logo
Commentary: Singapore's journey from cybersecurity to cybermaturity

Commentary: Singapore's journey from cybersecurity to cybermaturity

CNA2 days ago

SINGAPORE: Seven years ago, Singaporeans were shocked when a cyberattack resulted in the theft of personal data belonging to about 1.5 million SingHealth patients, including then Prime Minister Lee Hsien Loong.
Yet, 2018 seems almost like a different age when it comes to cyberthreats.
Last June, a ransomware attack on a service provider to the United Kingdom's National Health Service disrupted operations in some hospitals, resulting in thousands of postponed surgeries and appointments. The hackers published almost 400GB of patient data on the dark web subsequently.
In February the same year, a ransomware attack in the United States compromised the data of about 190 million people and disrupted insurance processing that left patients the choice of delaying treatment if they could not pay out of pocket.
Halfway through 2025, there is no end in sight for the proliferation of this type of attack. A wave of attacks against prominent British retailers began in late April, with Marks & Spencer losing £1 billion (US$1.35 billion) in market value and another £300 million in lost profit expected.
In the 10 years since Singapore's Cyber Security Agency (CSA) was set up in April 2015, technology has evolved considerably, and with it has come an expansion of the threat surface.
Enterprises are increasingly moving to the cloud, where attackers now exploit weak identity and access management. Malicious actors have also taken to scams, fuelled by AI-generated content and deepfakes. Some target software supply chains or phish employees; others engage in hacktivism.
By sheer scale and scope, the lines between cybercrime and cyberthreats to national security have blurred.
NOT JUST REACTING
Singapore has not confined itself to reacting to an evolving threat environment.
It has shored up defences and increased awareness, within government and the private sector, through the creation of Singapore's first Cybersecurity Strategy, the Cybersecurity Act and the Safe Cyberspace Masterplan. These ensure that organisations, particularly in the private sector, have the incentives and tools to implement cybersecurity measures and manage risks before any attacks occur.
Amid the increasing use of AI in cyberattacks, CSA launched in 2024 a comprehensive framework for organisations to manage cybersecurity risks throughout the AI system lifecycle. Its SG Cyber Safe programme offers resources such as toolkits and certification schemes like Cyber Trust marks to guide businesses in implementing cybersecurity measures.
Cyber diplomacy is also a key aspect, since malicious cyber activity and cybercrime knows no borders. Protecting the digital sovereignty of our country is just as important as safeguarding physical boundaries.
Singapore recognises that having a seat at the table to discuss on the dos and don'ts of state cyber activity, is critical for a small state.
When, in 2018, the United Nations Group of Government Experts (GGE) was undermined by disagreements between rival blocs, Singapore led ASEAN states to adopt the GGE's voluntary norms of state behaviour in cyberspace. This took place during the Singapore International Cyber Week, which has itself become the key node for regional cyber discussions.
Singapore's Ambassador to the United Nations, Burhan Gafoor, has garnered praise for his chairing of the UN's Open-Ended Working Group on cybersecurity and information technology.
Singapore has also been a responsible stakeholder when it comes to cyber capacity building, establishing the ASEAN-Singapore Cybersecurity Centre of Excellence in 2019.
REALISTIC APPRAISAL OF THE ROAD AHEAD
In considering strategies Singapore can pursue, we should not be under any illusions about what can be done.
Some cyber practitioners have pushed for 'attributing' cyberattacks, believing that calling out malicious conduct may prevent recurrences. For example, US lawmakers have blamed the Salt Typhoon attacks on US telecommunications infrastructure on Chinese groups.
While large states with well-resourced cyber offensive capabilities may take this view, Singapore's position is somewhat different.
Observers would have noticed that there was no official attribution of the actor behind the cyberattacks against the Ministry of Foreign Affairs in 2014, nor on SingHealth in 2018. In the latter case, it was made known that a state-backed advanced persistent threat was most likely responsible, but this is as far as the authorities went.
This is a space where the threat actors can cover their tracks through technical means, and even our close partners may probe our cyber defences or attempt to exfiltrate valuable information (especially if they feel they can get away with it without being caught).
In any case, a small state cannot afford to take the aggressive posture that others do, threatening retaliatory measures in response to every incident.
One major challenge is also in identifying and grooming the next generation of cyber defenders, when there is already currently a shortage of cybersecurity professionals in Singapore as is the case globally.
FROM SECURITY TO RESILIENCE
What more can be done?
Cybermaturity requires a mindset shift that recognises cybersecurity as a critical national and personal priority.
With CSA as the overall guide, more agencies will need, increasingly, to have skin in the game when it comes to covering digital threats. This process has already started.
When one falls victim to online scams or ransomware, one generally thinks to call the police, not the CSA. Under the Online Criminal Harms Act (OCHA) that came into effect last year, the Ministry of Home Affairs has the powers to deal with online content which facilitate malicious cyber activities. Technological solutions to counter the malicious use of deepfakes are also something that the SPF is working on, with the Home Team Science and Technology Agency.
Beyond policies and frameworks, real resilience requires deeper public investment: a cultural change, greater individual responsibility and baseline awareness.
CSA surveys consistently show a troubling gap: There is widespread acknowledgement of the importance of cybersecurity, but considerably fewer believe they are personally at risk. Awareness is also low in key areas such as Internet of Things (IoT) security, even as more invest in smart homes.
Silos make us vulnerable to threat actors who are using new tools with increasing sophistication and devolution. For the next leg of our cyber journey, it's worth bearing in mind how CSA CEO David Koh sees it: We need to 'assume breach'. This principle encourages not simply vigilance, but the ability to ensure continuity in a compromised environment.
This is the digital future we will have to live with – one brimming with promise, and also peril.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Musk's Starlink gets key India licence from telecoms ministry, sources say
Musk's Starlink gets key India licence from telecoms ministry, sources say

