ARTICLE
21 January 2019

How To Avoid A $1m Fine: 5 Key Learnings From The SingHealth Cyber Breach

CC
Clyde & Co

Contributor

Clyde & Co  logo
Clyde & Co is a leading, sector-focused global law firm with 415 partners, 2200 legal professionals and 3800 staff in over 50 offices and associated offices on six continents. The firm specialises in the sectors that move, build and power our connected world and the insurance that underpins it, namely: transport, infrastructure, energy, trade & commodities and insurance. With a strong focus on developed and emerging markets, the firm is one of the fastest growing law firms in the world with ambitious plans for further growth.
Singapore's Personal Data Protection Commission (PDPC) has imposed one of its biggest fines to date against the Integrated Health Information Systems (IHiS) ...
Singapore Technology
To print this article, all you need is to be registered or login on Mondaq.com.

Singapore's Personal Data Protection Commission (PDPC) has imposed one of its biggest fines to date against the Integrated Health Information Systems (IHiS) and SingHealth, amounting to S$1 million in total. IHiS and SingHealth have been fined for breaching their data protection obligations, which led to the cyberattack on SingHealth's patient database system in 2018 (please click here to read our article on 5 steps to consider when faced with a cyber attack) and saw data of 1.5 million patients being affected as a result. Following the Committee of Inquiry's (COI) findings and recommendations, we have set out below five key learning points which are applicable to any company in this day and age.

  • Employees' cybersecurity awareness and training

    All employees should have adequate security training to respond effectively to an attack. They should be familiar with the company's IT security policies and processes in order to escalate any potential risks. One of COI findings was that the staff was unable to identify that a sophisticated cyberattack was under way and were not familiar with IT security policies.
  • Enhanced security processes and regular security checks

    Given the rapid technological advancement and an increasing sophisticated attackers, security networks and software need to be regularly reviewed and improved. This is to minimise any vulnerabilities and misconfigurations. In addition, IT security risk assessments and audit processes should be treated seriously and carried out regularly. Audit action items must be remediated.
  • Enhanced safeguards to protect confidential information

    Most or almost all companies now deal with client information. There should be enhanced safeguards and controls such as real-time monitoring of client databases.
  • Greater emphasis on cyber security

    Cybersecurity has to be seen as a risk management issue, and not just a technical issue, where decisions are made at the appropriate management level - security is not dependent on just one line of defence. The Singapore Government stated yesterday that it would fully adopt the COI's recommendations and aims to ensure its IT and database systems are secure. It further assured the public that personal data collected by public sector systems are well protected. Principles highlighted by the government and COI in its statement include:

    • Adopting a multiple layered 'defence in-depth' strategy of cyber defences to impede an attacker, including swift detection of a breach and decisive response.
    • Enhancing system defences by strengthening people, processes and technology such as a robust response to an incident to ensure a quick recovery and resilience in these systems.

    The Singapore Government has accelerated the implementation of the Cybersecurity Act, which came into force on Aug 31 last year.
  • Tighter control and greater monitoring

    High level confidential information should be subjected to tighter control and greater monitoring. A suggestion is to use two-factor authentication (2FA) to access the information.

In Parliament yesterday, Minister for Communications and Information S Iswaran said "this was not the first instance where we were targeted and it will not be the last".

All companies especially those connected with the 11 designated Critical Information Infrastructure sectors (government, infocomm, energy, aviation, maritime, land transport, healthcare, banking and finance, water, security and emergency), should take note of these recommendations and enhance their own systems and procedures as soon as possible.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

ARTICLE
21 January 2019

How To Avoid A $1m Fine: 5 Key Learnings From The SingHealth Cyber Breach

Singapore Technology

Contributor

Clyde & Co  logo
Clyde & Co is a leading, sector-focused global law firm with 415 partners, 2200 legal professionals and 3800 staff in over 50 offices and associated offices on six continents. The firm specialises in the sectors that move, build and power our connected world and the insurance that underpins it, namely: transport, infrastructure, energy, trade & commodities and insurance. With a strong focus on developed and emerging markets, the firm is one of the fastest growing law firms in the world with ambitious plans for further growth.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More