Did You Know

Comprehensive Security That’s Solid, Agile And Scalable

It’s Never Too Late To Strengthen Your Security​

January 9, 2018

IDC’s latest report highlighted that 84% of organisations across Asia Pacific1 are operating with less-than-ideal IT security strategies in place2. This is today’s cyber reality; with inadequate cyber defence, enterprises are constantly losing the catch-me-if-you-can game against the fast-mutating threat landscape.
A holistic security approach guided by cyber consulting
Protecting one’s cyber position today needs to go beyond block-and-defend tactics. We see complementing block-and-defend strategies with preventive security via cyber consulting3 as an effective way to ensure proactive cyber defence. By building up an integrated security approach with clear and robust cyber security strategies, enterprises can improve their overall security posture across people, technology and processes. Gartner also highlighted the value of preventive security, having named consulting and outsourcing as the largest categories of spending on information security4
Do your security tools and processes work when disaster strikes?
Investing in security tools and putting security processes in place is just the first step. What’s key is in knowing (for sure) that they work when disaster strikes. According to Cisco, more than 50% of companies are using from 6 to 50+ security vendors and products4, resulting in the complexity of managing siloed and disparate systems that cause compatibility issues. A focused, holistic approach guided by cyber consulting expertise would help in 2 ways:
1. Simplify security management: Minimise investments in too many siloed security tools and reduce the need to work with a myriad of vendors
2. Plan and execute a clear, robust cyber security programme across the entire threat lifecycle to build: preparedness, assessment, advisory, and response
Quiz: What is Your Security Readiness? 1. What are your reasons for investing in security solutions and services?
    To ensure that our security tools and processes:
  • are compliant
  • are effective in protecting against cyber-attacks that will affect our corporate credibility
  • work as planned during a security incident
2. Do you have an incident response plan in place? 3. Have you tested:
  • Your network/applications for vulnerabilities?
  • Your incident response plan?
4. Do you know how your security posture fares against the industry? 5. Do you conduct regular cyber awareness training for your staff and management? Recommendations: Boost Your Cyber Security Posture

Before a breach occurs: Check your cyber security readiness5

  • People: Raise security awareness amongst your staff and management via tactical or executive security training programmes6 at Singtel’s Cyber Security Institute.
  • Process: Check if your organisation is ready to identify and respond to security incidents. Develop detailed incident response plans, build an incident response team, simulate potential attacks, and more.
  • Technology: Detect potential vulnerabilities in your applications via Vulnerability Assessment and Penetration Tests.

When you are breached: Incident response and forensics investigation

  • Get first-responder help to assess the security incident, contain the security breach and perform detailed forensics examination to gather criminal evidence.

Always on: Continuous monitoring

  • Always be cyber-prepared with sustained efforts before a breach occurs (above).
  • Continuously monitor third-party risks with a non-intrusive, outside-in approach.

Rate your security posture against industry benchmarks and the competition.

Did you know

It’s never too late to Strengthen Your Security

January 9, 2018

IDC’s latest report highlighted that 84% of organisations across Asia Pacific1 are operating with less-than-ideal IT security strategies in place2. This is today’s cyber reality; with inadequate cyber defence, enterprises are constantly losing the catch-me-if-you-can game against the fast-mutating threat landscape.

A holistic security approach guided by cyber consulting

Protecting one’s cyber position today needs to go beyond block-and-defend tactics. We see complementing block-and-defend strategies with preventive security via cyber consulting3 as an effective way to ensure proactive cyber defence. By building up an integrated security approach with clear and robust cyber security strategies, enterprises can improve their overall security posture across people, technology and processes. Gartner also highlighted the value of preventive security, having named consulting and outsourcing as the largest categories of spending on information security4.
Do your security tools and processes work when disaster strikes?

Investing in security tools and putting security processes in place is just the first step. What’s key is in knowing (for sure) that they work when disaster strikes. According to Cisco, more than 50% of companies are using from 6 to 50+ security vendors and products4, resulting in the complexity of managing siloed and disparate systems that cause compatibility issues. A focused, holistic approach guided by cyber consulting expertise would help in 2 ways: 1. Simplify security management: Minimise investments in too many siloed security tools and reduce the need to work with a myriad of vendors 2. Plan and execute a clear, robust cyber security programme across the entire threat lifecycle to build: preparedness, assessment, advisory, and response.


