689Cloud – Vietnam-based Cybersecurity Startup receive funding from Singapore’s ICE71

Innovation Cybersecurity Ecosystem at BLOCK71 (ICE71), a Singapore-based cybersecurity entrepreneur hub, has unveiled the 10 startups that got funding through its ICE71 Accelerate program. The companies, which received roughly US$22,000 each, hail from Singapore, India, Turkey, Vietnam, the UK, and the US.

The startups were introduced at this year’s ICE71 Accelerate Demo Day in Singapore, where they pitched their ideas and technologies to investors and cybersecurity leaders. After Demo Day, ICE71 will continue to support the selected 10 through further fundraising, product development, and commercial expansion, according to a statement.

Here are the cybersecurity startups from ICE71 Accelerate’s second cohort.

  • 689Cloud uses rights management technology to protect, track, and control access rights on externally shared digital documents, preventing data leaks and unauthorized redistribution of confidential data.
  • Aversafe provides credential issuance and verification network services that connect employers, individuals and credential issuers together to prevent forgery and counterfeiting of credentials and licenses.
  • Blue Phish provides an online platform of e-learning modules to drive cybersecurity awareness and play a part in reducing the number of cyber attacks that – 95% of the time – are created due to human error .
  • GuardRails makes open-source security tools, which have been tuned to only report high-impact security issues, available in GitHub Pull Requests.
  • Infra builds automated solutions for assessment and intelligence without the need for security analysts.
  • Keyless provides a privacy-first platform for authentication and identity management driven by secure biometrics.
  • Loki provides cloud-based, single point management cybersecurity and network management services for small and medium-sized enterprises using SD-WAN technology in SaaS model.
  • OneKIY addresses data privacy and security and runs on a decentralized, user-controlled security system. Coupled with an applications marketplace, users can download relevant apps to take full advantage of their KIY (keep it yourself) token.
  • PhishBase operates as a mail transfer agent that analyzes emails flowing in and out of the system.
  • Seconize offers an enterprise IT risk assessment product that identifies cyber risks and translates them to continuous business impact.

A partnership between Singtel Innov8 and the National University of Singapore’s NUS Enterprise, ICE71 also said that it’s now accepting applications for the third cohort of its accelerator program.

Read more news:

Easy and Secure File Sharing for Company Executives

Large companies must share confidential reports and other information with their top executives including the Board of Directors. In this case, security and confidentiality is most important.

689Cloud is an easy and secure way for companies to share data with their top executives

Improve Productivity ⇒ Get more Profit

  • 689Cloud is more efficient and easier than E-mail, FTP, or on-premise solution
  • Remote access for travelling and remote executives
  • Improve the speed of communication in the company

Improve Security ⇒ Compliance with Law / Reduce Risk

  • 689Cloud can protect sensitive documents so that only authorized people can open
  • More secure than E-mail or other ways
  • Stop copy, print, screen capture to prevent data leaks and spying
  • Comply with regulations for disclosure of sensitive information
Data Threat Report Financial Services

10 Reasons Why You Need Rights Management in the Cloud – Part 3

Reason 3: Information has a “Best Before” Date Too

Most people are keenly aware of the “Best Before” date on food items such as eggs or milk. This date, which indicates the how long the product can be safely (and enjoyably) consumed, is an important data point since no one wants to eat a rotten egg.

However, when it comes to data, especially data that has been shared on the Cloud, people are not as careful. Consuming data that is no longer current, or past its’ “Best Before” date can be even more damaging than drinking stale milk. Yet, when sharing documents in the Cloud, most users have no way of ensuring that stale data is no longer consumed.

Rights management allows users to set an “Expiry Date” on documents so that it can no longer be used after a certain date. In this way, rights management can protect you from consuming stale or spoiled data; just like that label that keeps us from eating bad food.

10 Reasons Why You Need Rights Management in the Cloud – Part 1

Reason 1: Files in the Cloud Travel – Far and Fast

Cloud File Sharing, Messaging, and Social Networks have made it super easy to share documents in the cloud. But do you know where those files you shared are now? Who has seen them; colleagues, partners, or god forbid, competitors? What about those documents that are now out of date, or are flat-out wrong?

Rights management allows you to control who can see your documents, even after they have been shared and downloaded. Documents that are shared can be revoked if they become out of date. Rights management puts you in control of your documents in the cloud.

