• 2026.03.06 (Fri)
  • All articles
  • LOGIN
  • JOIN
Global Economic Times
fashionrunwayshow2026
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Well+Being
  • Travel
  • Eco-News
  • Education
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life
    • International Student Report
    • With Ambassador
  • Column
    • Cho Kijo Column
    • Cherry Garden Story
    • Ko Yong-chul Column
    • Kim Seul-Ong Column
    • Lee Yeon-sil Column
  • Photo News
  • New Book Guide
MENU
 
Home > ICT

Singapore Tops World in Third-Party Data Breach Rate… Serious Cybersecurity Vulnerability

Global Economic Times Reporter / Updated : 2025-03-28 09:14:34
  • -
  • +
  • Print
SecurityScorecard Report Released… More Than Double the Global Average

Singapore has recorded the world's highest rate of cyberattacks originating through external vendors or partners, known as third-party data breaches, revealing a serious vulnerability in its digital supply chain. According to the latest 'Global Third-Party Breach Report' released by cybersecurity firm SecurityScorecard, 71.4% of cyber incidents in Singapore occurred through external parties. This figure is more than double the global average of 35.5%.

Despite a relatively low number of overall data breaches, Singapore's high third-party breach rate suggests that the main route of cyberattacks is shifting from direct attacks to targeting third parties with weak security postures. In particular, this has raised a serious warning for the management of Singapore's digital supply chain, which has a highly interconnected economic structure.

The report notes that Singapore's high breach rate "appears alongside recorded Chinese cyber operations," suggesting a link to state-sponsored hacking attacks that exploit trusted access points such as suppliers, service providers, and software partners. Singapore's wealth, high level of digital maturity, and strategic importance as a financial and logistics hub are also analyzed as factors making it an attractive target.

In the face of complex vendor ecosystems and extensive cross-border data flows, attackers are increasingly favoring a strategy of targeting third parties with weaker security postures instead of direct attacks. SecurityScorecard warns that traditional slow and periodic vendor risk assessment methods are insufficient to capture rapidly evolving threats. It urges Singapore-based organizations to adopt real-time third-party threat detection and monitoring systems across cloud services, overseas subsidiaries, and key sectors such as finance and healthcare.

The findings of this report are released amid growing concerns about geopolitical cyber activities in the Asian region, particularly those related to Chinese cyber espionage.

Experts further point to the following factors as causes for Singapore's high third-party breach rate:

High Dependence on Outsourcing: Singapore has a strong tendency to outsource various tasks such as IT services and data processing to external companies to enhance efficiency. This increases the possibility of third-party security vulnerabilities spreading as risks throughout the entire system.
Strict Regulatory Environment: While Singapore implements relatively strict data protection regulations for major industries such as finance and telecommunications, these regulations may not always be effectively applied to third-party vendors.
Shifting Attacker Strategies: As direct attacks become more difficult, attackers are utilizing a detour strategy of first infiltrating third parties with insufficient security investment or lax access controls to reach their final targets.
The Singaporean government and businesses should recognize the importance of third-party risk management and actively work to prepare related countermeasures. In addition to adopting the real-time threat detection and monitoring systems suggested by SecurityScorecard, the following efforts are necessary:

Strong Contracts and Due Diligence: Clearly specify security requirements when contracting with third-party vendors and conduct thorough security due diligence before and after the contract.
Continuous Security Assessment: Continuously monitor the security status of third parties and conduct regular vulnerability checks, rather than relying on one-time assessments.
Enhanced Information Sharing and Cooperation: Share third-party threat information between companies and establish a joint response system between the government and businesses.
Security Awareness Training: Strengthen security awareness training not only for internal employees but also for employees of third-party vendors to prevent security incidents caused by human error.
For Singapore to maintain its standing as a world-class digital economic powerhouse, it must actively address the urgent issue of third-party data breaches.

[Copyright (c) Global Economic Times. All Rights Reserved.]

  • #globaleconomictimes
  • #글로벌이코노믹타임즈
  • #한국
  • #중기청
  • #재외동포청
  • #외교부
  • #micorea
  • #mykorea
  • #newsk
  • #nammidonganews
  • #singaporenewsk
Global Economic Times Reporter
Global Economic Times Reporter
Reporter Page

Popular articles

  • A New Milestone for Ukraine’s Post-War Reconstruction: The Birth of ISVP

  • About mexican food 

  • War Memorial Association Launches Youth Education Program Idea Contest

I like it
Share
  • Facebook
  • X
  • Kakaotalk
  • LINE
  • BAND
  • NAVER
  • https://globaleconomictimes.kr/article/1065572027324230 Copy URL copied.
Comments >

Comments 0

Weekly Hot Issue

  • The Illusion of a "Stress-Relieving" Smoke: Study Finds Smokers More Prone to Depression
  • From Table to Space: Japan Unveils Edible Spoons Made of Cookies
  • Luckin Coffee Shakes Up Global Market with Blue Bottle Acquisition
  • U.S. Private Sector Hiring Hits 7-Month High in February, ADP Reports
  • Self-Employed Loan Delinquency Rates Double in a Decade Amid Economic Headwinds
  • Multi-Homeowner Loan Balance Hits 103 Trillion Won; Half Concentrated in Seoul and Gyeonggi

Most Viewed

1
Adwa’s Echo in Korea: A Shared Story of Dignity and Freedom
2
2026, The Grand Year of Hangeul Celebration — The River of History Where Five Streams Converge
3
A New Milestone for Ukraine’s Post-War Reconstruction: The Birth of ISVP
4
Mexican currency and the powerful history behind its designs
5
Revised and Expanded Edition of ‘Failure of Negotiations with North Korea: Truth and Solutions’ Published
광고문의
임시1
임시3
임시2

Hot Issue

South Korean Markets Shaken by "Iran Shock": KOSPI Suffers Historic Rout Amid Soaring Oil and FX Rates

Self-Employed Loan Delinquency Rates Double in a Decade Amid Economic Headwinds

U.S. Private Sector Hiring Hits 7-Month High in February, ADP Reports

Industrial Output Dips in January Amid Semiconductor Adjustments; Middle East Tensions Loom as Wild Card

Let’s recycle the old blankets in Jeju Island’s closet instead of incinerating them.

Global Economic Times
korocamia@naver.com
CEO : LEE YEON-SIL
Publisher : KO YONG-CHUL
Registration number : Seoul, A55681
Registration Date : 2024-10-24
Youth Protection Manager: KO YONG-CHUL
Singapore Headquarters
5A Woodlands Road #11-34 The Tennery. S'677728
Korean Branch
Phone : +82(0)10 4724 5264
#304, 6 Nonhyeon-ro 111-gil, Gangnam-gu, Seoul
Copyright © Global Economic Times All Rights Reserved
  • 에이펙2025
  • APEC2025가이드북TV
  • 독도는우리땅
Search
Category
  • All articles
  • Synthesis
  • World
  • Business
  • Industry
  • ICT
  • Distribution Economy
  • Well+Being
  • Travel
  • Eco-News
  • Education
  • Korean Wave News
  • Opinion
  • Arts&Culture
  • Sports
  • People & Life 
    • 전체
    • International Student Report
    • With Ambassador
  • Column 
    • 전체
    • Cho Kijo Column
    • Cherry Garden Story
    • Ko Yong-chul Column
    • Kim Seul-Ong Column
    • Lee Yeon-sil Column
  • Photo News
  • New Book Guide
  • Multicultural News
  • Jobs & Workers