{"id":215160,"date":"2022-01-03T09:05:52","date_gmt":"2022-01-03T01:05:52","guid":{"rendered":"https:\/\/techwireasia.com\/?p=215160"},"modified":"2021-12-31T19:43:03","modified_gmt":"2021-12-31T11:43:03","slug":"ten-cybersecurity-resolutions-for-a-safer-2022","status":"publish","type":"post","link":"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/","title":{"rendered":"Ten cybersecurity resolutions for a safer 2022"},"content":{"rendered":"

New year, new resolutions \u2014 here are ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in.<\/span><\/p>\n

1. Prioritize cybersecurity\u00a0<\/strong><\/h4>\n

A TrendMicro <\/span>survey <\/b><\/a>found that 90% of IT decision-makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or other goals. 82% also felt that they have been pressured to downplay the severity of cyber risks to their board.\u00a0<\/span><\/p>\n

Whilst a data breach might make organizations prioritize cybersecurity, the costs of handling one would be immense \u2014 we\u2019re talking <\/span>US$5 million per breach<\/b><\/a> immense.\u00a0<\/span><\/p>\n

Why would you buy umbrellas after the rain? <\/span><\/p>\n

2. Don\u2019t neglect data protection and privacy\u00a0<\/strong><\/h4>\n

Customers say that <\/span>safety and security are most important to them<\/b><\/a> online. KPMG suggests that businesses adopt a transparent approach to how data is used, stored, and shared. This will not only assuage the worries of users but also help to build consumer trust in a brand.<\/span>
\n<\/span>
\n<\/span>Don\u2019t betray their trust, ensure you have the right<\/span>
data protection<\/b> <\/a>and <\/span>data privacy<\/b><\/a> policies in place within your digital ecosystem.<\/span><\/p>\n

3. Institute and maintain IT and cybersecurity hygiene policies<\/strong><\/h4>\n

Ransomware will be the largest threat to businesses this year. Sophos recommends having proper IT hygiene policies across the company. <\/span>
\n<\/span>
\n<\/span>Ensure <\/span>
proactive countermeasures<\/b> <\/a>such as monitoring features, backups, and training in security skills to enable early detection. Ensure all staff has the latest security updates and patches installed on their devices.<\/span><\/p>\n

4. Passwords are not enough<\/strong><\/h4>\n

Eighty percent of hacking-related breaches can be attributed to weak or compromised passwords, according to Verizon\u2019s 2019 Data Breach Investigations Report.\u00a0<\/span><\/p>\n

So, passwords aren\u2019t enough. <\/span>Multi-factor authentication (MFA) <\/b><\/a>should be the new norm.<\/span><\/p>\n

5. Zero-trust is your friend\u00a0<\/strong><\/h4>\n

Yes, we\u2019ve said this ad nauseam. We\u2019re saying it <\/span>again<\/b><\/a>. And <\/span>again<\/b><\/a>.<\/span><\/p>\n

6. Beware tech support scams\u00a0<\/strong><\/h4>\n

Over 60% of consumers around the globe have <\/span>fallen prey to tech support scams<\/b><\/a>.<\/b> Victims tend to be younger men, and also very overconfident of their IT literacy skills.<\/span>
\n<\/span>
\n<\/span>So what should businesses do? Consider AI chatbots instead for tech support.<\/span><\/p>\n

7. Prioritize 5G security\u00a0<\/strong><\/h4>\n

5G technology is gaining increased uptake in the Asia Pacific and will see more use in 2022. However, it does come with security concerns, especially as it may enable a wider threat surface area for attackers. <\/span>
\n<\/span>
\n<\/span>As such, it\u2019s time to prioritize 5G security both <\/span>
MNO-side<\/b><\/a> and <\/span>business side.<\/b><\/a><\/p>\n

8. Increase remote working security\u00a0<\/strong><\/h4>\n

We thought remote working would be decreasing. Boy, were we wrong, especially given the rapidly spreading Omicron variant. <\/span>
\n<\/span>
\n<\/span>Companies should continuously implement and reinforce <\/span>
user-friendly cybersecurity tools and policies<\/b><\/a>,<\/b> and users should improve on their security standards at home.<\/span><\/p>\n

9. Break IT team silos down\u00a0<\/strong><\/h4>\n

Only a third of developers truly understand the security policies they work with. This disconnect between security teams and software developers hinders initiatives like Zero Trust implementation and securing the cloud.\u00a0<\/span><\/p>\n

Companies should <\/span>foster closer relationships<\/b><\/a> between developers and the security team so all ICT members are on board and fully understand how policies and processes will be like.<\/span><\/p>\n

10. \u2026 or outsource IT security\u00a0<\/strong><\/h4>\n

Well, if your company is smaller and you can\u2019t afford a security team, then <\/span>cybersecurity MSPs<\/b><\/a> (managed service providers) are a solution.<\/span><\/p>\n

But make sure you get the advice of a skilled and experienced cybersecurity member to ensure you\u2019re not overpaying for services you don\u2019t need.<\/span><\/p>\n


\nThe Tech Wire Asia team wishes you and yours a Happy and Cyber-secure New Year!!<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

