We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I acceptHome > Resources Center > Blog
2024-12-20
Cybersecurity incidents are constantly occurring, with another recent data breach involving a public institution in Hong Kong resulting in the exposure of personal data belonging to over 17,000 citizens, including identification details, addresses, and phone numbers. According to the investigation released by the Office of the Privacy Commissioner for Personal Data, Hong Kong (PCPD), the institution uploaded and retained the data on a contractor's cloud platform without explicitly requesting the contractor to delete the relevant data. Under the mistaken assumption that the data would be deleted by the contractor upon contract expiration, this oversight allowed unauthorized access to the data on the cloud platform without the necessity of entering login credentials.
This incident underscores the imperative for businesses to exercise prudence when selecting cloud services. Opting for reliable and seasoned providers is paramount in ensuring the security of cloud-based data. Additionally, enterprises should formulate robust cybersecurity mechanisms and policies, enhance employees' security awareness, implement appropriate cybersecurity solutions to address system and network vulnerabilities, and ensure compliant data processing practices to uphold the security of sensitive information.
A robust and stable IT infrastructure stands as an essential component for propelling business innovation and ensuring steadfast growth. As your trusted ICT service provider, CITIC Telecom CPC not only offers high-quality cloud services but also provides comprehensive ICT hosting services to build a solid foundation of "Cloud, Network, Intelligence, and Security" for customers, achieving high-quality business development.
As an experienced cloud provider serving various industries, our SmartCLOUD™ cloud solutions can provide enterprises with one-stop highly customized, intelligent, rapid, and reliable cloud services. It allows us to effectively optimize the performance and stability of business-critical applications, enabling enterprises to focus on their core business development while ensuring business continuity.
To safeguard enterprises' cloud multi-assets, we also offer various security protection services such as Privileged Account Management (PAM), with the ability to manage privileged account identities and activities based on demand, facilitating approval processes, privileged password management, daily monitoring, and audit requirements to ensure cloud and data security effectively. Notably, our expert team manages cloud services without necessitating the disclosure of any keys or passwords, with every operation meticulously documented, significantly boosting customer confidence in data security.
As your trusted TechOps Security Enabler, TrustCSI™ 3.0 utilizes AI to revolutionize the core capabilities of Security Operations Centers (SOCs). Leveraging three of our self-deployed and self-managed SOCs and our team of security experts, our TrustCSI™ Managed Security Service (MSS) can provide 24x7 proactive monitoring, identify and analyze vulnerabilities, prioritize threats as well as refine security strategies and enterprise processes.
With our “AI-Red/Blue Cybersecurity Practices”, it enables enterprises to regularly “stress test” scenarios and systems, elevating employee defense capabilities to ensure proper handling of confidential data through established mechanisms and procedures, and proactively identify the potential risks for fast remediation. Coupled with our series of cybersecurity solutions, including Secure Access Service Edge (SASE), Unified Threat Management (UTM), Next Generation Firewall (NGFW) and Web Application Firewall (WAF), User and Entity Behavior Analytics (UEBA), and Network Traffic Analysis (NTA), along with email security solutions, we forge multiple layers of defense barrier for enterprises.
In today's dynamic digital landscape, a holistic outlook on one's cloud services and data security, coupled with efficient utilization of cloud resources and agile responsiveness, emerges as the cornerstone of contemporary business success. To learn more about our comprehensive ICT solutions, please feel free to consult our team of experts.
General Enquiry:
+372 622 33 99
Sales Hotline:
+372 622 33 60
Service Hotline +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited
Thank you for your enquiry.
