Generally, Cybersecurity is increasingly central point of national security strategy day by day. Within this realm, Center for Strategic and International Studies (CSIS)’s work covers cyber warfare, encryption, hacking, financial terrorism, and more. Where else in Malaysia, according to the Global Cybersecurity Index (GCI) 2017, among the 193 countries in terms of its commitment to cybersecurity, Malaysia is the third ranking. Malaysia achieved a score of 0.89, behind Singapore and the United States according to GCI (The Star, 2017). There a few of cybersecurity sector such as accounting and banking, sales and marketing, IT and networking, education and government.

There are a few cases which occurred and related to the IT and Networking sector globally and locally. In a global section, there is a case where T-Mobile has reported a security incident which may have led to the exposure of personal data belongs to the nearly about two million customers in this world. In a statement, the telecommunications giant said that a recent “incident” may have given a cyberattacker brief access to customer records. One of the T-Mobile staff has detected an unauthorized entry into the company’s network. Data breach that involved customer names, billing ZIP codes, phone numbers, email addresses, account numbers, and account types are believed while the intrusion was rapidly shut down. But he says that “None of your financial data (including credit card information) or social security numbers were involved, and no passwords were compromised.” and T-Mobile has reported this thing to authorities. According to T-Mobile spokesperson, 3 percent of its 77 million customers, or approximately 2 to 2.5 million customers cybersecurity incident has been affected. The company also didn’t revealed any thoughts behind who may be behind the intrusion and threat actors who are “international”. T-Mobile says that all customers who have been affected will be notice soon. In May, there is a bug that some of researches found in T-Mobile’s website which allowed people to access the personal data of customers by only using phone number. In order to access internal tools, staff members use subdomain to find via search engines. Once a phone number was tagged onto the end of the web address, the customer information will be appear on the screen and the information will also include their full name, address, account numbers, and account records, (Osborne, 2018).

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!

order now

In Malaysia, CyberSecurity Malaysia has received between 9,000 and 10,000 incident reports each year on various matters of contention happening in cyberspace. According to the chief executive officer Datuk Dr Amirudin Abdul Wahab, one of the reported incidents were data breaches, classified under the intrusion category. He added that this category also includes hacking and they have seen a rising trend (over the last few years) for data breaches. In year 2017, there is a case where the data leaked involving data of 46.2 million Malaysian mobile phone customers. It was reported that a data comprising mobile phone numbers, identification card numbers, home addresses, IMEI and SIM card data had been leaked. The data breach was first reported by public online forum, which said it had received information that someone was trying to sell huge databases of personal information. In addition, the databases are also believed to contain private information of more than 80,000 individuals, leaked from records of the Malaysian Medical Council, the Malaysian Medical Association, and the Malaysian Dental Association. However, the CyberSecurity Malaysia have seen a four-fold increase with 22 reported incidents on data breaches (alone) and it shows now that data breaches are a concern. Individuals as well as organisations would do well to adopt best practices, (Abas, 2017)