{"id":9230,"date":"2021-08-20T06:13:00","date_gmt":"2021-08-19T22:13:00","guid":{"rendered":"https:\/\/newsbites.hktdc.com\/?p=9230"},"modified":"2023-03-23T10:56:33","modified_gmt":"2023-03-23T02:56:33","slug":"why-you-should-take-cybersecurity-seriously","status":"publish","type":"post","link":"https:\/\/newsbites.hktdc.com\/markets\/why-you-should-take-cybersecurity-seriously\/","title":{"rendered":"Why You Should Take Cybersecurity Seriously"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9230\" class=\"elementor elementor-9230\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-727b673 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"727b673\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce9bd7c\" data-id=\"ce9bd7c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6c03c9a elementor-widget elementor-widget-text-editor\" data-id=\"6c03c9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent third-party organizations that can help manage the cyber risk of systems, assets, and products\/ services. Today, a very large majority of IoT devices are vulnerable to cyber-attacks. Manufacturers should make sure that they implement these minimum \u201csecurity by design\u201d requirements for their new products.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5759d2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5759d2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2885245\" data-id=\"2885245\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-175344d elementor-widget elementor-widget-heading\" data-id=\"175344d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1. Today\u2019s Status of Cybersecurity covers IoT Devices<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e5c3f1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e5c3f1b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eedef43\" data-id=\"eedef43\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1dd8262 elementor-widget elementor-widget-text-editor\" data-id=\"1dd8262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today, a very large majority of IoT devices, for example, smart building elements, vehicles connected to smart transport infrastructure, or gadgets that can be controlled remotely through mobile applications and the cloud are vulnerable to cyber-attacks. A recent report (<a href=\"https:\/\/informationmatters.net\/internet-of-things-statistics\/\">Gartner<\/a>, 2020) expected that 5.8 billion IoT endpoints will be in use by the end of 2020, only in automotive and enterprise environments. The market of consumer IoT products is projected to reach 153.8 Billion $ by 2026 (<a href=\"https:\/\/www.verifiedmarketresearch.com\/product\/consumer-iot-market\/\">Verified Market Research<\/a>, 2020).<\/p><p>With the increase in connected products volume and functionality, the cybersecurity risks associated with these products increased simultaneously. Mainly due to the volume of this market, as well as its connectivity to other high-risk environments, this becomes a serious issue. The combination of \u201csmart\u201d devices, mobile or web applications used to interact with them, and cloud services allowing them to connect with each other lead to the development of overlapped IoT ecosystems.<\/p><p>Based on this status of cybersecurity risk, the Open Web Application Security Project\u00ae, a non-profit foundation that works to improve software security, has identified <a href=\"https:\/\/owasp.org\/www-project-top-ten\/\">Top Ten Web Application Security Risks<\/a> (The OWASP Top 10).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f98139c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f98139c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-29eca75\" data-id=\"29eca75\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5191f70 elementor-widget elementor-widget-image\" data-id=\"5191f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/safety4sea.com\/wp-content\/uploads\/2020\/02\/owasp-iot.png\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"365\" src=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-1024x365.png\" class=\"attachment-large size-large wp-image-9232\" alt=\"Top 10 Web Application Security Risks\" srcset=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-1024x365.png 1024w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-600x214.png 600w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-768x274.png 768w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-1536x548.png 1536w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Top-10-Web-Application-Security-Risks-2048x730.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure 1. Top 10 Web Application Security Risks (The OWASP, 2020)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d77aa05 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d77aa05\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1c200ae\" data-id=\"1c200ae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6b308f elementor-widget elementor-widget-text-editor\" data-id=\"b6b308f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The OWASP Top 10 is a standard awareness document for developers and web application security. \u00a0It represents a broad consensus about the most critical security risks to web applications, also provides the reference for organizations to take their first step in adapting software that produces more secure code.