<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity: Essential Practices You Need - Bizruption Asia</title>
	<atom:link href="https://bizruption.asia/category/tech-asia/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://bizruption.asia/category/tech-asia/cybersecurity/</link>
	<description>Bizruption is a peer-driven platform where Asia’s business leaders share insights on corporate governance, leadership, and managing change in a disruptive era.</description>
	<lastBuildDate>Wed, 04 Feb 2026 02:56:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://bizruption.asia/wp-content/uploads/2025/11/web-app-manifest-512x512-1-75x75.png</url>
	<title>Cybersecurity: Essential Practices You Need - Bizruption Asia</title>
	<link>https://bizruption.asia/category/tech-asia/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>When Knowing Who Attacked Matters Less Than Staying Neutral</title>
		<link>https://bizruption.asia/asia-in-focus/southeast-asia/singapore/when-knowing-who-attacked-matters-less-than-staying-neutral-2/</link>
					<comments>https://bizruption.asia/asia-in-focus/southeast-asia/singapore/when-knowing-who-attacked-matters-less-than-staying-neutral-2/#respond</comments>
		
		<dc:creator><![CDATA[The Bizruptor Investigators]]></dc:creator>
		<pubDate>Fri, 26 Dec 2025 06:11:38 +0000</pubDate>
				<category><![CDATA[Cover Story]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Singapore]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[singapore]]></category>
		<guid isPermaLink="false">https://bizruption.asia/?p=1563</guid>

					<description><![CDATA[<p>When Singapore&#8217;s Coordinating Minister for National Security stood before parliament in July 2025 to announce that cyber espionage group UNC3886 had actively targeted the nation&#8217;s critical infrastructure, he was methodical. He named the threat group. He detailed their tactics. He confirmed they&#8217;d breached systems. But when pressed about which nation-state sponsored the attacks, K. Shanmugam&#8217;s [&#8230;]</p>
<p>The post <a href="https://bizruption.asia/asia-in-focus/southeast-asia/singapore/when-knowing-who-attacked-matters-less-than-staying-neutral-2/">When Knowing Who Attacked Matters Less Than Staying Neutral</a> appeared first on <a href="https://bizruption.asia">Bizruption Asia</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="row clearfix">
<div class="col-md-7">
<p>When Singapore&#8217;s Coordinating Minister for National Security stood before parliament in July 2025 to announce that <a href="https://govinsider.asia/intl-en/article/by-naming-hacking-group-unc-3886-singapore-sends-a-strong-message">cyber espionage group UNC3886</a> had actively targeted the nation&#8217;s critical infrastructure, he was methodical. He named the threat group. He detailed their tactics. He confirmed they&#8217;d breached systems. But when pressed about which nation-state sponsored the attacks, K. Shanmugam&#8217;s response was deliberately measured: he wouldn&#8217;t go there.</p>
<p><strong>This wasn&#8217;t evasiveness. It was a calculated strategy.</strong></p>
<p><a href="https://sg.news.yahoo.com/why-singapore-remains-cautious-over-naming-state-actors-in-cyber-attacks-213927933.html">Muhammad Faizal Abdul Rahman</a>, Research Fellow at S. Rajaratnam School of International Studies (RSIS), in an interview with Yahoo Singapore, explained the distinction: &#8220;Countries that consider themselves neutral or non-aligned may prefer technical attribution over political attribution.&#8221; Technical attribution points to the perpetrator using forensic evidence. Political attribution pins blame on the nation-state believed to be behind them.</p>
<p>Put simply: Singapore knows who&#8217;s attacking. It&#8217;s sharing that intelligence privately with critical infrastructure operators. But publicly naming state sponsors? That&#8217;s a geopolitical tripwire Singapore won&#8217;t touch. For now.</p>
<p>Here&#8217;s why this matters: the careful balancing act between knowing and saying is getting exponentially harder to sustain. And the boardrooms caught in the middle are about to face governance dilemmas they haven&#8217;t prepared for.</p>
<h3><strong>The Intelligence-Sharing Paradox</strong></h3>
