Jakarta, INTI – The development of digital technology brings many benefits, but at the same time presents risks that need to be anticipated. This statement was emphasized by Syarif Lumintarjo, Chief Coordinator of IDNIC (Indonesia Network Information Center) and Infrastructure at APJII, in an interview session with INTI Media about cyber resilience in Indonesia. He described that technology such as the internet has two sides: one side offers convenience and efficiency, but on the other hand it can be an entry point for various threats such as ransomware, data theft, and misuse of personal information.
“Technology is like sugar, it adds sweetness to life, but like anything, it’s best enjoyed in moderation. The internet, too, offers many benefits, as long as we stay mindful of its risks” he explained.
The Real Threat: Ransomware and Deepfake
One of the issues that is now surfacing is the rise of cyberattacks such as ransomware, as well as the use of deepfake technology that makes it difficult for people to distinguish between real and fake visual information. In fact, the old saying “seeing is believing” is no longer relevant in the era of sophisticated digital manipulation.
Syarif highlighted that cyberattacks often occur due to user negligence. “Many attacks come in because we click carelessly. Attackers already know psychologically that people will be interested in certain links,” he said.
Awareness and Basic Protection are the Foundation
According to Syarif, awareness is the key to protecting oneself from cyberattacks. Simple steps such as not carelessly clicking on links, verifying sources of information, and using a reliable antivirus should be the basic habits of digital users. He emphasized that antivirus is no longer an option, but a necessity.
Personal data protection is also an important concern. Application developers are asked to take information such as account numbers, dates of birth, and the name of users' birth mothers more seriously. The government is now starting to apply legal sanctions for those who neglect to maintain the security of these data.
IDNIC and Cyber Resilience Infrastructure
In terms of infrastructure, Syarif explained that IDNIC has prepared a cyber incident reporting system through the Incident Response Team (ERT Contact) mechanism. This system allows internet service providers or IP address owners to immediately receive notifications in the event of suspicious activity.
However, he regrets that there are still many IP owners who ignore the warning email. “The system already exists. It's just a matter of whether the IP owner cares or not to follow up on the report,” he said.
Transparent and Orderly IP Management
IDNIC also emphasizes that IP address management is currently carried out with a strict and transparent system. Each delegated IP is clearly recorded, starting from the owner's name, upstream provider, to contacts that can be contacted. This is so that in the event of an incident, the process of tracking and handling can be done quickly and precisely.
As part of the ongoing audit, IDNIC requires all IP recipients to update their data. “We want to make sure the information we store is accurate, so that if a violation occurs, it can be followed up immediately,” concluded Syarif.
Conclusion
Amidst the growing complexity of cyber threats, user awareness is the first and most important defense. With stronger infrastructure and regulations, cyber protection is not only the responsibility of the government or service providers, but also every individual connected to the digital world.
Read More: Mr. Syarif Lumintarjo - #3 IDNICs Strategic Approach to Cybersecurity Enhancement | INTITALK