CNA

timean hour ago

  • CNA

Musk's Starlink gets key India licence from telecoms ministry, sources say

NEW DELHI :Elon Musk's Starlink has received a key licence from India's telecoms ministry, sources with knowledge of the matter told Reuters on Friday, clearing a major hurdle for the satellite provider and taking it closer to launching commercial operations in India. Starlink is the third company to get a licence from India's Department of Telecommunications, which has approved similar applications by Eutelsat's OneWeb and Reliance Jio to provide services in the country.

About 56% of affected Cordlife customers accept refund offer over mishandling of cord blood units
About 56% of affected Cordlife customers accept refund offer over mishandling of cord blood units

CNA

time6 hours ago

  • CNA

About 56% of affected Cordlife customers accept refund offer over mishandling of cord blood units

SINGAPORE: About 56 per cent of affected Cordlife customers have accepted the refund offers made by the company after its mishandling of cord blood units. In a regulatory update on Friday (Jun 6), the private cord blood bank gave an update on the number of clients who have accepted its offers that were made in February and April 2024. The offers comprised a refund of the annual fees paid by affected clients from the onset of the "temperature excursion". For those affected, Cordlife had also offered to continue storing the cord blood units until their child reaches the age of 21 and to waive all future fees. When previously contacted by CNA in May last year, Cordlife declined to give the exact figure for the number of clients who had accepted the refunds. Its mishandling of cord blood units was first made public on Nov 30, 2023, when the Ministry of Health (MOH) revealed that investigations were ongoing. Seven tanks storing cord blood units were exposed to temperatures above acceptable limits. About 2,200 cord blood units were found damaged in one of the tanks, affecting at least 2,150 clients. In April last year, it was announced that another 5,300 cord blood units in a second tank and dry shipper were deemed "non-viable". Some customers are, however, continuing their legal action against the company. In a bourse update on the matter on Apr 1, the company said it had received on Mar 28 two letters of demand from lawyers acting for two groups of affected clients. One group is claiming for damages for breach of contract and negligence, while the other group is requesting for compensation for costs, among other warranties and undertakings from Cordlife. The company received its first letter of demand in May last year, while two other announcements were made in Aug 15, 2024 and Mar 1 on the same matter. In January, MOH renewed Cordlife's cord blood and human tissue banking service licences for a year, more than four months after it was allowed to resume its cord blood banking services in a limited manner. The company said on Friday it intends to host a series of townhall sessions - both in-person and online - to continue engaging customers to address their concerns. In a media invite last September, Cordlife talked up its new laboratory monitoring system to keep track of storage tank temperatures remotely and how it had hired more experienced laboratory staff and technicians to "elevate standards further". ACCREDITATION Cordlife added on Friday that it is also working closely with the Association for the Advancement of Blood & Biotherapies (AABB) and the Foundation for the Accreditation of Cellular Therapy (FACT) to restore both accreditations for its Singapore operations. In December 2023, it lost its cellular therapy accreditation with FACT. The suspension will last indefinitely, "at a minimum until FACT's investigations are completed and issues are resolved", Cordlife then said. AABB followed suit in August last year, with the