5 Secrets to Make Your Business Resilient Against Cyber Attacks
Jakarta, VIVA - Cybersecurity practitioner Charles Halim has shared practical tips for business owners to ensure their businesses have cyber resilience, even before experiencing a cyber attack.
This involves proactively applying five key pillars in businesses undergoing digital transformation to achieve optimal cyber resilience.
“The five consist of detection, identify, protect, then recovery and response. All of this prioritises that security systems should no longer be prepared reactively, but proactively,” he said in Jakarta on Tuesday, 12 May 2026.
The meaning of these pillars is that they must be applied proactively and not reactively, meaning all pillars are prepared before the business experiences a cyber attack, thus everything is prepared as part of prevention.
These pillars are also explained in the latest report from Indosat Ooredoo Hutchison (IOH) titled “Business-Based Cyber Resilience Strategic Framework”.
The report details the role of each pillar mentioned by Charles in the order: Identify, Protect, Detect, Response, and Recover. Starting with Identify, in this pillar, business owners must begin by separating matters important to cybersecurity.
Ensure critical assets, data, systems, personnel, and third parties that will provide cybersecurity services. This pillar provides the foundation to ensure priorities and investments can appropriately maintain cyber resilience systems.
Next, there is the Protect pillar, in this pillar, business owners must establish safeguards including determining who can access important assets, preparing workforce training, and setting up resilience engineering.
This pillar is actually based on the question of how business owners can prevent cyber attacks in their digital systems. Then, there is the Detect pillar, business owners must regularly explore their systems to anticipate cyber attacks.
Methods that can be done include continuous monitoring, detecting anomalies, and hunting cyber threats. The hope is that when this pillar is implemented, if there is a cyber attack, the time needed to handle it will not be too long because vulnerabilities are already known.
The fourth pillar is Response. Business owners must prepare actions to be taken if a cyber attack is found. These actions include coordination, communication, and structured response implementation.