• Newsletter
  • Contact
  • Press Releases
Friday, June 6, 2025
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Login
  • Register
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
No Result
View All Result
Home News

Zoom reveals schemes to avoid cyberattacks in 2023

Sinta by Sinta
April 17, 2023
in News, Technology
0
Zoom

Zoom reveals how to avoid cyberattacks in 2023.

Share on FacebookShare on Twitter

Zoom found that 1.6 billion traffic anomalies were recorded in 2021 with 62% of these anomalies categorized as malware based on the BSSN report.

Heaptalk, Jakarta — The increasing number of internet users in Indonesia also increases the vulnerability of users’ cybersecurity. The National Cyber and Encryption Agency (BSSN) reported that there were 1.6 billion traffic anomalies recorded in 2021 with 62% of these anomalies categorized as malware, and 1.6 million advanced persistent threat (APT) activities recorded in the same year.

The rise of cybersecurity hacks is also emerging as more companies expand their digital footprints by adopting hybrid work styles. Along with that, cyber threats will evolve and become more sophisticated. The condition forces companies to build a robust cybersecurity framework against threats as part of their long-term business strategy.

World Ai Jakarta 2025
World Ai Jakarta 2025

Chief Information Security Officer at Zoom Michael Adams shared his views on issues that companies need to anticipate in the next year covering several main points, from strengthening cybersecurity to increasing dependence on cloud technology.

Michael suggested cybersecurity team leaders increase their focus on strengthening cybersecurity. “While the primary focus of cybersecurity programs will remain on protecting companies from cyber threats, we can expect an increased focus on cyber resilience,” said Michael in a written statement.

Cybersecurity does not only cover protection but also recovery and continuity in a cybersecurity-related incident. Investing in resources to protect companies from cyber threats as well as in people, processes, and technology is essential for mitigating the impact of cyberattacks and continuing company operations after cybersecurity-related incidents.

Cyberattacks may use deep-fake technology and artificial intelligence

In addition, cybersecurity teams need to protect companies from increasingly advanced spear phishing and other social engineering attacks. The sophistication of spear phishing and other social engineering attacks makes it difficult to identify the perpetrators of the attack, which makes the process of defending companies against perpetrators even more challenging. Michael delivered, “We can expect increasingly advanced social engineering attacks in the next year, which use deep-fake technology and artificial intelligence.”

Instability in the software supply chain may provide cracks for large-scale cyberattacks. Michael mentioned an example of The United States that has taken steps through an Executive Order to secure the software supply chain for government agencies. Many companies also carry out strategies to strengthen their cybersecurity, from considering a zero-trust approach to scaling up the security of infrastructure services, spanning code signing, and release process hardening.

Further, Michael warned that rising reliance on cloud service providers can open up greater opportunities for cyberattacks against enterprises. The flexibility that cloud technology offers allows more companies to deploy cloud technology to numerous areas and enables a variety of unique implementations to cloud technology.

However, by doing so, companies also expand the opportunities to be attacked. “Enterprise IT team leaders also need to implement a thorough evaluation process for these third parties and understand the technology they use for the backend,” said Michael.

Zoom recognizes that user security and privacy are fundamental aspects of a company’s accomplishment. Although multiple features are available to maintain information security on the Zoom platform, Michael suggested users do these things to prevent hacking during meetings, including applying waiting rooms, locking the meeting room, controlling chat features and screen sharing, as well as utilizing the remove participants feature.

Tags: cyberattackcybersecurityZoom

Related Posts

Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program

Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program

June 5, 2025
KL1 Phase 2 has been completed. Credit: Equinix

Equinix completes KL1 Phase 2 data center in Kuala Lumpur

June 2, 2025
Commemorating Professor Soemitro's 108th anniversary at Soemitro Center (05/29). Credit: Haris

Soemitro Center: A platform for Indonesia’s young economists

May 31, 2025
Lifree breathable adult diapers can help improve skin health. Credit: Haris

Unicharm research: Lifree improves quality of life for elderly

May 31, 2025
Xiaomi's premiumization strategy has yielded positive results in Q1 2025. Credit: Sinta

Applying premiumization strategy, Xiaomi gains 64.5% net profit jump in Q1 2025

May 31, 2025
Kaspersky appointed Defi Nofitra as first country manager for Indonesia. Credit: Kaspersky

Kaspersky appoints Defi Nofitra as first country manager for Indonesia

May 31, 2025
  • 32321

    New tech layoff chapter, Microsoft lays off thousands of its cloud unit ‘Azure’

    1 shares
    Share 0 Tweet 0
  • Nokia rolls out 6600 5G Ultra

    0 shares
    Share 0 Tweet 0
  • Performing a second layoff round, Morgan Stanley to reduce 3,000 workforces in Q2 2023

    1 shares
    Share 0 Tweet 0
  • TikTok Shop to reach a US$15 billion in its GMV transactions

    1 shares
    Share 0 Tweet 0
  • International Women’s Day – Opportunity for Businesses to Support Women in the Workplace

    0 shares
    Share 0 Tweet 0
the 10th world battery & energy industry expo 2025World Ai Jakarta 2025
Heaptalk business news logo

We Build an Ecosystem by Sharing Business News, Headlines and Expert Talks in Professional Perspective and Positive Point of View. Latest business news media headlines platform today.

Recent Posts

  • Paving the Way for Expatriate Homeownership: Savyavasa and Permata Bank Launch Exclusive Foreign Mortgage Program
  • Equinix completes KL1 Phase 2 data center in Kuala Lumpur
  • Soemitro Center: A platform for Indonesia’s young economists
  • Unicharm research: Lifree improves quality of life for elderly
  • Applying premiumization strategy, Xiaomi gains 64.5% net profit jump in Q1 2025

Follow Us

Facebook
Twitter
LinkedIn Youtube Instagram RSS

Newsletter

  • About Us
  • Editorial
  • Newsletter
  • Contact
  • Privacy Policy
  • Cyber Media Guidelines
  • Disclaimer
  • SOP Perlindungan Wartawan

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • News
  • Technology
  • Industry
  • GovAct
  • Events
  • Whats on
  • Expert Talk
  • Insight
  • Sustainability
  • Newsletter
  • Press Releases
  • Login
  • Sign Up

© 2024 Heaptalk.com