Connect with us

Hi, what are you looking for?

Captain Of Success
Top Stories

Stock Markets

IT-BPM firms told to boost authentication, anti-cybercrime policies

STOCK PHOTO | Image by Hack Capital from Unsplash

By Beatriz Marie D. Cruz, Reporter

PHILIPPINE information technology-business process management (IT-BPM) companies must ensure stronger authentication measures and better enforcement of cybercrime laws to prevent cyberattacks that could harm the country’s reputation as a contact center hub, according to analysts.

“As the Philippine IT-BPM industry progresses toward its projections of 1.9 million full-time digital workers and $40 billion in export revenue in 2025, addressing cybersecurity risks like vishing attacks and other forms of cybercrime is essential to sustaining the Philippines’ leadership as a trusted global hub for IT-BPM services,” Jack Madrid, president and chief executive officer at the IT & Business Process Association of the Philippines (IBPAP), told BusinessWorld in an e-mail.

Australian carrier Qantas Airways recently suffered a data breach following a vishing attack at its Manila-based contact center, according to reports.

The cyberattack, which was detected on June 30, exposed the personal information of over six million Qantas customers, including their names, birthdays, e-mails, and frequent flyer numbers.

“These attacks can damage the reputation of call centers in the Philippines… [which is] one of the major contributors of our GDP (gross domestic product),” Allan S. Cabanlong, regional director for the Southeast Asia hub at the Global Forum on Cyber Expertise, said in a telephone call.

The Philippines has long been a favored destination for offshoring and customer service delivery, amid growing demand in sectors like banking, financial services, and healthcare.

However, the country’s existing laws are not sufficiently enforced to address IT-BPM-related attacks like vishing, which could undermine investor confidence, Mr. Cabanlong noted.

“When it comes to catching cybercriminals, we have a cybercrime law. What’s really lacking there is cybercapacity — the influence of enforcement, investigation, and implementation of existing laws,” he said.

Vishing, short for voice phishing, is a type of criminal fraud where scammers make phone calls or send voice messages to trick individuals into sharing their personal information.

“The individuals behind many of the most notable vishing attacks have obtained information that is so convincing that even well-seasoned support staff would be fooled by their efforts,” Satnam Narang, senior staff research engineer at American cybersecurity firm Tenable, Inc., said in an e-mail.

To address this, the government should prioritize the passage of the Critical Information Infrastructure Protection Act, which outlines clear policies and reporting mechanisms to safeguard critical ICT (information and communication technology) systems, Mr. Madrid said.

Lawmakers should also amend Republic Act No. 10175, or the Cybercrime Prevention Act of 2012, to streamline legal proceedings against employees involved in cybercrimes, he noted.

Mr. Madrid also called for the full implementation of the National Cybersecurity Plan 2023-2028, which outlines strategic approaches to combating cyber threats that could compromise national security and economic stability.

“Given the crucial role of technology and the IT-BPM sector in driving the Philippine economy, IBPAP also urges the government to enact and enforce robust data protection and cybersecurity legislation that can deter threats across industries,” Mr. Madrid said.

To prevent vishing incidents, Mr. Madrid added that some IT-BPM firms have adopted preventive tools like the One Trust Link (OTL), a centralized database that helps verify individuals involved in fraudulent activity during their employment.

“OTL is part of the industry’s collective response to fraud prevention, providing companies with a mechanism to identify and screen high-risk individuals more effectively, while safeguarding due process and data privacy,” he said.

Looking ahead, security teams assigned to helpdesks should implement stringent identity verification safeguards beyond information-based questions, Mr. Narang said.

These include using secondary contact methods and stronger forms of multi-factor authentication, he noted.

“Limiting the privileges of frontline helpdesk staff and requiring escalation to more senior helpdesk staff to vet such requests may thwart some of these types of attacks,” Mr. Narang said.

IT-BPM firms should consistently implement employee training, strong authentication, and regular oversight to maintain the integrity and safety of the information they handle, said Ronald B. Gustilo, national campaigner for consumer group Digital Pinoys.

“Maintaining a do-not-act-until-confirmed rule for any system or credential-related requests should also be on the table for implementation,” Mr. Gustilo said in a Viber chat.

Contact centers should also enforce strict rules against sharing passwords, OTPs (one-time passwords), or credentials, he added. Real-world simulations, such as mock vishing calls, should also be conducted to train employees.

    You May Also Like

    Stock Markets

    STOCK PHOTO | Image by Jcomp from Freepik (Part 1) A Philippine delegation of 42 agribusiness entrepreneurs and academics traveled to Ho Chi Minh from...

    Stock Markets

    STOCK PHOTO | Image by Vecstock from Freepik By Ashley Erika O. Jose, Reporter THE P31.55-BILLION unsolicited proposal of ComClark Network and Technology Corp. for...

    Finance

    Padel continues its meteoric rise, with more than 3,200 new clubs built globally in 2024 – the equivalent of one opening every two and...

    Finance

    Marks & Spencer’s new strawberry and cream sandwich has captured attention on social media — but now it’s caught the eye of tax experts,...

    Disclaimer: CaptainOfSuccess.com, its managers, its employees, and assigns (collectively “The Company”) do not make any guarantee or warranty about what is advertised above. Information provided by this website is for research purposes only and should not be considered as personalized financial advice.
    The Company is not affiliated with, nor does it receive compensation from, any specific security. The Company is not registered or licensed by any governing body in any jurisdiction to give investing advice or provide investment recommendation. Any investments recommended here should be taken into consideration only after consulting with your investment advisor and after reviewing the prospectus or financial statements of the company.