<figure id="attachment_1526" aria-describedby="caption-attachment-1526" style="width: 350px" class="wp-caption alignright"><a href="https://bizruption.asia/?attachment_id=1526" rel="attachment wp-att-1526"><img fetchpriority="high" decoding="async" class="wp-image-1526 size-jnews-350x250" src="https://bizruption.asia/wp-content/uploads/2025/12/Participants-from-the-DIS-Cyber-Security-Agency-of-Singapore-and-11-Critical-Information-Infrastructure-sectors-at-CIDeX-2025-held-at-the-Sin-350x250.jpg" alt="Cyber Security Agency of Singapore and 11 Critical Information Infrastructure sectors at CIDeX 2025, held at the Sin. " width="350" height="250" srcset="https://bizruption.asia/wp-content/uploads/2025/12/Participants-from-the-DIS-Cyber-Security-Agency-of-Singapore-and-11-Critical-Information-Infrastructure-sectors-at-CIDeX-2025-held-at-the-Sin-350x250.jpg 350w, https://bizruption.asia/wp-content/uploads/2025/12/Participants-from-the-DIS-Cyber-Security-Agency-of-Singapore-and-11-Critical-Information-Infrastructure-sectors-at-CIDeX-2025-held-at-the-Sin-120x86.jpg 120w, https://bizruption.asia/wp-content/uploads/2025/12/Participants-from-the-DIS-Cyber-Security-Agency-of-Singapore-and-11-Critical-Information-Infrastructure-sectors-at-CIDeX-2025-held-at-the-Sin-750x536.jpg 750w" sizes="(max-width: 350px) 100vw, 350px" /></a><figcaption id="caption-attachment-1526" class="wp-caption-text">Participants from the DIS, Cyber Security Agency of Singapore and 11 Critical Information Infrastructure sectors at CIDeX 2025, held at the Sin. <i>Photo: mindef.gov.sg</i></figcaption></figure>
<p>In October 2025, Singapore&#8217;s Ministry of Defence established the <a href="https://www.csit.gov.sg/events/media-release-17Oct2025">Digital Defence Hub</a>, announcing it would share classified threat intelligence with organisations operating critical infrastructure across banking, energy, telecoms, water and healthcare. The timing wasn&#8217;t coincidental. APT attacks targeting Singapore <a href="https://www.csa.gov.sg/news-events/press-releases/a-decade-of-strengthening-singapore-s-cyber-defence-amid-escalating-threats/">quadrupled between 2021 and 2024</a>, according to the Cyber Security Agency.</p>
<p>But here&#8217;s where it gets complicated for boards. You&#8217;re now receiving classified government briefings about state-sponsored threat groups targeting your systems. You know their tactics, their tools, their objectives. The intelligence is specific enough to inform your defence strategy. Yet you can&#8217;t publicly acknowledge who&#8217;s attacking without contradicting Singapore&#8217;s diplomatic positioning.</p>
<p>What happens when your institution gets breached using the exact malware the government warned you about privately? Do you disclose to shareholders that you had advance warning? Do you explain to regulators why certain defences were prioritised without revealing classified briefings? How do you navigate fiduciary duties to investors whilst respecting national security sensitivities?</p>
<p>Most boards haven&#8217;t developed frameworks for this. Corporate governance training doesn&#8217;t typically cover handling classified intelligence whilst meeting transparency obligations to shareholders. That gap is about to become quite expensive.</p>
<h3><strong>When Insurance Meets Geopolitics</strong></h3>
<p>The insurance dimension makes this messier. Most cyber insurance policies exclude coverage for war and state-sponsored attacks due to systemic risks, according to <a href="https://lmalloyds.com/specialist-areas/underwriting/wordings/cyber-war-clauses/">analysis from Lloyd&#8217;s of London</a>. But here&#8217;s the catch: exclusions typically require proving state attribution.</p>
<p>If Singapore shares classified intelligence privately indicating state sponsorship but maintains public diplomatic neutrality, does the war exclusion apply? Insurance companies and policyholders could litigate this ambiguity for years.</p>
<p>The precedent everyone&#8217;s watching: <a href="https://www.bsk.com/news-events-videos/the-impact-of-merck-rsquo-s-notpetya-policy-claims-and-a-reported-settlement">Merck&#8217;s NotPetya case</a>, where courts ruled a massive state-sponsored attack wasn&#8217;t excluded under war clauses because the specific policy language didn&#8217;t clearly define cyber warfare. Insurers responded by updating exclusions. But ambiguous attribution still creates grey zones.</p>
<p>For institutional investors assessing Singapore-based portfolio companies, this creates valuation puzzles. Your critical infrastructure holdings might have world-class cyber defences and receive classified threat warnings. But do they have viable insurance coverage if attacks escalate? The answer depends on attribution mechanisms that are deliberately kept ambiguous for diplomatic reasons.</p>
<p>That&#8217;s not a risk most investment committees have stress-tested yet.</p>
<h3><strong>The Pressure Intensifying</strong></h3>
<p>Singapore&#8217;s neutrality strategy works brilliantly during relative stability. But the geopolitical environment is becoming increasingly unstable. Taiwan tensions haven&#8217;t dissipated. South China Sea disputes continue simmering. US-China technological decoupling is accelerating, not slowing.</p>
<p>Western cybersecurity firms like Mandiant already publicly <a href="https://www.straitstimes.com/singapore/who-is-unc3886-the-group-that-attacked-spores-critical-information-infrastructure">attribute UNC3886 to China-linked operations</a>. These firms hold significant US government contracts, creating commercial and political incentives for explicit attribution. If Singapore institutions rely on these firms for defence whilst the government maintains public ambiguity, the operational contradiction becomes harder to manage.</p>
