Twitter: http://www.twitter.com/actdottv Instagram: http://www.instagram.com/actdottv YouTube:    / actdottv   Twitch: https://www.twitch.tv/actdottv @actdottv #DoMoreThanWatch

 

China urges Russia-Ukraine ceasefire, offers path to peace in position paper, shows sincerity in global governance

On the one-year anniversary of the Russia-Ukraine military conflict, China restated its calls for political settlement of the Ukraine crisis with more specific plans that accommodate the concerns of both Russia and Ukraine, in a neutral and consistent manner.

Absurdity behind ruthless wars

One year since the Ukraine crisis, it is worth looking into how the US kidnapped war with stories, used “hegemonic ...

 

 
Time will prove the enormous value of China's position paper: Global Times editorial

What this document shows is China's sincerity and goodwill in actively promoting peace talks.

Wednesday 22 February 2023

How to prepare for cyber risks


Minimising the chances of attacks Cyber threats are evolving and escalating at an alarming rate for asset-intensive industries such as the energy sector.

ARE organisations only concerned with undertaking the right measures to mitigate cyber risk after they have been cyberattacked?

This may be the case in most situations but the more important question to ask is – what are the cybersecurity controls that should be considered by organisations?

The answer is straightforward – the controls that have the biggest impact on reducing the likelihood or the impact of a successful cyberattack.

Cyber risk is generally defined as the threat to the system, the system’s vulnerability and the resulting consequences. 

Therefore, to successfully protect information technology (IT) and operational technology (OT) systems, companies must understand the tactics, techniques and procedures (TTPS), which threat actors use to achieve their desired objective.

Here are several examples of well documented cyberattacks on critical national infrastructure over the past two decades:

In 2010, arguably, the most sophisticated cyberattack was executed on an Iranian uranium enrichment facility that exposed the weakness of cybersecurity controls and vulnerability of OT environments.

The STUXNET worm was designed specifically to target these environments which allowed the threat actor to exploit and disrupt production operations causing downtime and business impact.

STUXNET was the eureka moment for the energy and manufacturing industries that OT environments can be breached and what impact it can have on their business, human lives, environment and economies.

Unfortunately, it was also an eureka moment for threat actors too. OT cyberattacks surged rapidly and suddenly the attack techniques from threat actors, in terms of creativity and smartness of achieving their malicious objectives, evolved since then.

In 2015, Ukraine was hit by another massive cyberattack that shut off power at 30 substations and left millions of people without electricity for up to six hours. SCADA equipment was rendered inoperable and power restoration had to be completed manually, which further delayed restoration efforts.

So how was this achieved – must have been very sophisticated? Actually, not.

Spear phishing was used to introduce the Blackenergy malware that exploited the macros in excel-based documents on computer systems at the plants. Meaning that the threat actors did nothing different than using known TTPS for cyberattacks on IT environments.

The same exploitation tools were used to find user credentials to escalate their privileges to move laterally in the network or to send malicious commands to disrupt plant operations.

The 2015 cyberattack seemed like an experiment as barely a year later the Ukraine Power Grid was attacked again and this time the capital city Kiev went dark, breakers tripped in a large number of substations.

However, this time the threat actors also jammed the utility’s call centres to prevent customers from reporting the outage by launching Telephone Denial of Service (TDOS) attack.

The approach was more sophisticated as the threat actors directly manipulated the SCADA systems using CRASHOVERRIDE – the first known malware specifically designed to target the power grids directly around the globe with the ability to wipe or delete files, disable processes like malware protection and even the software from OT vendors.

This was another eureka moment – national power grids are not safe from threat actors either.

One of the most concerning cyberattacks was in 2017 where the TRITON malware targeted the specific safety critical Programable Logic Controller’s (PLCS) in the Middle East. The function of these PLCS is to protect plants and people from disasters caused by mechanical failure.

In 2018, advanced persistent threat attacks on industrial environments continued to rise, and industrial espionage increased.

After 2019, there was a drastic increase in ransomware activities in OT environments including the manufacturing, water treatment and pipeline industries.

Recently, Cybersecurity and Infrastructure Security Agency launched the Cross-sector Cybersecurity Performance Goals as a prioritised subset of IT and OT cybersecurity practices, aimed at meaningfully reducing risks to critical national infrastructures and the community it supports.