New year, new resolutions \u2014 here are ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in. 1. Prioritize cybersecurity\u00a0 A TrendMicro survey found that 90% of IT decision-makers claim their business would be willing to compromise on cybersecurity in favor of digital transformation, productivity, or… Read more »<\/a><\/p>\n","protected":false},"author":631,"featured_media":215164,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12,2804,6,2372],"tags":[2701,3408],"yoast_head":"\nTen cybersecurity resolutions for a safer 2022 - Tech Wire Asia<\/title>\n<meta name=\"description\" content=\"Tech Wire Asia presents ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ten cybersecurity resolutions for a safer 2022 - Tech Wire Asia\" \/>\n<meta property=\"og:description\" content=\"Tech Wire Asia presents ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Wire Asia\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techwireasia\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-03T01:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-31T11:43:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techwireasia.com\/wp-content\/uploads\/2022\/01\/shutterstock_590674898.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"693\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechieKitteh\" \/>\n<meta name=\"twitter:site\" content=\"@techwireasia\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/techwireasia.com\/#website\",\"url\":\"https:\/\/techwireasia.com\/\",\"name\":\"Tech Wire Asia\",\"description\":\"Where technology and business intersect\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/techwireasia.com\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/cdn.techwireasia.com\/wp-content\/uploads\/2022\/01\/shutterstock_590674898.jpg\",\"contentUrl\":\"https:\/\/cdn.techwireasia.com\/wp-content\/uploads\/2022\/01\/shutterstock_590674898.jpg\",\"width\":1000,\"height\":693,\"caption\":\"Happy New Year from Tech Wire Asia! Please don't forget to secure your work devices. (IMG\/shutterstock)\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/#webpage\",\"url\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/\",\"name\":\"Ten cybersecurity resolutions for a safer 2022 - Tech Wire Asia\",\"isPartOf\":{\"@id\":\"https:\/\/techwireasia.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/#primaryimage\"},\"datePublished\":\"2022-01-03T01:05:52+00:00\",\"dateModified\":\"2021-12-31T11:43:03+00:00\",\"author\":{\"@id\":\"https:\/\/techwireasia.com\/#\/schema\/person\/d8e97bea45593c4c9b0c7c6066bd7e31\"},\"description\":\"Tech Wire Asia presents ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in.\",\"breadcrumb\":{\"@id\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/techwireasia.com\/2022\/01\/ten-cybersecurity-resolutions-for-a-safer-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/techwireasia.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/techwireasia.com\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ten cybersecurity resolutions for a safer 2022\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/techwireasia.com\/#\/schema\/person\/d8e97bea45593c4c9b0c7c6066bd7e31\",\"name\":\"Jamilah Lim\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/techwireasia.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9b60e008809cafe7ef692e8969ffbbba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9b60e008809cafe7ef692e8969ffbbba?s=96&d=mm&r=g\",\"caption\":\"Jamilah Lim\"},\"description\":\"Jam (she\/they) is the editor of Tech Wire Asia. They are a humanist and feminist with a love for science and technology. They are also cognizant of the intersectionality of the above with ethics, morality, and its economic\/social impact on people, especially marginalized\/underdeveloped communities.\",\"sameAs\":[\"jamilahlim\",\"https:\/\/twitter.com\/TechieKitteh\"],\"url\":\"https:\/\/techwireasia.com\/author\/jamilah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","meta-shares":{"featured1":["no"],"featured2":["no"],"featured3":["yes"],"featured4":["no"],"featured5":["no"],"classic-editor-remember":["classic-editor"],"_edit_lock":["1641267946:631"],"_edit_last":["631"],"dfiFeatured":["a:1:{i:0;s:0:\"\";}"],"_yoast_wpseo_content_score":["60"],"_yoast_wpseo_estimated-reading-time-minutes":["3"],"primary-tag-meta-box":["2701"],"story-series-meta-box":[""],"story-series-featured":["no"],"twitter-post-meta-box":[""],"twittertwo-post-meta-box":[""],"twitterthree-post-meta-box":[""],"facebookone-post-meta-box":[""],"facebooktwo-post-meta-box":[""],"video-post-meta-box":[""],"writer-meta-box-dropdown":["Jamilah"],"_yoast_wpseo_focuskw":["cybersecurity"],"_yoast_wpseo_linkdex":["76"],"_yoast_wpseo_metadesc":["Tech Wire Asia presents ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022 in."],"_thumbnail_id":["215164"],"_yoast_wpseo_primary_category":["2372"],"bs_social_share_facebook":["0"],"bs_social_share_twitter":["0"],"bs_social_share_linkedin":["0"],"bs_social_share_reddit":["0"],"bs_social_share_interval":["1641573513"],"meta-shares":["45"],"meta-readers":["776"]},"_links":{"self":[{"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/posts\/215160"}],"collection":[{"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/users\/631"}],"replies":[{"embeddable":true,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/comments?post=215160"}],"version-history":[{"count":5,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/posts\/215160\/revisions"}],"predecessor-version":[{"id":215166,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/posts\/215160\/revisions\/215166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/media\/215164"}],"wp:attachment":[{"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/media?parent=215160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/categories?post=215160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techwireasia.com\/wp-json\/wp\/v2\/tags?post=215160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}