<p>What happens when the Five Eyes intelligence partners make intelligence-sharing conditional on public attribution? What happens when China seeks assurances that intelligence-sharing arrangements don&#8217;t constitute strategic alignment with Washington?</p>
<p>For regional investors, the implications cascade. If ASEAN&#8217;s most sophisticated cyber defence operator faces these attribution dilemmas, how do Indonesia, Malaysia, Thailand and Vietnam navigate similar pressures with even less diplomatic leverage and technical capacity?</p>
<div class="insurance-box">
<div class="insurance-header">
<h3 class="insurance-title">When Your Insurance Won&#8217;t Pay After State Attacks</h3>
</div>
<p class="intro-text">Most cyber insurance policies exclude state-sponsored attacks due to systemic risks. But here&#8217;s the operational problem: exclusions require proving state attribution.</p>
<div class="problem-box">
<div class="problem-label">&#x26a0; The Problem</div>
<p class="problem-text">If Singapore shares classified intelligence privately indicating state sponsorship whilst avoiding public political attribution, does your policy&#8217;s war exclusion apply?</p>
</div>
<div class="question-box">
<p class="question-text">Insurance companies and policyholders could litigate this for years.</p>
</div>
<div class="precedent-section">
<div class="precedent-label">&#x1f4cb; Precedent</div>
<div class="precedent-case">Merck / NotPetya</div>
<p class="precedent-text">Courts ruled their NotPetya losses from a state-sponsored attack weren&#8217;t excluded because policy language didn&#8217;t clearly define cyber warfare.</p>
</div>
<div class="outcome-box">
<p class="outcome-text">Insurers have since updated exclusions, but ambiguous attribution still creates disputes.</p>
</div>
<div class="reality-section">
<div class="reality-label">&#x1f1f8;&#x1f1ec; For Singapore Institutions</div>
<p class="reality-text">You might implement defences, suffer breaches anyway, then discover insurance won&#8217;t pay because <span class="gap-highlight">private intelligence does not equal public attribution</span> requirements in your policy language.</p>
</div>
</div>
<h3><strong>The Less Talked-About Mercenary Factor</strong></h3>
<p>There&#8217;s another layer complicating everything. <a href="https://sg.news.yahoo.com/why-singapore-remains-cautious-over-naming-state-actors-in-cyber-attacks-213927933.html">As Faizal noted to Yahoo Singapore</a>, nation-states increasingly use cybercriminals as &#8220;deniable tools of state power&#8221; &#8211; functioning exactly like physical mercenaries who provide plausible deniability in traditional warfare.</p>
<p>The same malware appears in both state-affiliated espionage operations and purely criminal ransomware attacks. Attribution lines are deliberately blurred. When your institution gets breached, determining whether it&#8217;s state-sponsored espionage, criminal extortion or state-contracted criminals masquerading as independents fundamentally changes everything: insurance coverage, regulatory obligations, diplomatic implications, law enforcement jurisdiction.</p>
<p>Yet attackers design operations specifically to make definitive attribution impossible. And governments like Singapore maintain strategic ambiguity that reinforces this uncertainty.</p>
<h3><strong>What Boards Need Now</strong></h3>
<p>The <a href="https://www.mindef.gov.sg/news-and-events/latest-releases/12nov25-nr2/">November 2025 Critical Infrastructure Defence Exercise</a> brought together over 250 participants from all 11 critical infrastructure sectors, demonstrating Singapore&#8217;s cross-sector coordination capability. The technical defences are advancing and the intelligence-sharing mechanisms are operational.</p>
<figure id="attachment_1525" aria-describedby="caption-attachment-1525" style="width: 350px" class="wp-caption alignleft"><a href="https://bizruption.asia/?attachment_id=1525" rel="attachment wp-att-1525"><img decoding="async" class="wp-image-1525" src="https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm-210x300.jpg" alt="The Singapore Cyber Landscape 2024-2025 publication reviews Singapores cybersecurity situation against a dynamic backdrop of rapid digitalisat." width="350" height="500" srcset="https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm-210x300.jpg 210w, https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm-716x1024.jpg 716w, https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm-768x1098.jpg 768w, https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm-750x1072.jpg 750w, https://bizruption.asia/wp-content/uploads/2025/12/The-Singapore-Cyber-Landscape-2024-2025-publication-reviews-Singapores-cybersecurity-situation-against-a-dynamic-backdrop-of-rapid-digitalisat-sm.jpg 1040w" sizes="(max-width: 350px) 100vw, 350px" /></a><figcaption id="caption-attachment-1525" class="wp-caption-text">The Singapore Cyber Landscape 2024-2025 publication reviews Singapores cybersecurity situation against a dynamic backdrop of rapid digitalisat. <i>Photo: Cyber Security Agency of Singapore (csa)</i></figcaption></figure>