These cybersecurity controls are not meant to be the only considerations for organisations. The purpose is to form the foundation to protect IT and OT infrastructures against cyberattacks as part of the defence-in-depth cybersecurity strategy.

These are some of the logical first steps to consider:

User account security

User accounts are generally one of the first gateways for threat actors to gain access to the network to establish a foothold and move laterally. On the surface, this may seem simple but maintaining user account security hygiene has been a long-standing challenge for many organisations.

Here are the suggested foundational controls that should be considered:

> enable the detection of unsuccessful user login attempts

> change all default passwords and implement multi-factor authentication

> update the minimum password strength > separate user and privilege accounts > enforce unique user credentials (not just email addresses as commonly used)

> revoke the credentials of departing employees.

Device security

Device security are measures taken to secure computing devices (hardware and software) from cyber threats but also to maintain service continuity.

Here are the suggested foundational controls that should be considered:

> approval process for new hardware and software deployment

> the disablement of macros by default > maintaining an up-to-date asset inventory

> prohibiting the connection of unauthorised devices

> documenting device configurations.

Data security

The purpose is to protect sensitive and confidential data from unauthorised access, theft, loss and destruction.

Here are the suggested foundational controls that should be considered:

> strong and agile encryption

> enable log collection

> secure storage of the said logs.

Governance and training

A strong governance structure is a key success factor for any cybersecurity strategy and operations to manage cyber risks effectively and to ensure adequate protection of data and systems.

Here are the suggested foundational controls that should be considered:

> appointment and empowerment of a single leader to be accountable for cybersecurity

> a single leader to be responsible for Ot-specific cybersecurity

> basic cybersecurity training for all employees and third parties

> OT specific cybersecurity training for OT managers and operators

> establish an effective relationship between IT and OT cybersecurity to improve the response effectiveness for OT cyber incidents.

Vulnerability management

To reduce the likelihood of threat actors exploiting known vulnerabilities in IT and OT systems, the following foundational controls should be considered:

> mitigate known vulnerabilities

> gather vulnerability intelligence by security researchers and enable the researchers to submit discovered weaknesses or vulnerabilities faster

> blacklisting of exploitable services on the Internet

> limit OT connections to public Internet > conduct third-party validation of control effectiveness.

Supply chain/third party

To ensure the integrity and reliability of supplier products and services the following foundational controls should be considered:

> establish supplier cybersecurity requirements

> immediate disclosure of known cybersecurity incidents and vulnerabilities to enable rapid response.

Detection, response and recovery

Here are the suggested foundational controls that should be considered:

> capability to detect relevant threats and TTPS

> a comprehensive response and recovery plan (including appropriate back-ups) in place helps organisations be prepared for the inevitable security incidents that will occur and ensures that they have the processes and resources in place to minimise the impact and recover effectively.

Network segmentation

Network segmentation reduces the likelihood of threat actors accessing the OT network after compromising the IT network and vice versa.

Here are the suggested foundational controls that should be considered:

> segment IT and OT networks

> segment safety critical systems form other systems

> segmentation of temporarily connected devices

> segmentation of wireless communications

> segmentation of devices connected via untrusted networks/internet.

Email security

By implementing effective email security measures, organisations can reduce the risks from common email-based threats and ensure the confidentiality and integrity of email communications.

Here are the suggested foundational controls that should be considered:

> Email encryption

> Email account authentication

> and email filtering.

In conclusion, cyber threats are evolving and escalating at an alarming rate for asset-intensive industries such as the energy sector.

Strengthening the cybersecurity foundations are imperative to build a defence-indepth model that would reduce the chances of cyberattacks and safeguard IT and OT environments.

By JACO BENADIE Jaco Benadie is partner, Ernst & Young Consulting Sdn Bhd. The views expressed here are the writer’s own. 

Source link

 

Related:

 

Exclusive: Hacker group with members from Europe, North America found to have launched cyberattacks against China

Chinese cybersecurity experts have exposed a hacker group, with its core members coming from Europe and North America, which has been launching sustained cyberattacks against China as its primary target, posing a serious threat to the country's cybersecurity and data security, the Global Times learned from a Beijing-based cybersecurity lab on Sunday. 

