Page 21 - 20v•Cyber Security Strategy 2020-2024
P. 21

Malaysia Cyber Security Strategy 2020-2024  21






























               However, it is important to note        and    networks    which    expose
               that lack of awareness is the main      them to cyber threats.  As the
               factor in most of these fraud cases.    patient records are digitised, the
               In  phishing  incidents,  for  example,   risks of breach and disclosure of
               people can be easily  duped  by         confidential  information  are  also
               bogus sites and services due to         rampant.
               their negligence. The same goes
               for scams whereby unsuspecting          Clearly, much has to be done
               victims   would     transfer   huge     in terms of creating awareness
               amount of money to recipients           among      the   general     public.
               whom they have never met and            This would explain why cyber
               whose  identity  cannot  be  verified   security education will soon be
               – all done for the expectation of       introduced  even  as  early  as
               an honest purchase, attractive          in   primary   education.    Cyber
               investments and even promises of        security  awareness  and  education
               love.                                   aims to educate citizens from
                                                       making  errors  of  judgement  while
               On another alarming note, the           transacting on the Internet.
               healthcare sector now has other
               cyber threat concerns that are          Aside   from   that,   Malaysia   is
               even more worrying than the             also  facing a  shortage  in its
               attacks and intrusions on electronic    cyber   security   workforce   and
               medical records. Medical robotic        talent gaps in many sectors. In
               technology     and    robot-assisted    today’s    constantly   connected
               surgical   procedures    are    now     and    borderless    world,    such
               connected to computer systems           inadequacy can be disastrous
   16   17   18   19   20   21   22   23   24   25   26