<p>But the governance frameworks haven&#8217;t caught up. What&#8217;s needed now: protocols for boards handling classified intelligence that satisfy both national security requirements and corporate transparency obligations. Insurance products that address the grey zone between technical and political attribution. Regional coordination frameworks so ASEAN institutions aren&#8217;t navigating these tensions in isolation.</p>
<p>For investors, the analytical framework becomes clearer: cyber risk assessment, moving forward, requires understanding geopolitical positioning alongside technical capabilities. Portfolio companies in Singapore face fundamentally different risk profiles than those in jurisdictions that publicly attribute attacks or those that avoid intelligence-sharing entirely.</p>
<p>Smart portfolio managers should be stress-testing for scenarios where diplomatic neutrality becomes untenable. What happens to Singapore-based financial institutions if US-China tensions force clearer alignment? How do supply chains absorb disruptions if intelligence-sharing arrangements fracture along geopolitical fault lines?</p>
<h3><strong>The Calculation That&#8217;s Getting Harder</strong></h3>
<p>Singapore has built something sophisticated: technical precision without political escalation. Advanced intelligence capabilities without diplomatic commitments. The strategy has worked remarkably well.</p>
<p>But strategic ambiguity has limits. When cyber-attacks escalate from espionage to infrastructure disruption, neutrality becomes harder to justify. When allied nations demand public solidarity against specific threats, silence becomes conspicuous. When boards need to explain breaches to shareholders, ambiguity creates legal liability.</p>
<p>The question for 2026 isn&#8217;t whether Singapore&#8217;s approach will face intensifying pressure. It will. The question is whether the institutions receiving classified intelligence – banks, utilities, telecoms, healthcare providers – have developed the governance frameworks needed when diplomatic neutrality collides with operational transparency.</p>
<p>Right now, most likely haven&#8217;t. And that gap between sophisticated national strategy and corporate readiness is about to become very expensive for everyone caught in the middle.</p>
</div>
<div class="col-md-5">
<aside class="sidebar-container">
<header class="sidebar-header">
<h2 class="sidebar-title">The Cyber Mercenary Economy That&#8217;s Flown Under the Radar</h2>
</header>
<p class="intro-text">Singapore&#8217;s attribution challenge reveals something larger emerging across Southeast Asia: the maturation of a cyber mercenary economy that deliberately blurs every line.</p>
<div class="insight-box">
<p class="insight-text">Research from RSIS highlighted in the Yahoo Singapore interview shows nation-states increasingly contract cybercriminals as &#8220;deniable tools of state power.&#8221;</p>
</div>
<div class="content-section">
<p class="section-text">The same malware, the same tactics, the same infrastructure appears in both state-affiliated espionage operations and purely criminal ransomware attacks.</p>
</div>
<div class="content-section">
<div class="section-label">&#x26a0; For ASEAN Boardrooms</div>
<p class="section-text">When your institution suffers a breach, is it:</p>
</div>
<div class="question-list">
<div class="question-item">State-sponsored espionage requiring diplomatic response</div>
<div class="question-item">Criminal ransomware requiring law enforcement</div>
<div class="question-item">State actors masquerading as criminals</div>
<div class="question-item">Criminals contracted by states</div>
</div>
<div class="impact-box">
<p class="impact-text">The answer fundamentally changes insurance coverage, regulatory obligations and diplomatic implications. Yet attackers design operations specifically to make that answer incomprehensible.</p>
</div>
<div class="prediction-section">
<div class="prediction-year">2026</div>
<div class="prediction-label">Expect Maturation</div>
<div class="prediction-list">
<div class="prediction-item">States contract more freelance hackers for deniability</div>
<div class="prediction-item">Criminal groups sell infrastructure access to intelligence services</div>
<div class="prediction-item">Attribution lines blur deliberately and systematically</div>
</div>
</div>
<p class="conclusion">ASEAN institutions will confront the reality that <span class="emphasis">proving &#8220;who&#8221; attacked matters less</span> than acknowledging they cannot definitively establish attribution using evidence that courts or insurers will accept.</p>
</aside>
</div>
</div>
