By continuing to use this site, you agree to its use of cookies. Find out more about cookies here. Accept Cookies
Search Tips: A2P SMS SDN
What are you looking for?
Hgc Wechatqrcode

How Securing the New Normal starts with you

HGC Cybersecurity blog

At the end of the day, it all begins with an understanding that the new normal post-pandemic is becoming a more risky cyber-place to be. Securing and defending against the growing number of threats starts with all of us, especially each and every individual.

Wong Hung
Vice President – ICT Solution & Partnership

As mass vaccination campaigns against the pandemic take off worldwide, the “new normal” is anything but the pre-pandemic normal. Reports show that there is an abundance of companies scaling down office space as a consequence of the now more widely accepted remote working lifestyle, telemedicine and virtual education are here to stay, and that there is number of retail outlets moving brick-and-mortar operations to digital. The massive spending on online shopping has not abated and many are accepting that our lives will be lived more remotely, which is becoming the new norm; with digital shopping and virtual social events a new way of life.

A recent McKinsey & Company report that investigates the trends around digitalization acceleration and the turbo-charging speed that the pandemic has brought upon different industries has found that digital customer interactions have accelerated the equivalent of three years in the last year alone, whilst the share of products and services partly or fully digitalized, have advanced the equivalent of seven years.

For the office, with the continued work-from-home (WFH) arrangements, the blurred lines of IT support and workplace boundaries have become increasingly distressed and complex. Be it because of the use of employees’ own devices at home under bring your own device (BYOD) motto that is extending corporate networks to the home; or the rise of mixed use of office laptops at home. As a consequence, security risks have grown exponentially, and according to Deloitte, 35% of cyberattacks during the pandemic have used previously unseen malware or methods. This represents a significant surge from the pre-pandemic levels of 20%.

Exponential growth of cyber threats during COVID-19

The growing dependence on remote work, online entertainment, and virtual socializing, has resulted in an increased threat of being exposed to the risks of cyberattacks. The most common scams encountered include phishing attacks, often inadvertently exposing a company to ransomware attacks. Every week we are confronted with media reports of yet another new threat, a new victim or even cautionary news from security vendors and the International Criminal Police Organization (Interpol). According to Interpol’s assessment of COVID-19-related cybercrime, as many as 907,000 spam messages, 737 incidents related to malware and 48,000 malicious URLs have been recorded over a 4-month period from January to April 2020.

Laying the foundation of cybersecurity strategy with digital risk management, enterprises continue to enhance their network security from the ever-present threat of hackers, corporate espionage and even script kiddies – hacking beginners - with a desire to test newfound hacking skills. Many IT vendors recognize the significance of user centric tools and policies, such as security training, phishing assessment and identity management for enterprises in order to protect against targeted phishing attacks and concerted identity theft.

The industry continues to develop new cybersecurity frameworks, with an interesting recent advancement being the accelerated adoption of Secure Access Service Edge (SASE) which combines a stack of security functions delivering security services at the edge of the network. Its main purpose is to enable organizations to apply secure access no matter where their users, applications or devices are located. However, even with all security layers deployed and fortified, human error, such as clicking on an unsuspecting link in a phishing email link, is always one of the most common causes of cybersecurity breaches. From Trojan malware to ransomware attacks, they have become a launchpad for an impersonation scam on other unsuspected targets in the company.

Webinar Registration: Redefining CIO/ CTO cybersecurity investment priorities in the next normal

The emergence of digital technologies and platforms - from cloud, mobility, OTT to IoT - is creating new cyberthreat and digital risk management challenges for today's enterprises.

Join HGC, CyberSecurity Malaysia and Macroview to understand how forward-planning corporates can develop an agile cybersecurity investment strategy and the top cybersecurity investment priorities by CIO/ CTO.

Date & Time: May 25 | 10:30AM - 12PM (SGT)
Details and registration:

HGC CSM webinar 4

Embarking on your cybersecurity journey with HGC

As a comprehensive cybersecurity solution provider, HGC caters to our customers’ needs and has grown its security offerings, covering all aspects of IT security starting with the individual and layering, all the way to the core network and up the stack to the application layer.

Providing the best-in-class tools and monitoring systems including multiple 7x24 security operation centers (SOC) and digital operation centers (DOC) to support our customers in the ever combat against malicious actors, from consultancy, assessment, user security training and platforms to addressing the new normal threats, we act as a holistic connector by partnering with international enterprises to implement data protection mechanisms, reinforcing their cyber defense and security landscape.

At the end of the day, it all begins with an understanding that the new normal post-pandemic is an ever more dangerous cyber-place to be. Securing and defending against the growing number of threats starts with all of us, especially each and every individual.


HGC Global Communications Limited may, directly or through its affiliated companies, agents and/or business partners1, use my personal data2(“Personal Data”) for direct marketing of the services and/or products as set out below.

Please select the box(es) below to indicate you do not consent to any of the items and HGC Global Communications Limited shall not use the Personal Data for direct marketing


  1. Business partners include those entities of designated industries having a contractual relationship with HGC Global Communications Limited (please refer to3for details of designated industries).
  2. Personal Data includes any or all of the following : name, gender, telephone number, fax number, postal address, e-mail address, month and year of birth, and the information on usage of telecommunications and related telecommunications value-added services and relevant HGC Global Communications Limited’s account and service number.
  3. Designated industries include telecommunications and related telecommunications value-added services and/or products, concierge services, flowers and hampers, wedding planning services, personal care and beauty, fashion and apparel, supermarket and department stores, household, catering/ food and beverages, hotels and travelling, entertainment and leisure, high-end consumer products, electrical and electronic products, e-commerce and payment platforms, media, insurance, banking and finance, education, stationery and office equipment, real estate and property management, logistics and transportation, social network services, recruitment, charitable and non-profit making organizations.

If at any time in the future you do not wish HGC Global Communications Limited, its affiliated companies, agents and/or business partners in providing you with any information for direct marketing of the aforesaid products and services relating to HGC Global Communications Limited, its affiliated companies and business partners, please contact us via email, or by mail to PO Box 33, Tsuen Wan Post Office, Hong Kong or call HGC Global Communications Limited’s Customer Services Hotline 1220 (Voice/IDD Service) / 1222 (Internet Service). If you inform us via email or by post, our customer service representative will contact you for verification purpose.