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-90c48e7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"90c48e7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f42fe9\" data-id=\"6f42fe9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-49b06d6 elementor-widget elementor-widget-heading\" data-id=\"49b06d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2. IoT Consumer Market \u2013 Conformity Guidelines &amp; Certification Schemes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b7a0e12 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7a0e12\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c05f367\" data-id=\"c05f367\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33a68a8 elementor-widget elementor-widget-text-editor\" data-id=\"33a68a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To cover the wide range of IoT consumer devices, several guidelines &amp; certification schemes are now available defining the key security measures to implement within an IoT consumer device. They all define very similar \u201cuniversal\u201d requirements, where classes or profiles define the applicable requirement for a particular device<\/p><p>Below are some of the commonly used certification schemes to let consumers and organizations have clear picture on ascertaining the level of security assurance, including:<\/p><ul><li><a href=\"https:\/\/www.eurosmart.com\/eurosmart-iot-certification-scheme\/\">EUROSMART IoTSCS<\/a><\/li><li><a href=\"https:\/\/www.etsi.org\/deliver\/etsi_ts\/103600_103699\/103645\/02.01.02_60\/ts_103645v020102p.pdf\">ETSI TS 103 645<\/a><\/li><li><a href=\"https:\/\/ctiacertification.org\/\">CTIA Certification\u2122<\/a><\/li><li><a href=\"https:\/\/owasp.org\/www-project-top-ten\/\">OWASP Top 10<\/a><\/li><li><a href=\"https:\/\/www.secura.com\/uploads\/whitepapers\/Consumer-IoT-Standards-and-Certification.pdf\">Bureau Veritas &#8211; Secura\u2122<\/a><\/li><\/ul><p>Bureau Veritas has defined 5 IoT security Levels to answer the market demand to provide consumers with cybersecurity levels that can be compared, address the current and impending regulations, such as the cybersecurity changes to the Radio Equipment Directive in Europe, lastly, to state compliance with existing guidelines<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-dafa365 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dafa365\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-471f4b5\" data-id=\"471f4b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-417e11b elementor-widget elementor-widget-image\" data-id=\"417e11b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Conformity-Guidelines-Certification-Scheme-Bureau-Veritas-2021-768x432.png\" class=\"attachment-medium_large size-medium_large wp-image-9236\" alt=\"Conformity Guidelines &amp; Certification Scheme (Bureau Veritas, 2021)\" srcset=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Conformity-Guidelines-Certification-Scheme-Bureau-Veritas-2021-768x432.png 768w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Conformity-Guidelines-Certification-Scheme-Bureau-Veritas-2021-600x338.png 600w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Conformity-Guidelines-Certification-Scheme-Bureau-Veritas-2021-1024x576.png 1024w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Conformity-Guidelines-Certification-Scheme-Bureau-Veritas-2021.png 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure 2. Conformity Guidelines &amp; Certification Scheme (Bureau Veritas, 2021)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b3907e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b3907e3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-421a023\" data-id=\"421a023\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78f5411 elementor-widget elementor-widget-heading\" data-id=\"78f5411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. Minimum Requirements \u2013 Existing and Coming Regulations<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-42aaa6f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42aaa6f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21e3243\" data-id=\"21e3243\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d265eb6 elementor-widget elementor-widget-text-editor\" data-id=\"d265eb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Along with the awareness of cybersecurity over IoT devices in both consumer and enterprise markets, authorities from several regions are taking action to define concrete official standards, regulations, and even laws.<\/p><ul><li>GDPR applicable in Europe since May 2016, Cyber Security Act in Europe from 2019<\/li><li>Inclusion of cybersecurity requirements in the RED directive expected in 2020<\/li><li>Regulations in California &amp; Oregon in force from January 2020<\/li><li>NSCS UK code of conduit to be mandatory in 2020.<\/li><li>Applicable Laws in Finland, Singapore &amp; Japan<\/li><\/ul><p>There is a minimum requirement of IoT Cybersecurity &amp; Data Privacy Regulation:<\/p><ul><li>A secure configuration ready to use<\/li><li>Private Data Management<\/li><li>Vulnerability Management:<ul><li>Signed code &amp; secure updates,<\/li><li>Protection against exploitation of faults and known vulnerabilities<\/li><\/ul><\/li><\/ul><p>Manufacturers, retailers, and consumers are recommended to make sure they implement these minimum \u201csecurity by design\u201d requirements for their new products or the products they purchase.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08776b3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08776b3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bdb2b3b\" data-id=\"bdb2b3b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9a4c525 elementor-widget elementor-widget-text-editor\" data-id=\"9a4c525\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recommendations from Bureau Veritas:<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5913def elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5913def\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a0ec6cc\" data-id=\"a0ec6cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6460553 elementor-widget elementor-widget-text-editor\" data-id=\"6460553\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You may wonder how to ensure the products you manufactured, imported, or purchased are up-to-standard and proof from cyber-attack? The first step you can determine your IoT device is classified as which security level, and then gain the corresponding certificates with a professional third-party certification body.