Quiz: What is Your Security Readiness?

1. What are your reasons for investing in security solutions and services? To ensure that our security tools and processes: – are compliant – are effective in protecting against cyber-attacks that will affect our corporate credibility – work as planned during a security incident 2. Do you have an incident response plan in place? 3. Have you tested: – your network/applications for vulnerabilities? – your incident response plan? 4. Do you know how your security posture fares against the industry? 5. Do you conduct regular cyber awareness training for your staff and management? Recommendations: Boost Your Cyber Security Posture Before a breach occurs: Check your cyber security readiness5 People: Raise security awareness amongst your staff and management via tactical or executive security training programmes6 at Singtel’s Cyber Security Institute. Process: Check if your organisation is ready to identify and respond to security incidents. Develop detailed incident response plans, build an incident response team, simulate potential attacks, and more. Technology: Detect potential vulnerabilities in your applications via Vulnerability Assessment and Penetration Tests. When you are breached: Incident response and forensics investigation Get first-responder help to assess the security incident, contain the security breach and perform detailed forensics examination to gather criminal evidence. Always on: Continuous monitoring Always be cyber-prepared with sustained efforts before a breach occurs (above). Continuously monitor third-party risks with a non-intrusive, outside-in approach. Rate your security posture against industry benchmarks and the competition.

It’s never too late to Strengthen Your Security

January 9, 2021

In 2014, the world was exposed to an unauthorized glimpse inside entertainment giant Sony Pictures. Confidential information, including personal information about employees of Sony, executive salary information, and previously unreleased Sony films were made public, courtesy of computer hackers who called themselves the “Guardians of Peace.” That same year, Home Depot admitted that 56 million credit cards were at risk after hackers broke into its payment systems. In 2013, during the Thanksgiving season, cyber criminals installed malware that successfully stole 40 million credit card numbers from Target, despite the company taking measures to defend itself against just such an attack.

A holistic security approach guided by cyber consulting

Protecting one’s cyber position today needs to go beyond block-and-defend tactics. We see complementing block-and-defend strategies with preventive security via cyber consulting3 as an effective way to ensure proactive cyber defence.

By building up an integrated security approach with clear and robust cyber security strategies, enterprises can improve their overall security posture across people, technology and processes. Gartner also highlighted the value of preventive security, having named consulting and outsourcing as the largest categories of spending on information security4.

Do your security tools and processes work when disaster strikes?

Investing in security tools and putting security processes in place is just the first step. What’s key is in knowing (for sure) that they work when disaster strikes.

According to Cisco, more than 50% of companies are using from 6 to 50+ security vendors and products4, resulting in the complexity of managing siloed and disparate systems that cause compatibility issues.

A focused, holistic approach guided by cyber consulting expertise would help in 2 ways:

1. Simplify security management: Minimise investments in too many siloed security tools and reduce the need to work with a myriad of vendors

2. Plan and execute a clear, robust cyber security programme across the entire threat lifecycle to build: preparedness, assessment, advisory, and response

Quiz: What is Your Security Readiness?

1. What are your reasons for investing in security solutions and services?

To ensure that our security tools and processes:

– are compliant
– are effective in protecting against cyber-attacks that will affect our corporate credibility
– work as planned during a security incident
2. Do you have an incident response plan in place?
3. Have you tested:
– your network/applications for vulnerabilities?
– your incident response plan?
4. Do you know how your security posture fares against the industry?
5. Do you conduct regular cyber awareness training for your staff and management?

 

Recommendations: Boost Your Cyber Security Posture

Before a breach occurs: Check your cyber security readiness5

  • People: Raise security awareness amongst your staff and management via tactical or executive security training programmes6 at Singtel’s Cyber Security Institute.
  • Process: Check if your organisation is ready to identify and respond to security incidents. Develop detailed incident response plans, build an incident response team, simulate potential attacks, and more.
  • Technology: Detect potential vulnerabilities in your applications via Vulnerability Assessment and Penetration Tests.
    When you are breached: Incident response and forensics investigation
  • Get first-responder help to assess the security incident, contain the security breach and perform detailed forensics examination to gather criminal evidence.

Always on: Continuous monitoring

  • Always be cyber-prepared with sustained efforts before a breach occurs (above).
  • Continuously monitor third-party risks with a non-intrusive, outside-in approach.
    Rate your security posture against industry benchmarks and the competition.