APOGEE OPTOCOM Co.,Ltd

Cybersecurity

Cybersecurity Guidelines

Corporate Management / Information Security Promotion

  •  Establish a dedicated organization,assign managers and personnel,and regularly revies and promote information security polocies.    
  •  Operating procedures:covering core business,system inventory,risk assessment,system development and maintenance,security protection outsourcing.   

Staff training / Staff training

  • Security promotion:All employees reveive information security training every year,and dedicated personnel receive professional courses.  
  • Social Engineering Drills:Examples Conduct annual email drills to educate and train those who mistakenly open emails.

Technical Support / Technical Resources

  • Network segmentation: Separate development,testing and formal operating environments,and establish protective measures.
  • protective measures: Use anti-virus software,intrusion detection,AI WAF website application firewall,etc.
  • Data protection: Establish data encryption,access permissions, transmission encryption and other measures.
  • System security detection:regularly perform vulnerability scanning,penetration testing, and source code security detection.
  • Monitoring measures: Establish monitoring measures for authentication failures,access failures,etc., and protect log records.

Cybersecurity

Overview of Cybersecurity Protection Software

Category  Information Security Protection and Control Measures Effective Effect
Information
Security Management
Guidelines
★ Antivirus software
★ Network firewall
★ Application firewall
★ Intrusion detection
Protection against viruses,malware and unauthorized network access,
Email filtering
System security
test
★ Perform regular vulnerability scans
★ Penetration testing
★ Source code security detection
Discover and patch  system vulnerabilities  
to prevent potential  attacks
Data ptotection ★ Data encryption
Access rihgts
Transmission encryption
Protect confidential  Information from disclosure or unauthorized access
TOP