<\/p><p>For most consumer products, IoT devices are recommended to gain the IoXT certification since it is gaining momentum in the US, especially for Smart Home Markets. Any higher than substantial level is regarded as medical, industrial, military, or even national defense, which is not required for normal manufactures or retailers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-03b6b27 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"03b6b27\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d94d168\" data-id=\"d94d168\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-697bdb6 elementor-widget elementor-widget-image\" data-id=\"697bdb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"432\" src=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Security-Levels-Its-Corresponding-Certificates-Bureau-Veritas-2021-768x432.png\" class=\"attachment-medium_large size-medium_large wp-image-9240\" alt=\"\" srcset=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Security-Levels-Its-Corresponding-Certificates-Bureau-Veritas-2021-768x432.png 768w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Security-Levels-Its-Corresponding-Certificates-Bureau-Veritas-2021-600x338.png 600w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Security-Levels-Its-Corresponding-Certificates-Bureau-Veritas-2021-1024x576.png 1024w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Security-Levels-Its-Corresponding-Certificates-Bureau-Veritas-2021.png 1280w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Figure 3. Security Levels &amp; Its Corresponding Certificates (Bureau Veritas, 2021)<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd672df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd672df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8008f4a\" data-id=\"8008f4a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0e7f13 elementor-widget elementor-widget-text-editor\" data-id=\"a0e7f13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To protect your privacy and minimize the risk of being recalled on your products, take cybersecurity seriously today by gaining an authorized certificate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0426c44 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0426c44\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b72edc2\" data-id=\"b72edc2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d41411 elementor-widget elementor-widget-author-box\" data-id=\"3d41411\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"author-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-author-box\">\n\t\t\t\t\t\t\t<div  class=\"elementor-author-box__avatar\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/06\/Stephen-LIM-600x600.png\" alt=\"Picture of Stephen LIM\" loading=\"lazy\">\n\t\t\t\t<\/div>\n\t\t\t\n\t\t\t<div class=\"elementor-author-box__text\">\n\t\t\t\t\t\t\t\t\t<div >\n\t\t\t\t\t\t<h4 class=\"elementor-author-box__name\">\n\t\t\t\t\t\t\tStephen LIM\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-author-box__bio\">\n\t\t\t\t\t\t<p>Director, Business Development of Bureau Veritas Consumer Products Services<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e763a8d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e763a8d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c2d5dcf\" data-id=\"c2d5dcf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-32d0ba2 elementor-widget elementor-widget-text-editor\" data-id=\"32d0ba2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Content contributor: Bureau Veritas CPS HK (All rights reserved)<\/p><p>Bureau Veritas is part of the <a href=\"https:\/\/www.ioxtalliance.org\/\" target=\"_blank\" rel=\"noopener\">IoXT alliance<\/a>, it is an authorized lab to deliver the above IoXT certification, as well as other global consumer and technology product testing, inspection\/audit and certification. \u00a0We offer one-stop-shop solutions to all your global market access needs. If you have any comments and\/or questions about this article, please visit: <a href=\"https:\/\/www.cps.bureauveritas.com\">https:\/\/www.cps.bureauveritas.com<\/a> or click <a href=\"https:\/\/cpsglobal.bureauveritas.com\/l\/520011\/2021-08-04\/8hlg8f\" target=\"_blank\" rel=\"noopener\">HERE<\/a> for more technical webinars.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c24ad24 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c24ad24\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-386b8a3\" data-id=\"386b8a3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f67d481 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"f67d481\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d6cc563 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d6cc563\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c87e0bd\" data-id=\"c87e0bd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ddb6c78 elementor-widget elementor-widget-image\" data-id=\"ddb6c78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/sourcing.hktdc.com\/?ref_source=newsbites\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"880\" height=\"200\" src=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Start-sourcing-at-hktdc.com-Sourcing-.png\" class=\"attachment-large size-large wp-image-9447\" alt=\"Start sourcing at hktdc.com Sourcing\u00a0\" srcset=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Start-sourcing-at-hktdc.com-Sourcing-.png 880w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Start-sourcing-at-hktdc.com-Sourcing--600x136.png 600w, https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Start-sourcing-at-hktdc.com-Sourcing--768x175.png 768w\" sizes=\"(max-width: 880px) 100vw, 880px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent third-party organizations that can help manage &hellip; <\/p>\n","protected":false},"author":11,"featured_media":9273,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,383],"tags":[324],"class_list":["post-9230","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-markets","category-professional-services","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why