|
|
Inadequate Password Policy
Single-factor authentication are too simple to be cracked leading to the proposal of 2FA, including one time password, digital certificate, hard and soft token.
|
|
|
|
|
Low Awareness on Cybersecurity
Use of public network/ compromised electronic devices to access account or carelessness such as failure to log off after using public/ shared device. Sensitive information are not encrypted when stored or in transmission.
|
|
|
|
|
Insufficient Cybersecurity Resources
2015 PwC survey found that survey respondents with revenues of less than US$100 million only spent 0.73% of revenue on information security.
|
|
|
|
|
|
i-Sprint solutions meet the new cybersecurity requirements proposed by SFC for internet trading, including:
|
|
|
|
|
|
|
|