<p>The post <a href="https://bizruption.asia/asia-in-focus/southeast-asia/singapore/when-knowing-who-attacked-matters-less-than-staying-neutral-2/">When Knowing Who Attacked Matters Less Than Staying Neutral</a> appeared first on <a href="https://bizruption.asia">Bizruption Asia</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bizruption.asia/asia-in-focus/southeast-asia/singapore/when-knowing-who-attacked-matters-less-than-staying-neutral-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Beating Cyber Disruption Means Getting Back to Basics</title>
		<link>https://bizruption.asia/tech-asia/beating-cyber-disruption-means-getting-back-to-basics/</link>
					<comments>https://bizruption.asia/tech-asia/beating-cyber-disruption-means-getting-back-to-basics/#respond</comments>
		
		<dc:creator><![CDATA[The Bizruption Team]]></dc:creator>
		<pubDate>Wed, 19 May 2021 11:57:11 +0000</pubDate>
				<category><![CDATA[Asia in Focus]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Regional Insights]]></category>
		<category><![CDATA[Tech Asia]]></category>
		<category><![CDATA[Beating Cyber Disruption]]></category>
		<category><![CDATA[Benjamin Ang]]></category>
		<guid isPermaLink="false">https://bizruption.asia/?p=123</guid>

					<description><![CDATA[<p>Cybersecurity is as essential to business as insurance in high-risk regions, yet many leaders still underestimate the reality of security breaches.</p>
<p>The post <a href="https://bizruption.asia/tech-asia/beating-cyber-disruption-means-getting-back-to-basics/">Beating Cyber Disruption Means Getting Back to Basics</a> appeared first on <a href="https://bizruption.asia">Bizruption Asia</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cybersecurity is as important for protecting businesses as buying home insurance is in typhoon-prone areas. Security breaches are a reality of business that many company leaders would rather avoid. Attack methods and technologies to stop it have become more sophisticated with every passing year. The pandemic has heightened awareness of cybersecurity threats as companies adopted new technologies rapidly and corporate networks were suddenly being accessed from outside the company’s firewall on employees’ personal devices.</p>
<p>Yet, as we learned from a recent conversation with Benjamin Ang, a senior fellow at Nanyang Technological University, cybersecurity remains underfunded or overlooked in the grand scheme of what is required to protect an enterprise and generate growth. Ang spends his time  looking at cyber issues from a 10,000 ft view. He digs into the policy aspects of international and national cybersecurity to increase understanding of how disinformation online, international cyber or nation state attacks, and the security of advanced technologies disrupt the real world. From this perspective, the reasons for nations, enterprises and individual consumers securing their data and systems within networks become clear.</p>
<p>However, if you read the business news regularly, you may come away with a picture of a high stakes war with invisible threats and a global talent shortage to address it. Enterprises continue to underspend on areas that may protect them most. Although 47% of Asia-Pacific executives reported in a survey that they plan to increase data security spending in the next 12 months, it comprises less than 15% of typical IT security budgets. The primary focus remains on network security for 37% of enterprises followed by data and application security. Additionally, the consequences of not notifying the public quickly about incidents are escalating – at least in Europe. Yet, Benjamin’s response to that is to offer good news; protecting your business is not as complicated as it seems.</p>
<p>In his view, not enough businesses are implementing practices to be aware of the risks, ensure proper access to IT networks and keep employees trained to reduce the success of breach attempts. The current environment has also led some company leaders to cut corners when it comes to what they perceive as non-core expenses. Their timing could not be worse. Cyber threats and incidents have intensified with attackers adapting to people’s fears around COVID-19 and exploiting vulnerabilities brought to light by digitalisation.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-124" src="https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2.jpg" alt="Beating Cyber Disruption Means Getting Back To Basics" width="1280" height="720" srcset="https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2.jpg 1280w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2-300x169.jpg 300w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2-1024x576.jpg 1024w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2-768x432.jpg 768w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2-750x422.jpg 750w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-2-1140x641.jpg 1140w" sizes="(max-width: 1280px) 100vw, 1280px" /><br />
