{"id":7054,"date":"2024-07-04T15:05:25","date_gmt":"2024-07-04T08:05:25","guid":{"rendered":"https:\/\/nawakara.com\/id\/?p=7054"},"modified":"2024-07-10T15:09:08","modified_gmt":"2024-07-10T08:09:08","slug":"serangan-siber-semakin-mengintai-ini-komitmen-nawakara-menjaga-keamanan-data-informasi-melalui-implementasi-standar-internasional","status":"publish","type":"post","link":"https:\/\/nawakara.com\/en\/serangan-siber-semakin-mengintai-ini-komitmen-nawakara-menjaga-keamanan-data-informasi-melalui-implementasi-standar-internasional\/","title":{"rendered":"Cyber Attacks Are Increasingly Looming? Here\u2019s Nawakara\u2019s Commitment to Securing Data Information Through the Implementation of International Standards"},"content":{"rendered":"<p>Jakarta \u2013 In a digital era full of innovation and connectivity, cyber security has become a non-negotiable necessity for every institution and corporation. With the increasing sophistication of cyber attacks, it is crucial for society and companies to enhance their vigilance and the security of their data information. Here, the ownership of data security systems to protect against theft, destruction, and loss of data information becomes paramount.<\/p>\n<p>As a security service company, Nawakara not only strives to secure data through the application of appropriate technology and policies but also through a sustained commitment to data information security standards. This includes preparing for certification through ISO 27001:2022 Information Security Management System (ISMS).<\/p>\n<p>Nawakara&#8217;s Information Technology Division Head, Eman Mulyaman, explained the importance of safeguarding both internal and external data information. As part of Nawakara\u2019s commitment to cyber security, the company makes data information security the main foundation for building trust with business partners.<\/p>\n<p>\u201cAt Nawakara, we not only implement advanced technology and strict policies. Currently, Nawakara is fulfilling standard procedures for ISO 27001:2022 Information Security Management System (ISMS) certification. Regarding internal and external data information security, Nawakara personnel have undergone training and awareness related to ISO 27001, as well as conducting penetration tests (pentest) and simulation tests on (servers, databases, applications) that meet the requirements. This certification process involves a thorough evaluation of data information security processes and policies to ensure that the organization meets the highest standards in cyber security,\u201d he explained during an interview on Thursday, July 4, 2024, at Nawakara\u2019s Head Office.<\/p>\n<h3>How to Secure Data Information from Cyber Attacks<\/h3>\n<p>In their work, Nawakara&#8217;s IT team is tasked with securing various types of data, including internal data related to the company\u2019s daily operations and external data related to clients and partners. This protection covers everything from employee personal data to client information.<\/p>\n<p>To face the ever-evolving cyber threats, here are some effective steps Nawakara takes to protect data from potential cyber attacks:<\/p>\n<p><strong>1. Using Strong Data Encryption<\/strong><\/p>\n<p>Encryption is one of the most effective ways to protect data. By encrypting information, data is converted into code that can only be read with the correct decryption key. Nawakara implements data encryption to ensure that sensitive information, whether stored or transmitted, remains safe from unauthorized access.<\/p>\n<p><strong>2. Implementing Two-Factor Authentication<\/strong><\/p>\n<p>Two-factor authentication adds an extra layer of security by requiring two forms of identity verification: something you know (like a password) and something you have (like an OTP code sent to your phone). This way, the security of system and application access is expected to increase significantly.<\/p>\n<p><strong>3. Regular Software Updates<\/strong><\/p>\n<p>Outdated software often has vulnerabilities that hackers can exploit. Regular updates ensure that security patches are applied, reducing the risk of cyber attacks. Don\u2019t forget to also implement proactive monitoring systems and threat detection solutions to quickly identify and respond to cyber attacks.<\/p>\n<p><strong>4. Educating Employees About Phishing and Scams<\/strong><\/p>\n<p>Humans are often the weak link in cyber security. Nawakara invests time and resources in training their employees about the risks and signs of phishing and scams. Continuous education helps create a strong first line of defense: alert and informed employees.<\/p>\n<p><strong>5. Regular Data Backup<\/strong><\/p>\n<p>A crucial step is to regularly back up data information. The benefits include duplicating, restoring data if lost, providing data security, ease of data access, and anticipating operational system problems. Don\u2019t forget to also test data recovery procedures to ensure that data can be quickly restored in case of a security incident.<\/p>\n<p>\u201cWith these measures, Nawakara demonstrates a strong commitment to protecting data information from various cyber threats, ensuring the integrity, confidentiality, and availability of managed data. This not only provides optimal protection for the company\u2019s digital assets but also strengthens stakeholder trust in Nawakara&#8217;s ability to face cyber security challenges in this digital era,\u201d Eman concluded.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jakarta \u2013 In a digital era full of innovation and connectivity, cyber security has become a non-negotiable necessity for every institution and corporation. With the increasing sophistication of cyber attacks, it is crucial for society and companies to enhance their vigilance and the security of their data information. Here, the ownership of data security systems [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7055,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-7054","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-berita"],"_links":{"self":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/7054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/comments?post=7054"}],"version-history":[{"count":2,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/7054\/revisions"}],"predecessor-version":[{"id":7057,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/posts\/7054\/revisions\/7057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media\/7055"}],"wp:attachment":[{"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/media?parent=7054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/categories?post=7054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nawakara.com\/en\/wp-json\/wp\/v2\/tags?post=7054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}