Page 62 - Anual report STi 2022_eng
P. 62
● Increase construction safety measures and ● Rehearse and test data recovery systems regularly
supervision of construction methods that cause noise at least 1 time a year.
pollution, dust, and smoke to a minimum by arranging for ● Use White Hat Hackers to exploit the security of the
safety officers of the Company to inspect periodically and Company's information technology systems to identify
report the audit results to the executives for follow-up. vulnerabilities and provide protection against them.
● Use BIM technology to inspect designs for defects Risk From Changes in Engineering Technology
before construction to reduce the need for dismantling which Nowadays, working methods are being developed by
causes dust and noise problems. It also helps to control the bringing modern technology together in various steps in
working time according to the plan.
engineering consulting work in design, project feasibility study,
2.2.4 Risks from Other External Factors and project management and construction supervision, as
Risk From Internet or Cyber Threats well as inspecting work to increase work efficiency, increase
Nowadays, the business sector has changed the way it the quality of the work, and be able to meet the needs of
operates and the way it works by using information technology various project owners. The development of this engineering
in both work processes and organizational management, such technology affects the Company Group’s way of working or
as the use of a system in the process of quality inspection personnel who lack expertise in such matters.
and construction progress, linking information of various Guidelines for risk management from changes in
departments, and contacting relevant persons of the engineering technology are as follows:
companies through the Internet. As a result, the business ● Study and monitor changes from the use of
operations of the Company Group are more vulnerable from technology in work and prepare employees to start learning
internet or cyber threats, such as attacks on the network new technologies, such as using drones for survey work for
system or access to material inside information of the design work or to monitor construction progress.
Company Group in order to destroy or use such inside ● Invite technology experts to give lectures to
information in any way that causes damage. Such threats employees and be aware of changes that may affect future
may affect the financial, business operations, and reputation work.
of the Company Group.
● Collaborate or find ways to invest in companies with
Guidelines for risk management from internet or cyber technological innovations that can be used to develop or
threats are as follows:
extend the work.
● Install a security protection system for communication ● Determine policies and train employees at all levels
or data transmission on the Secure Sockets Layer (SSL) to be able to use the innovations developed or procured by
network to increase data security.
the Company with expertise or skill by having to measure the
● Set up a Disaster Recovery (DR Site) system to store implementation and extending that innovation.
all backups of office servers at STI Headquarters at Soi
Chokchai Ruammit (Ratchada 19) and AEC offices at Sathorn
Thani Building by installing a backup server in a crossover
format and able to use the office space of each company as
a backup area in case of unexpected events.
60 Annual Report 2022 (56-1 One Report)