Intensification of Information Security | ACER ESG
Corporate information security management strategy and framework
Management of Information Security Effectiveness
The company continues to address information security risks by conducting third-party assessments and implementing necessary corrections to ensure compliance with industry standards for information security protection mechanisms.
- The industry average is represented by the blue curve, with a score of approximately 82, indicating a maturity level of B.
- Acer, represented by the black curve, has consistently shown an upward trend, except for the cybersecurity incident in the first quarter. Since June 2023, Acer has consistently outperformed the industry average, with a
score of 90 and a maturity rating of A.
Investments in the cyber security management
Performance of Information Security Implementation in 2023:
01 | Policy
Headquarters Adds/Revises 49 ISMS Information Security Management Directions and Regulations
Headquarters Adds/Revises 5 CSF Information Security Regulations
02 | Certification
- The headquarters successfully completed the initial verification of ISO/IEC 27001:2013 in 2019
- The headquarters successfully completed the reverification
of ISO/IEC 27001:2013 in 2022 - Headquarters was re-certified for ISO/IEC 27001:2013 in
2023 - EMEA IT completed the initial verification for ISO/IEC
27001:2013 in 2023
03 | Promotion
1 promotional
short film
Produce a promotional video and conduct 20 informational seminars to convey essential regulations
and precautions regarding information security
437 persons
A total of 437 new employees completed the information security briefing during the new employee orientation
10 Announcement
A total of 10 Information Security announcements
were made to convey important regulations and precautions regarding information security
04 | Risk Control
5,642 persons
5,642 employees have completed the annual online information security education and training course
2 social engineering drills
Conducted 2 email social engineering drills, involving over 6,000 participants
6 penetration tests
Conducted 6 penetration tests, examining more
than 90 targets
2 web vulnerability scans
Conducted 2 web vulnerability scans, checking a total of 283 websites
4 OS vulnerability scans
Conducted 4 OS vulnerability scans, examining over
10,000 vulnerabilities
Cyber Security Risks and Response Measures
Acer has established comprehensive information security protection measures for our network and computers, but this cannot guarantee that the computer systems that support our business operation will be completely free from cyber attacks that could cause the loss of important Acer data. Malicious hackers or cyber attacks motivated by geopolitics may introduce viruses, destructive software, or ransomware to the Company’s network systems, interfering with Acer’s operations.
Acer has faced an attack from ransomware from a member of our staff accidentally clicking on a phishing mail, and we may face similar attacks in the future. To prevent damage from such attacks, Acer implements related corrective actions and continually works to optimize our practices. For instance, we have reduced the chances for phishing emails to make it to inboxes; strengthened firewall controls and Internet access to prevent malware from expanding to other zones; implemented multi-layer management of privileged accounts to prevent them from being hacked; introduced leading solutions for compliance auditing; imported new techniques to detect and handle malware; and routinely executed vulnerability scans & fixes and test staff awareness.
The future focus of our information security
No leakage of customers’ data.With multi-layer protection, hackers cannot access customer data even if Acer is under attack from ransomware. | |
Enhance the comprehensive information security and monitoring mechanismIn doing so, we can make cyber attacks more difficult and thus lower the inclination of hackers to attempt them. Acer deploys endpoint detection and responsive software to ensure the visibility of any abnormal behaviors. | |
Segregate internal systemsAdopt a zero trust framework in the data centers of both regional offices and headquarters and enhance business continuity drills for information systems, mitigating the impact of attacks and enabling systems to recover within a tolerable time. |