international blood bank body withdrawing Cordlife's accreditation for the collection, processing, storage and distribution of cord blood. The company also provided an update on its Singapore operations, which were given the go-ahead by authorities to fully resume in January. "While collection rates remain below the company's pre-incident average, the full resumption of its Singapore operations represents an encouraging step forward in restoring client confidence and rebuilding operational momentum," it said. "The company has also strengthened and renewed its relationships with the medical community, particularly in Singapore. It has been proactively engaging hospitals, doctors, nurses and other stakeholders within the medical community to ensure they are fully informed on the company's rectification efforts and improved procedures," Cordlife added. Cordlife said it would continue to expand its outreach initiatives with the aim of returning to "pre-incident levels of performance" and would continue to update shareholders when there are material developments. For the financial year ending Dec 31, 2024, the group's revenue fell 50.4 per cent to S$27.6 million (US$21.4 million), with Cordlife primarily attributing the decline to the suspension of its Singapore operations. Its FY2024 revenue in Singapore was minus S$2 million, a steep reverse from S$24.7 million in 2023. NEW GROUP CEO In a separate bourse filing, Cordlife said it had appointed current group executive director Chen Xiaoling as its group CEO and Singapore CEO with effect from Thursday. The board said that it had considered Ms Chen's "proven track record" within the group as well as her qualifications, working experience, leadership capabilities and contributions. She will continue to serve as group executive director alongside her new roles, it added. Ms Chen was among nine people arrested earlier in connection with the mishandling of cord blood units. Non-independent non-executive directors, Mr Zhai Lingyun, Mr Yiu Ming Yiu and Mr Chow Wai Leong, Cordlife's chief financial officer Ms Thet Hnin Yi, the company's former Group CEO Tan Poh Lan, acting chairman Ho Choon Hou as well as independent directors Yeo Hwee Tiong and Titus Jim Cheong Tuck Yan were previously arrested and released on bail. In relation to a separate police report that was lodged by Cordlife's board of directors in April last year over "potential wrongdoings" of former employees amid an internal probe into why the cord blood units in one of the tanks were damaged, the company said it had not received any update regarding that case. "The company will continue to provide its full cooperation to the relevant authorities, as and when needed, for any subsequent investigations in connection with the police report," it said in a separate bourse filing on Friday.

Japan's ispace says still unable to establish communication with moon lander after touchdown attempt , Asia News
Japan's ispace says still unable to establish communication with moon lander after touchdown attempt , Asia News

AsiaOne

time8 hours ago

  • AsiaOne

Japan's ispace says still unable to establish communication with moon lander after touchdown attempt , Asia News

TOKYO — Japanese company ispace said it has not been able to establish communication with its uncrewed moon lander Resilience after its lunar touchdown attempt on Friday (June 6). Two years after its failed inaugural mission, Resilience was on ispace's second mission in a bid to become the first company outside the United States to achieve a moon landing. The company's live-streamed flight data showed Resilience's altitude suddenly falling down to zero shortly before the planned touchdown time of 4.17am on Friday, Japanese time (3.17am Singapore time) following an hour-long descent from lunar orbit. [[nid:718735]]

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store