 

 

Related posts:

 

THE FIGHT AGAINST CYBERCRIME IN FINANCIAL SERVICES

China captures powerful US NSA cyberspy tool

 

Monday 7 November 2022

China's cyberspace whitepaper highlights cooperation, 'fundamentally different' from US' proposition

 

 cyberspace Photo:VCG 

China's State Council Information Office issued a white paper titled "Jointly Build a Community with a Shared Future in Cyberspace," which is fundamentally different from the US' earlier release "Declaration for the Future of the Internet," as China advocates that cyberspace is the common home of humankind instead of creating division and confrontation by ideology.

The Office released the white paper during a news conference on Monday morning in Beijing, which introduces the achievements of China's Internet development and governance practices over the past decade and puts forward the Chinese proposition of building a community with a shared future in cyberspace.

As problems of unbalanced development, unsound rules and unreasonable order in the cyberspace are becoming increasingly prominent and cyber hegemony poses a new threat to world peace and development, effective solutions and joint efforts are needed to address the problems, officials said.

China's white paper is fundamentally different from the US and its partners' joint release "Declaration for the Future of the Internet," said Qi Xiaoxia, director general of the Bureau of International Cooperation of the Cyberspace Administration during Monday's news conference.

The "Declaration for the Future of the Internet" attempts to impose its own standards on others, draw ideological lines in the cyberspace, draw "small circles," create division and confrontation and violate international rules, Qi said. These actions have seriously undermined the unity of the internet family and affected the stable development of the global internet.

In the US' vision, it has abandoned multilateral platforms such as the UN and is keen to form various exclusive cliques instead, in an attempt to draw ideological lines and undermine the global rules of Internet governance by touting its unilaterally-defined principles, trying to create an exclusive bloc in the name of democracy, Chinese Foreign Ministry spokesperson Zhao Lijian said in May.

Instead, China advocates openness, cooperation, tolerance and mutual understanding, he said.

"We believe that cyberspace is the common home of humankind, and that the future of cyberspace should be in the hands of all countries in the world, not by a single country or a few countries."

China advocates that the UN play the role of the main channel in the international governance of cyberspace, and that the international community adhere to the principles of common consultation, construction and sharing, strengthen cooperation and jointly develop international rules for cyberspace, Qi said.

China is willing to deepen cooperation with countries around the world, promote the reform and construction of the global internet governance system, she said.

However, contrary to China's vision of mutual benefit, there are many restrictions on the development of Chinese companies in some countries while they are actively exploring the international market.

"Chinese enterprises have carried out international research and development cooperation, and provided a large number of safe, reliable, high-quality and inexpensive products and services to the world, which are widely welcomed," Qi said.

"Chinese enterprises have actively fulfilled their corporate social responsibility and provided a large number of employment opportunities for the countries and regions where they operate."

Qi pointed out that the reason is clear for the development restrictions of some Chinese enterprises including Huawei in overseas market.

"On the pretext of 'national security,' certain countries have abused export control measures to maliciously block and suppress Chinese enterprises, which undermines the legitimate rights and interests of Chinese enterprises and causes serious disruptions to the stability of the global industrial supply chain," she said.

The Chinese government opposes politicization of technical issues and abuse of state power to suppress and curb other countries' enterprises by any means in violation of market economy principles and international economic and trade rules, said the white paper.

Besides, Qi denied that China's cybersecurity build-up would affect foreign companies' operations in China.

"Such worries are totally unnecessary," Qi said, responding to a question raised by a foreign reporter. "What is foreseeable is that China's open door will only get wider."

Data show that the number of foreign-funded enterprises in China has exceeded 1 million, which shows that foreign enterprises are very confident in China's business environment. The Chinese government has always been committed to creating a market-oriented, rule-of-law business environment, encouraging more enterprises to operate and develop in accordance with the law, and treating both Chinese and foreign enterprises equally, Qi said. 

Source link

RELATED ARTICLES
 

 Related posts:

 

  Mengtian lab module successfully launched. Graphic: Xu Zihe/GT China Space Station completes T-shape basic structure assembl...
 
  GPS / China says BeiDou navigation satellite system is completely function now      Live: China issues The White Paper on China's Be...