Data breach from the first half of 2017

The data breaches in the first six months of the year (2017) came from a variety of sources. But in a major twist, the biggest source of lost records via data breaches was accidental loss and/or inadvertently leaving data exposed.


The reasons Average Data Breach Costs millions USD

Most organizations have no idea how data breaches can cost so much! Follow IBM Security and Ponemon Institute report in 2017,  the global average cost of a data breach is $3.62 million

Most data breaches continue to be caused by criminal and malicious attacks. These breaches also take the most time to detect and contain the threat and have the highest cost per record.

10 main costs of a data breach are listed below.

  • Remediation

    The mean number of days to resolve cyberattacks is 46 at an average cost of $21,155 per day – or a total cost of $973,130. Resolution does not necessarily mean that the attack has been completely stopped, as some attacks remain dormant and undetected.2

  • Loss of Customers

    Of 2,000 adults interviewed in the U.S. this past April by independent technology market research specialist Vanson Bourne, 76 percent said they would move away from companies with a high record of data breaches.

  • Business Disruption

    On an annualized basis, business disruption accounts for 39 percent of total external costs, which include costs associated with business process failures and lost employee productivity.3If a business gets disrupted during its busy season, the cost could affect more than half the business’s annual income.

  • Regulatory Fines

    There could be fines from the Federal Communications Commission (FCC), Federal Trade Commission (FTC), Health and Human Services (HHS) the Payment Card Industry Data Security Standard (PCI DSS) and other regulatory agencies.

  • Legal Costs

    Three lawsuits were filed against Anthem less than 24 hours after it disclosed a breach. Target Corporation, Home Depot and Sprouts are but a few of the numerous organizations that have had class-action lawsuits filed against them in relation to a data breach. Some companies have had to pay upwards of $10 million to settle and those costs don’t include charges paid to their legal teams.

  • Public Relations

    A breach entails harm to an organization’s brand and reputation, contact with the media, increased customer acquisition activities and diminished goodwill. Normally a PR call center will need to be established to keep the media, victims, stakeholders and employees informed of the aftermath.

  • Breached Client Records

    The average cost for each lost or stolen record containing sensitive and confidential information increased from $217 from the 2015 study to $221 this year.4 The 2016 Cost of a Data Breach U.S. study examines the costs incurred by 64 U.S. companies in 16 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims as required by various laws. The study does not include cases involving more than 100,000 compromised records to avoid skewing the results.

  • Direct Financial Loss

    Once attackers breach your network, they may be able to obtain access to your financial accounts to wire money to accounts they control.

  • Notification Costs

    Forty-seven states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private and public sector entities to notify individuals of security breaches of information involving personally identifiable information. Regulations such as PCI and HIPAA, also require disclosure to consumers whose data has been breached. There’s the cost of postal expenditures, secondary mail contacts or email bounce-backs and inbound communication set-up. This year’s average notification costs increased slightly from $0.56 million in 2015 to $0.59 million so far in 2016. Notification to individuals must be by first class mail unless the individual has agreed to electronic notice.

  • Credit Card Reissues, Identity Theft Repair and Credit Monitoring

    A report from the U.S. Consumer Bankers Association (CBA) indicates that re-issuing cards affected by the Target data breach cost over $172 million. Identity theft repair and credit monitoring cost about $10 per victim.

    Certain factors reduced the cost of data breach. Having an incident response plan and team in place, extensive use of encryption, employee training, Business Continuity Management (BCM) involvement and extensive use of data loss prevention technologies are viewed as reducing the cost of data breach.

Cyber Security Webinar

Cyber Security Webinar (ISO 27001) – Dec 1, 2017

This webinar is an overview of the ISO 27001 implementation cycle and other complimentary ISO standards. The practical tips on implementation will give solutions to your challenges and help you acquire a better understanding of its complexity. You will know from where to start and what you need for a successful implementation.

Here is the list of the presented subtopics:

  • ISO 27 000 family of standards .
  • Which are the main steps of ISMS implementation?
  • ISO 27001 documentation
  • How to convince the management?
  • How long does it take?
  • What are the cost?
  • How to approach the implementation
  • Biggest challenges in ISO 27001 implementation

Free register at HERE

2017 Cost of Data Breach Study

IBM Security and Ponemon Institute are pleased to present the 2017 Cost of Data Breach Study. This year’s study reports the global average cost of a data breach is down 10 percent over previous years to $3.62 million. Checkout bellow for more detail report.