The major risks concluded from the analysis of various possible combinations of threats and weaknesses assessed in annual risk assessments are as follows:
3.1 Fraudsters use fake emails to trick company’s employees into sending money or making transactions.
3.2Those who commit industrial espionage or a company’s competitors use hacking techniques to continuously hack into the company’s internal hosts and steal the company’s internal information.
3.3 Crime groups work with hackers to distribute contents with malicious links through emails, text messages, social software, and communication software. A victim's computer data may be encrypted and kidnapped, and a high ransom will then be asked for the recovery.
3.4 Hackers launch a large number of connection requests through the Internet, interrupting the normal operations of a company's network.
3.5 Internal employees use illegal software, or copy the company's confidential and sensitive information to portable storage devices, which may lead to information leakage if the devices are lost, stolen or sold.
3.6 Information software/hardware may be damaged due to natural or man-made disasters, resulting in service interruption or data loss.
3.7 The evaluation suggests that likely losses resulting from the overall information security risk is still low and falls within the range of self-protection. The results of annual evaluations are also reported to the Board of Directors.
3.8 Currently no Information Security Insurance has been taken out; however, for the above-mentioned risk concerns, several measures such as the application of information security management principles, introduction of technological solutions, and reinforcement of information security educational training are concurrently employed to establish fortified information security management mechanisms. The key measures are as follows:
(3.8.1) .Regular internal and external audits are conducted to ensure compliance. The company obtained ISO 27001:2013 certification in Q4 2021 and successfully passed the annual certification audit and transition review to the updated standard in October 2024. The company has obtained the new ISO 27001:2022 certification and continues to enhance its information security management system.
(3.8.2) Two social engineering attack simulation exercises are conducted every year. Employees who fail an exercise or who fail two consecutive exercises are required to then attend information security reinforcement training. Such training enhances employees’ sense of alertness against email fraud.
(3.8.3) Install antivirus and MDR(Managed Detection and Response) protection systems on the client side to provide real-time anomaly detection and alerting as well as forensic analysis and endpoint recovery functions. Block USB storage device connection and stop users from installing software. Moreover, provide Backup File Server for users to back up important data.
(3.8.4) With respect to the network layer, incorporate the use of firewalls to control network traffic and applications. Develop a security monitoring and management mechanism for intranet protection and database access.
(3.8.5) Employ the DRM (Digital Right Management) confidential and sensitive document management system and disk encryption technologies to protect the confidentiality of documents.
(3.8.6) Adopt mail filtering and auditing systems and Anti-APT solutions to reduce the risks arising from email usage.
(3.8.7) Introduce fingerprint identification systems and swipe-card systems in gateway management to meet the physical security requirements of two-factor authentication.
(3.8.8) Centralize the management of hosts and establish environmental control and alarm mechanisms for the data center. Perform regular data backups and carry out emergency recovery drills on a yearly basis.
(3.8.9) The multi-factor authentication mechanism has been compulsorily used for the remote access, so as to reduce the risk of password theft and credential stuffing attack. In addition, full video-taping has also been made to effectively record the use behavior and establish the audit track.
3.9 An important information system’s disaster recovery drill has been performed twice per year to ensure timely response when system abnormalities occur, reduce system downtime, and lower the impact on the company’s operations.
3.10 The Red Team Assessment was conducted in 2022 to simulate an invasion attack while not affecting the company’s operations so as to authenticate information security detection and response abilities and grasp the potential risk condition. The eight information security leaks found in the assessment have all been promptly improved upon and protection measures have been adopted.
3.11 In 2024, a penetration test was conducted to identify and remediate potential vulnerabilities in systems containing highly sensitive data. This initiative aimed to further improve and strengthen security measures. As a result, two vulnerabilities have already been addressed and reinforced.
3.12 The responsible persons of respective information systems have been weekly convened to discuss current week’s information security incidents and adopt required protection measures.