The Challenges and Solutions of Cybersecurity Among Malaysian Companies

The Challenges and Solutions of Cybersecurity Among Malaysian Companies

Puteri Fadzline Tamyez
DOI: 10.4018/978-1-5225-9078-1.ch005
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The objective of this chapter is to analyze the challenges faced by Malaysian companies in cybersecurity and to determine solution for Malaysian companies to overcome challenges in cybersecurity. The data were collected from the expert people in cybersecurity fields using interview sessions. The finding confirmed that the awareness and budget are very important in other to implement the element of cybersecurity in the company. Cybersecurity is good and desired as a protection for an organization in developing strategic planning to gain more profitability and increase the productivity of goods and services. This research will be beneficial for the organization because it will provide the solution for the company to overcome the cybersecurity issues. From this research, an organization can have potential to enhance competitiveness and understand the problem occur, then do the improvement by implementing cybersecurity.
Chapter Preview
Top

Introduction

Industry 4.0 invites tremendous advantages for companies towards business sustainability. It has nine pillars altogether, namely, internet of things, big data, supply chain, cloud computing, horizontal and vertical integration, autonomous robot, addictive manufacturing, cyber security, simulation and augmented reality. However, the major challenge in facing this digitalization era is on cyber security (Jay Lee, 2016). Privacy and security of the data will always be top security measures that any organization should take. We live in a world where information are secured in digital or a cyber-form. Data from multiple sources has different formats gives difficulty for analysts to integrate the data (Ibrar, 2017). Lack of monitoring and protection against unauthorized changes or alteration will create unwanted changes in data information. Most companies faces inadequate of development phase (Ibrar, 2017), thus makes it important in order to limit the risk of application related assaults or attacks.

The inadequacy of development phase as brought small and medium size enterprise (SMEs) face different risks as compared to large companies, as these organizations have limited and minimum human and monetary resources to apply information technology (IT) and cyber security systems (Heikkila, 2016). Most SMEs own traditional security mechanisms, which could not accommodate the technology of the Internets of Things (IoT) due to limited resources (Ibrar, 2017). Apart from that, they need to overcome the inadequacy of security budget and low security alertness among the workers. Lack of employee training and recovery planning has contributed to its low security alertness among employees (Heikkila, 2016). This finding further elaborates that only a few companies report on the provision of safety-related training for all employees. However, the lack of deployment process shall cause problems in managing the cyber security (Ibrar, 2017).

The inadequacy of security software’s upgradability and patch ability is also one of the issues in cyber security. A number of companies usually do not put much effort in upgrading security software due to lack of resources. The low and inadequacy of physical security will allow and provide an unrecognized user to enter the data or devices using Universal Serial Bus (USB) port. This may cause companies to face many problems. Another issue is trust. Network interactions with systems that have lower standard security will invite more trust issues. Data transference is mostly carried out by wireless network, which increases the probability of miss-data problem to occur (Ibrar, 2017). This may affect in aspects of incomplete or false information. Thus, cyber security is crucial in all industries to make sure all of their data were being safely secured. This research attempts to answer the accompanying inquiry in aspects of the challenges faced by Malaysian company in cybersecurity and the solution for Malaysian companies to overcome challenges in cybersecurity.

Complete Chapter List

Search this Book:
Reset