Friday 16 September 2022

SCO Samarkand Summit will once again witness how barren the Western worldview is

 

Shanghai Cooperation Organization Photo: VCG


The Shanghai Cooperation Organisation (SCO) summit will be held in Samarkand, Uzbekistan, from Thursday to Friday. The summit has received particular attention from the international community. Fifteen heads of state, including Chinese President Xi Jinping, Russian President Vladimir Putin and Indian Prime Minister Narendra Modi, will attend the summit. This is the first face-to-face discussion between leaders of the SCO member states since the COVID-19 pandemic in 2020. The meeting will include Iran as the ninth member of the SCO and issue the Samarkand Declaration to expound the SCO's position on a series of international issues.

As the world's largest and most populous regional organization, the SCO has a prominent feature: openness and inclusiveness. The second round of SCO expansion is one of the core agendas of the Samarkand Summit. As the current members, observers and dialogue partners of the SCO are all non-Western countries, some of which are being sanctioned by the US and the West, such as Russia, Iran and Belarus, the SCO has attracted some suspicions from American and Western public opinion. They describe the SCO's exploration of new multilateral cooperation mechanisms as wanting to "compete" with the West or "against the West."

The SCO summit, held in the context of the Russia-Ukraine conflict, was even described by some Western media as creating an "anti-Western front." If there is a Chinese proverb to comment on this, it is "ask not the sparrow how the eagle soars." They can only understand and speculate about the SCO's concepts with their own narrow cognition. The minds of American and Western elites are full of domineering and paranoid confrontational thinking. The target they wanted to suppress had better "socially die" in the global village and not have its own circle of friends. However, the controlling power of the US and the West cannot match their ambitions, and things that do not meet their wishes are constantly emerging, just like the SCO. In a certain sense, this is the inevitability of social evolution or the progress of the times.

The core concept of the SCO is the "Shanghai Spirit." It proposes a set of new concepts, new models, and new norms on how countries after the Cold War should live on an equal footing, how to conduct multilateral cooperation mechanisms, and how to develop the global order. In the 21 years since its establishment, the SCO, which has been "bad-mouthed" by the US and the West, has not broken up, but instead has shown vigorous vitality and attractiveness. Ten countries, including Saudi Arabia, the United Arab Emirates and Qatar, all hope to join the SCO. Differences in the political system, history, and culture of the SCO member states, and even territorial disputes and ideological differences have not become obstacles to the development of the SCO. It explored a path beyond the Cold War mentality in a world with increasing diversity and differences.

The SCO eyes for cooperation, and at the same time, it aims to express its voice and attitude to the world, representing one-quarter of the Earth's land area, nearly one-quarter of the global GDP, and one-third of the total population. For a long time, these countries have been overshadowed by the West. But it needs to be emphasized that the SCO does not target third parties, including the West. It is the inherent gene of the SCO. It will never become an organization against the West or any party at any time, just like the seeds of a big tree will never grow into thatch. Some people in the US and the West have always wanted to label the SCO as "Eastern NATO." Their narrow vision and barren imagination starkly contrast the SCO's breadth and richness.

If the West really has a sense of crisis, what it really needs to do is not to vilify the SCO, or even sow discord and dampen the enthusiasm of countries that want to participate in the organization. Instead, it should seriously reflect on what has gone wrong in its way of viewing the world. Washington often beats with a stick and offers a carrot, roping in other countries in all sorts of ways to form cliques. But many countries in the world are moving more and more away from it, while the SCO insists on the sovereign equality of states and non-exclusive multilateralism, and its circle of friends is getting bigger and bigger. The reason for this is that the SCO's "three no's principles" - no alliance, no confrontation, and no targeting any third party - have won the hearts of many countries. The more the US and the West engage in coercive diplomacy to force others to "take sides," the stronger the global community's demand for genuine multilateralism will be.

It is no coincidence that the SCO has evolved from a cooperative mechanism dedicated to combating the "three forces" to a vehicle today with four wheels of "politics, security, economy, and humanities." From the fight against terrorism, proposed by the SCO long before September 11 attacks, to the Global Development Initiative and Global Security Initiative being promoted right now, the vision, foresight, and correctness of the SCO have been repeatedly tested in the past and will be confirmed in the future. The SCO provides the world a huge room for imagination, and the Samarkand Summit will become a new milestone. 

  Source link

 

When global power shifts | The Star

 https://www.thestar.com.my/aseanplus/aseanplus-news/2022/09/16/when-global-power-shifts