You Should Take Cybersecurity Seriously - HKTDC Newsbites<\/title>\n<meta name=\"description\" content=\"Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why You Should Take Cybersecurity Seriously - HKTDC Newsbites\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/\" \/>\n<meta property=\"og:site_name\" content=\"HKTDC Newsbites\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hktdc.hk\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-19T22:13:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T02:56:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"605\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Acacia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Acacia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why You Should Take Cybersecurity Seriously - HKTDC Newsbites","description":"Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/","og_locale":"en_GB","og_type":"article","og_title":"Why You Should Take Cybersecurity Seriously - HKTDC Newsbites","og_description":"Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent","og_url":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/","og_site_name":"HKTDC Newsbites","article_publisher":"https:\/\/www.facebook.com\/hktdc.hk\/","article_published_time":"2021-08-19T22:13:00+00:00","article_modified_time":"2023-03-23T02:56:33+00:00","og_image":[{"width":1200,"height":605,"url":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg","type":"image\/jpeg"}],"author":"Acacia","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Acacia","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/#article","isPartOf":{"@id":"https:\/\/newsbites.hktdc.com\/markets\/why-you-should-take-cybersecurity-seriously\/"},"author":{"name":"Acacia","@id":"https:\/\/newsbites.hktdc.com\/#\/schema\/person\/850a77230710f812e1a8febe3669ed17"},"headline":"Why You Should Take Cybersecurity Seriously","datePublished":"2021-08-19T22:13:00+00:00","dateModified":"2023-03-23T02:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/newsbites.hktdc.com\/markets\/why-you-should-take-cybersecurity-seriously\/"},"wordCount":817,"publisher":{"@id":"https:\/\/newsbites.hktdc.com\/#organization"},"image":{"@id":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/#primaryimage"},"thumbnailUrl":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg","keywords":["Cybersecurity"],"articleSection":["MARKETS","Professional Services"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/newsbites.hktdc.com\/markets\/why-you-should-take-cybersecurity-seriously\/","url":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/","name":"Why You Should Take Cybersecurity Seriously - HKTDC Newsbites","isPartOf":{"@id":"https:\/\/newsbites.hktdc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/#primaryimage"},"image":{"@id":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/#primaryimage"},"thumbnailUrl":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg","datePublished":"2021-08-19T22:13:00+00:00","dateModified":"2023-03-23T02:56:33+00:00","description":"Cybersecurity is a priority for companies and governments. New regulations and industrial requirements have reinforced the need for independent","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/sourcing.hktdc.com\/newsbites\/why-you-should-take-cybersecurity-seriously\/#primaryimage","url":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg","contentUrl":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2021\/07\/Why-You-Should-Take-Cybersecurity-Seriously_.jpg","width":1200,"height":605,"caption":"Why-You-Should-Take-Cybersecurity-Seriously"},{"@type":"WebSite","@id":"https:\/\/newsbites.hktdc.com\/#website","url":"https:\/\/newsbites.hktdc.com\/","name":"HKTDC Newsbites","description":"Sourcing Tips","publisher":{"@id":"https:\/\/newsbites.hktdc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newsbites.hktdc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/newsbites.hktdc.com\/#organization","name":"HKTDC Newsbites","url":"https:\/\/newsbites.hktdc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/newsbites.hktdc.com\/#\/schema\/logo\/image\/","url":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2020\/03\/logo_450x120.png","contentUrl":"https:\/\/newsbites.hktdc.com\/wp-content\/uploads\/2020\/03\/logo_450x120.png","width":450,"height":120,"caption":"HKTDC Newsbites"},"image":{"@id":"https:\/\/newsbites.hktdc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hktdc.hk\/"]},{"@type":"Person","@id":"https:\/\/newsbites.hktdc.com\/#\/schema\/person\/850a77230710f812e1a8febe3669ed17","name":"Acacia","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/277afe479302e7d86477890e1668df8c764cee882f01a8dba680ebd7775322fd?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/277afe479302e7d86477890e1668df8c764cee882f01a8dba680ebd7775322fd?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/277afe479302e7d86477890e1668df8c764cee882f01a8dba680ebd7775322fd?s=96&r=g","caption":"Acacia"},"url":"https:\/\/newsbites.hktdc.com\/author\/acacia\/"}]}},"_links":{"self":[{"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/posts\/9230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/comments?post=9230"}],"version-history":[{"count":89,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/posts\/9230\/revisions"}],"predecessor-version":[{"id":17932,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/posts\/9230\/revisions\/17932"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/media\/9273"}],"wp:attachment":[{"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/media?parent=9230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/categories?post=9230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsbites.hktdc.com\/wp-json\/wp\/v2\/tags?post=9230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}