top of page
Search
  • Writer's pictureMZT

Momentum Z as a Panelist from Cloud Security Alliance

We would like to thank Veronica Tan from Cybersecurity Agency of Singapore for the invitation of our CEO, Shane Chiang to be a panel speaker at the recent Cloud Security Alliance event hosted by Hing Yan Lee in Singapore. As more and more organization adopt digitalisation and moving to the cloud, it is always important to note that basic cybersecurity awareness and design thinking should remain the same and actually even more.


Panelist with Moderator; (Left to Right) Veronica Tan | Emil Tan | Baljit Singh | Shane Chiang | Chee Wee Tan


Here are some ๐ญ๐ข๐ฉ๐ฌ ๐š๐ง๐ ๐ญ๐ซ๐ข๐œ๐ค๐ฌ for business owner or stakeholder, one essential question you must ask is your vendor that you deem as critical to your business:


"๐‘พ๐’‰๐’‚๐’• ๐’Š๐’” ๐’š๐’๐’–๐’“ ๐’„๐’š๐’ƒ๐’†๐’“๐’”๐’†๐’„๐’–๐’“๐’Š๐’•๐’š ๐’‘๐’๐’‚๐’ ๐’•๐’ ๐’‘๐’“๐’๐’•๐’†๐’„๐’• ๐’Ž๐’š ๐’„๐’๐’Ž๐’‘๐’‚๐’๐’š ๐’Š๐’ ๐’•๐’‰๐’† ๐’†๐’—๐’†๐’๐’• ๐’๐’‡ ๐’‚ ๐’ƒ๐’“๐’†๐’‚๐’„๐’‰?"


If the response is an uncomfortable silence, then the answer is clear. To ensure that your vendors and partners have adequate measures in place to counteract cyber threats, consider the following strategies:


๐„๐ฏ๐š๐ฅ๐ฎ๐š๐ญ๐ž ๐ญ๐ก๐ž๐ข๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ๐ฌ: Request detailed information about their cybersecurity strategies. This should include their policies on data protection, access control, and regular security audits.


๐ˆ๐ง๐œ๐ข๐๐ž๐ง๐ญ ๐‘๐ž๐ฌ๐ฉ๐จ๐ง๐ฌ๐ž ๐๐ฅ๐š๐ง: Ensure they have a solid incident response plan in place. This plan should detail how they will respond to a cyber breach, including steps to identify, contain, and eradicate the threat, as well as measures to recover and learn from the incident.


๐‘๐ž๐ ๐ฎ๐ฅ๐š๐ซ ๐”๐ฉ๐๐š๐ญ๐ž๐ฌ ๐š๐ง๐ ๐๐š๐ญ๐œ๐ก๐ž๐ฌ: Ask about their procedures for regular updates and patches. Timely updates are crucial in preventing cyber-attacks.


๐„๐ฆ๐ฉ๐ฅ๐จ๐ฒ๐ž๐ž ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐ :Human error is a significant cause of data breaches. As such, confirm whether they provide regular cybersecurity training to their employees to help them recognize and respond to potential threats.


๐“๐ก๐ข๐ซ๐-๐๐š๐ซ๐ญ๐ฒ ๐•๐ž๐ซ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง: If possible, seek third-party verification of their cybersecurity measures. This could be in the form of certifications or audits from recognized cybersecurity bodies.


๐‚๐ฒ๐›๐ž๐ซ ๐ˆ๐ง๐ฌ๐ฎ๐ซ๐š๐ง๐œ๐ž: Check if they have cyber insurance. This is a good indicator of their commitment to cybersecurity and provides a safety net in case of a breach.


In this digital age, ensuring your partners and vendors prioritize cybersecurity is paramount. By following these steps, you can help protect your company from potential cyber threats.


44 views0 comments

Comments


bottom of page