Ultimate magazine theme for WordPress.

Government Improves Integrated Data Security System to Prevent Cyber ​​Attacks

121

By: Rivka Mayangsari*)

In the rapidly developing digital era, technology has become an inseparable part of the daily lives of Indonesian people. Starting from financial transactions, public services, to access to education and health now rely on digital systems. However, as this dependence increases, society is also faced with a very serious threat: increasingly rampant and complex cyber attacks.

Cyber ​​attacks are no longer a technical issue that is only an internal matter for companies or governments. The impact is very real for the wider community. When a public institution’s information system is hacked, not only is the service paralyzed, people’s personal data can be leaked, identities can be stolen, and even funds in accounts can disappear without a trace. Unfortunately, many people still consider this issue as merely technical, even though cyber attacks are a form of crime that directly targets the security and comfort of people’s lives.

Cyber ​​attacks are no longer a technical issue that is only an internal matter for companies or governments. The impact is very real for the wider community. When a public institution’s information system is hacked, not only is the service paralyzed—people’s personal data can be leaked, identities can be stolen, and even funds in accounts can disappear without a trace. Moreover, the sophistication of AI usage is often misused by irresponsible individuals. Unfortunately, many parties still consider this issue as merely technical, whereas cyber attacks are a form of crime that directly targets the security and comfort of people’s lives.

Reuben Koh as Director, Security Technology & Strategy APJ from Akamai said that his party believes that the threats that can be generated or enhanced by AI will accelerate. Cybercriminals will evolve from fake and phishing scams driven by AI to something much more sophisticated by 2025.

The results of a recent survey from Synology Inc. show that almost 90 percent of information technology (IT) teams in Indonesia experience budget constraints in dealing with the complexity of digital threats. While digital transformation continues to be pushed in various sectors, many organizations still rely on manual systems, outdated devices, and separate management. This situation directly increases the security gaps that can be exploited by hackers to enter the system.

With an unintegrated system, various risks such as data loss, operational errors due to human error, to downtime that disrupts public services are inevitable. As a result, the public becomes the main victim of the weak data protection systems implemented by these institutions. At the same time, external threats continue to increase, marked by ransomware attacks on major world companies such as Casio, TSMC, and Boeing, which prove that even sophisticated systems remain vulnerable if not supported by a comprehensive data security system.

This is where the importance of adopting integrated security technology comes in. Data protection platforms such as Synology ActiveProtect Appliance are present as a comprehensive solution that can reduce the risk of data leakage and accelerate system recovery in the event of an attack. This platform combines integrated backup technology, centralized management, storage efficiency with global deduplication, and protection against ransomware attacks through offline backup and disaster recovery simulations.

Technology like this is not only a corporate need, but a strategic need to protect the public. When personal data such as ID cards, NPWP, or medical records are leaked, the impact will be very serious for ordinary people. Therefore, public support for the implementation of advanced security technology needs to be strengthened both through public policy encouragement, and through collective awareness in choosing safe and trusted digital services.

In addition, the public and private sectors need to work together to provide comprehensive data protection. Telkom Solution, for example, emphasizes its commitment by presenting end-to-end cybersecurity services that fortify digital systems from all sides. The approach used by Telkom includes protection of networks, applications, and user layers, including through DDoS attack mitigation, endpoint threat detection, and privacy protection in applications that are often used by the public.

The solutions offered by Telkom do not only rely on networks, but also touch on the human layer, an aspect that is often overlooked. Security gaps often occur not because of system damage, but because of user error in accessing dangerous links, using unsafe devices, or sharing personal information carelessly. Therefore, the public must continue to be educated to be wiser in using technology.

Cyber ​​Security Servicesty is here as a comprehensive digital security solution that fortifies business operations from the ever-growing spectrum of cyber threats. This was explained by OVP Enterprise Marketing & Regional Management Telkom, Reni Yustiani. According to her, through collaboration with global technology partners, Telkom Solution is able to ensure a multi-layered security system, to protect customer data and information optimally

Telkom subsidiaries such as Digiserve and TelkomSigma also play an important role. Digiserve presents Cyber ​​Threat Intelligence which is able to analyze systems from the outside to detect weaknesses before they are exploited. TelkomSigma, on the other hand, integrates services such as Prisma Access Browser and Web Application and API Protection (WAAP) which are increasingly relevant amidst the trend of an open and connected API-based economy.

Telkom Solution Cyber ​​Security Guardian, Radian Muhammad, said that the cybersecurity solutions offered by Telkom Solution are complementary and not limited to the network layer, but also to the human layer.

In the future, Telkom Solution plans to implement the Defense in Depth strategy, a layered approach that touches on all aspects of security from physical, digital, to user behavior. This system is equipped with real-time monitoring and the use of artificial intelligence (AI), such as automatic video analysis to monitor suspicious movements in the data center. This strategy is not just prevention, but a proactive effort to detect and address threats before they have a greater impact on society.

Although technology and solutions continue to develop, data protection will not be optimal without active community participation. Digital awareness must be built collectively. Starting from recognizing signs of online fraud, using strong passwords, not carelessly opening suspicious links, to protecting personal devices with adequate antivirus.

In the midst of the torrent of digital attacks that can occur at any time, the Indonesian people must unite to build a strong digital defense. The government, business sector, technology providers, and the community must work together to create a safe, fair, and sustainable digital ecosystem. Because in the end, cybersecurity is not just about data but about protecting the rights, dignity, and future of the nation.

*) IT observer

[ed

Leave A Reply

Your email address will not be published.