Hostile Defence’s enterprise-grade cyber security addresses a worrying market gap in Singapore—that of specialized, managed security as a service in the face of growing cyber security threats.
Disturbing trends have been reported on the IT security scene by KPMG’s freshly released 2011 audit on fraud: Since 2008, more than one in five companies in Singapore have experienced some kind of information technology fraud, with the average number of incidents reported by victims more than doubling from 3.8 in 2008 to 9 in 2011. Hostile Defence utilizes its professional credentials and certifications to address these concerns and to better serve Singapore’s cyber security needs, from the multi-national corporation down to the individual.
Deputy Prime Minister Teo Chee Hean, whilst speaking at the opening of the 11th ASEAN Senior Officials Meeting on Transnational Crime (SOMTC), urged ASEAN countries to focus on keeping secure cyber networks and infocomm infrastructure.
Bob Yap, head of forensic at KPMG Singapore, points out that weak preventative measures on the part of organizations and their staff, rather than any particular ingenuity or sophistication from perpetrators posed the largest problem in Singapore’s IT security situation. While this is true, many individuals and companies are unwilling to be saddled with the extra cost of a fulltime Cyber Security Specialist, and this is where Hostile Defence fills the gap with tailored protection, constant surveillance with real-time updates, swift response to and annihilation of threats.
The KPMG audit also warns that IT fraud will become a bigger risk because technology is "intertwined in every facet of our existence" and businesses are increasingly conducted through IT. Statistics are also sobering: the total estimated cost of fraud incidents increased from S$5.3 million (US$4.3 million) in 2008 to S$6.5 million (US$5.2 million) in 2010. This unnecessary blot on Singapore’s economic charts can be eradicated with Hostile Defence’s managed cyber security services, where clients’ endpoints and perimeters are subject to stringent surveillance, ushering in greater productivity to focus on core businesses and activities.
PROTECT | DETECT | CORRECT |