<!--{cke_protected}{C}%3C!%2D%2D%5Bendif%5D%2D%2D%3E--></p>
<h3><strong>Managing Cyber Disruption</strong></h3>
<p>Ang cautioned that leaders holding their business together in this manner need to enter a new phase. That includes getting back to some basic tenets of security by making sure that all employees working at home are provided with the right devices and are thoroughly educated about cyber risks on a continual basis.</p>
<p>“Giving your employees devices and proper access actually makes them more productive, and can also help the bottom line. If your employees are often on calls, but they are in a noisy home environment like most of us are with kids or other family members working from home, can you provide them with a headset and a mic so that they can make a sales call properly? Maybe that helps them to close the deal. Can you provide them with a computer that is going to allow them to pull up the information faster because it’s not creaking at the seams or doesn’t keep crashing out of Zoom calls? These things will in the end, add up.”</p>
<p>It also means helping your employees access the corporate network safely. Ang noted that companies can guide employees in setting up a safe Wifi network at home, but should also consider other places employees may set up their laptop to work.</p>
<p><em>We can’t take it for granted that everybody’s got the access to be able to do things from home.</em></p>
<p>If your employees are escaping noisy homes to get some work done at a cafe or to get a reliable internet connection, they could be putting your company at greater risk. Benjamin said business owners should consider what documents their employees are accessing from public places.</p>
<p>“Should your employees be working on confidential documents where everybody can just walk by and see it?”</p>
<p>Despite the potential threats, Ang said business leaders who think about these factors when protecting their company’s data are in the minority. Even large enterprises are still guilty of setting basic passwords to servers in spite of the amount of information available explaining why setting strong passwords is important.</p>
<p>“You can avoid certain more basic things like having unsafe passwords, or employees sharing passwords around, or having passwords in a visible place. These kinds of things still matter, because it is terrifying how many breaches happen because of these basics.”</p>
<p><img decoding="async" class="aligncenter size-full wp-image-125" src="https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3.jpg" alt="Beating Cyber Disruption Means Getting Back To Basics" width="1280" height="720" srcset="https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3.jpg 1280w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3-300x169.jpg 300w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3-1024x576.jpg 1024w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3-768x432.jpg 768w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3-750x422.jpg 750w, https://bizruption.asia/wp-content/uploads/2025/10/Beating-Cyber-Disruption-Means-Getting-Back-To-Basics-3-1140x641.jpg 1140w" sizes="(max-width: 1280px) 100vw, 1280px" /><br />
<!--{cke_protected}{C}%3C!%2D%2D%5Bendif%5D%2D%2D%3E--></p>
<p>Benjamin recommends that business owners devise a security backup plan and invest in more IT hardware with the guidance of security experts, especially if there is no dedicated expert on staff. These steps pay off in the long run because your business is not helpless if a breach occurs.</p>
<p>“You either pay upfront, or you pay later when customer data is stolen, there is a ransomware attack, or you get fined from the Personal Data Protection Commission for a data leak. Then your business grinds to a halt for a day, two days, a week, which could actually wipe out some businesses.”</p>
<p>We know that cyber threats will continue to loom over enterprises, especially with the accelerated pace of digitalisation. Establishing or reinforcing basic security processes can mean the difference between focusing on growing your business or facing the consequences of a successful attack.</p>
<p><strong>Recommended reads:</strong> Benjamin recommends reading the Singapore Cyber Landscape, which is published annually, and the Safer Cyberspace Masterplan from the Cyber Security Agency of Singapore (CSA) to know the risks and gain insight on how to reduce it.<br />
<a href="https://www.csa.gov.sg/news/publications" data-cke-saved-href="https://www.csa.gov.sg/news/publications">https://www.csa.gov.sg/news/publications</a></p>
<p>The post <a href="https://bizruption.asia/tech-asia/beating-cyber-disruption-means-getting-back-to-basics/">Beating Cyber Disruption Means Getting Back to Basics</a> appeared first on <a href="https://bizruption.asia">Bizruption Asia</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://bizruption.asia/tech-asia/beating-cyber-disruption-means-getting-back-to-basics/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
