Review of ICTO Information Security

The Internet technology is evolving rapidly and getting sophisticated with the technological advancement in recent years. Users, system administrators and managers are faced with the ever-changing hacking techniques on regular basis. In this rapidly changing IT environment, the traditional methods may not be sufficient to defend against the increasing and more severe cyberattack scenarios.

In 2018, phishing scams and network attacks have rapidly grown posing huge threat to global information security (IS). ICTO has reviewed existing information security related safeguards, internal controls and deficiencies. ICTO carried out the rearrangement of existing equipment and internal control procedures as well as made-up to tackle the deficiencies. We have also taken some measures to protect against the phishing attacks and other IS threats.

  Details
11 Meetings & Briefings Held meetings and briefings with committees and task teams to keep raising IS awareness
9 Tasks
  • Automatically blocking the related accounts when suspected compromised accounts occurred
  • Hidden the public address book of UM@Connect email service
  • Completed 3-tier anti-spam and anti-malware for staff email system
  • Reviewed and renewed the End-point security tool
  • Defined IS questions database.
  • Keep updated the patch systems and collect threat intelligence from different channels for defending
  • Enhanced the system event management
  • Keep going on performing regular security scanning for IT systems and infrastructure
  • Perform annual self-auditing for IT system and infrastructure
8 Guidelines /Procedures Released totally 8 guidelines or procedures to cover system security, user account security, IS incident handling, data protection, asset management, IT crisis management and contingency, and self-assessment
7 Studies
  • Enhancement of multi-tiered firewall architecture
  • Anti-spam solution for UM@Connect email service
  • End-point Virtual Patch solution proactively to shield vulnerabilities before they can be exploited
  • Two-factor authentication solution
  • The privileged account management solution for IT system and infrastructure
  • The plan to achieve the alignment of ISO27001 IS management international standard
  • Professional service provider for independent assessment and audit for information security
4 IS Awareness Monthly Tips
2 Sessions Information Security Seminar 2018 (Seminar Content | Training Events)
1 Framework Four major principles: “Guarding”, “Prevention”, “Management” and “Audit & Assessment”

Plan for Coming Years

ICTO will keep performing regular IS related tasks to ensure information security. Moreover, we will keep an eye on the trend of market change, technology change and timely adjust the IS strategy.

2018-12-18T16:33:44+00:00 18 Dec 2018|