LOGIQUE offers top-quality cybersecurity solutions to help minimize security risks for Indonesian companies. With extensive experience in conducting penetration testing and reporting on security vulnerabilities of websites, applications and other IT systems, our team provides comprehensive IT security services and solutions to protect clients from cyberthreats. We are the official distributor partner of BSW Group's Phishing Simulations in Indonesia, offering our clients access to advanced products and technologies to enhance their cybersecurity measures. We also offer ISO certification consultation services to assist companies in obtaining information security management (ISO 27001) certification from the International Organization for Standardization (ISO).
In most cases, attacks on companies, their websites, apps, and systems are conducted with the goal of making money.
Industries that tend to be targeted are media companies, e-commerce businesses,
finance, manufacturing like automotive industries. These industries are targeted because they possess data with high monetary value, such as customers' personal information or proprietary technologies.
Cybercrime is borderless, and there is a risk of attacks from anywhere in the world on Indonesian companies. Some small and medium-sized business owners believe that they won't be attacked and that they are safe. However, this is not true, and there are many cases of such businesses being victimized.
While large and well-known companies are frequently targeted by attacks that are tailored specifically to them, smaller businesses are often hit with random attacks. These attacks involve targeting IP addresses and exploiting vulnerabilities. While large company attacks are often reported in the news, small and medium-sized businesses are not as widely recognized, despite the fact that they are frequent hacked.
Implementing security measures can be costly, but the costs of an attack are exponentially higher. While determining how much security to implement is difficult, the first step is to assess the level of vulnerability of your digital assets.
One of the most common types of cyber attacks in recent years are ransomware, which demands a ransom, and Emotet, a type of malware distributed through email attachments. Both types of attacks often result in significant damage. Phishing attacks through email or SMS are also frequent and becoming more sophisticated, making it difficult to keep up with literacy improvements.
In terms of website security, Wordpress sites are often targeted and susceptible to hijacking. SQL injection attacks are also increasing each year.
Securing websites and apps is not as simple as installing antivirus software on a personal computer. It is recommended to regularly consult with experts and check for vulnerabilities to ensure constant security.
Ransomware | The attack involves encrypting computer data and demanding payment, usually in Bitcoin, to restore access to the data. |
Emotet | Malware infiltrates and takes over a system by executing macro files (such as zip files) attached to emails. The emails are cleverly disguised as messages from business partners, service providers, or financial institutions. |
Phishing | A tactic where cybercriminals impersonate financial institutions or e-commerce businesses to lure victims to a fake website (login page). Victims' ID and password are stolen, and they may suffer financial losses, such as unauthorized withdrawals from their accounts on the genuine website. |
SQL Injection | An attack that exploits vulnerabilities in a database that is linked to a website, allowing the attacker to steal, manipulate, or delete data illegally. The leakage of personal information can be a significant problem. |
Investigate and find cybersecurity vulnerabilities in your digital assets with penetration testing (pentesting). We will provide a report that consists of identification of the type of security vulnerability along with its risk levels. By fixing the security vulnerabilities that have been found, you can minimize the risk of threats.
Assessment and investigation on the company's internal HR to recognize whether they have proper cybersecurity knowledge about phishing attacks. Running this phishing attack simulation is required to identify which employees (what department & position) are vulnerable to the attack. The training to improve cybersecurity knowledge can also be provided at the same time.
LOGIQUE also provides other cyber security solutions, namely cyber security audit services, ISO27001 consulting, and provision of Managed Detection and Response solutions. We will support Indonesian companies to deal with cyber security issues through collaboration with LOGIQUE partners.
LOGIQUE has collaborated with PT Dtechcorp Konsultindo Prima (Dtechcorp Consulting), an experienced consulting agency registered with the BSSN (National Cyber & Crypto Agency) and KOMINFO (Ministry of Communication and Information Technology), so as to meet the needs & standards of the POJK-based information technology (IT) security auditing services. We also provide consultation services for any clients aiming to obtain an ISO certification.