{"id":24574,"date":"2022-10-18T13:50:29","date_gmt":"2022-10-18T05:50:29","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24574"},"modified":"2022-10-18T14:56:51","modified_gmt":"2022-10-18T06:56:51","slug":"cyber-security-month-detecttoprotect","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/cyber-security-month-detecttoprotect\/","title":{"rendered":"Cyber Security Month #DetectToProtect"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24576 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=696%2C364&#038;ssl=1\" alt=\"\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/>Today, cyber security has become a global concern due to the increasing number of cybercrime cases. Cyber security plays a key role in helping to navigate and prevent cyber threats on personal or business data.<\/p>\n<p>Everyone can be a victim from a cyberattack. In 2021, 79% and 65% of organisations in Malaysia and Singapore were hit by ransomware respectively.<\/p>\n<p>To enhance awareness and the buzzword of cyber security for everyone. Exabytes in collaboration with Acronis organised a virtual Cyber Security Webinar on 11 Oct, 10.00 am \u2013 11.30 am.<\/p>\n<p>Cyber Security Webinar is aimed at increasing awareness and delivering the message on the importance of cyber security to the public, especially for businesses and organisations.<\/p>\n<p>The webinar saw experts in this subject matter as speakers, namely: Mr. Eric Foo, Mr. Kevin Foo and Mr. Irzal Ramadlani who shared insights on how to prevent and protect your data from ransomware attack.<\/p>\n<p>Below is an overview of the webinar that was discussed by our invited speakers to help you prevent and practice your cyber security easily!<\/p>\n<h3><strong>What is Ransomware Attack?<\/strong><\/h3>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/cyber-threats-you-should-be-aware-and-prevent\/\" target=\"_blank\" rel=\"noopener\">Ransomware attack<\/a> is a type of malware that threatens and encrypts your personal or business data from anywhere. Hence, cybercrimes will demand a ransom payment to unlock or restore the important data for the victims. Otherwise, they will gain profit from stealing your data by selling it on the dark web market.<\/p>\n<p>There are two common types of ransomware attacks: Locker ransomware and Crypto ransomware.<\/p>\n<h3><strong>Five Challenges in Managing Cyber Security<\/strong><\/h3>\n<ul>\n<li><span style=\"font-weight: 400;\"> \u00a0 <\/span> <span style=\"font-weight: 400;\">Shortage and attrition of skilled and experienced cyber security personnel<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 <\/span> <span style=\"font-weight: 400;\">Stringent government policies on cyber security standards and compliance<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 <\/span> <span style=\"font-weight: 400;\">The growing number of unknown cyber threats within an organisation undetected is like a time bomb<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 <\/span> <span style=\"font-weight: 400;\">Lack of cyber threats visibility across the organisation which may come internally or externally<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> \u00a0 <\/span> <span style=\"font-weight: 400;\">No or limited in-house 24&#215;7 cyber security monitoring and response capabilities<\/span><\/li>\n<\/ul>\n<h3><b>The Ways to Prevent and Protect Your Data<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To track and prevent the security threats, exabytes Enterprise Managed Security Services (MSS) provides 24&#215;7 SOC System Logs Collection, Correlation &amp; Anomaly Detection to reduce the time from discovery to resolution. It focuses on monitoring the customer environment through correlation in terms of detecting any anonymous activities, such as anomaly detection, suspicious activity and unauthorised activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a leader in cyber protection, Acronis Cyber Protect Cloud not only supports more than 20 workload types from infrastructure to SaaS apps, but also provides file-level backup and full image backup to safeguard your data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It helps to keep your data in better way at lower cost involving five stages of protection, which are prevention, detection, response, recovery and forensics.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Explore all the possibilities of protecting your data with cyber security: <a href=\"https:\/\/www.exabytes.sg\/detect-to-protect\" target=\"_blank\" rel=\"noopener\">www.exabytes.sg\/detect-to-protect<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today, cyber security has become a global concern due to the increasing number of cybercrime cases. Cyber security plays a key role in helping to navigate and prevent cyber threats on personal or business data. Everyone can be a victim from a cyberattack. In 2021, 79% and 65% of organisations in Malaysia and Singapore were [&hellip;]<\/p>\n","protected":false},"author":105,"featured_media":24576,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293,6],"tags":[553,532,551,552],"class_list":{"0":"post-24574","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"category-exabytes-events","9":"tag-detecttoprotect","10":"tag-acronis","11":"tag-cyber-security","12":"tag-ransomware"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/10\/Cyber-Security-Month.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6om","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24574"}],"version-history":[{"count":5,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24574\/revisions"}],"predecessor-version":[{"id":24587,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24574\/revisions\/24587"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24576"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}