{"id":28129,"date":"2026-04-01T01:00:29","date_gmt":"2026-03-31T17:00:29","guid":{"rendered":"https:\/\/bigband.net.my\/?p=28129"},"modified":"2026-03-22T09:41:21","modified_gmt":"2026-03-22T01:41:21","slug":"5-cyber-readiness-questions-for-malaysian-businesses","status":"publish","type":"post","link":"https:\/\/bigband.net.my\/index.php\/2026\/04\/01\/5-cyber-readiness-questions-for-malaysian-businesses\/","title":{"rendered":"5 Cyber Readiness Questions for Malaysian Businesses"},"content":{"rendered":"\n[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#0060ae&#8221; header_font_size=&#8221;50px&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||0px||false|false&#8221; custom_margin_phone=&#8221;20px||0px||false|false&#8221; header_font_size_tablet=&#8221;46px&#8221; header_font_size_phone=&#8221;42px&#8221; global_colors_info=&#8221;{}&#8221;]<h1><b>5 Questions Every Malaysian Business Owner <span style=\"color: #ff0000;\">Should Ask About Cyber Readiness Today<\/span><br \/><\/b><\/h1>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;20px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;20px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221;]<h2 style=\"text-align: center;\"><em>A practical guide to knowing where you stand, before an incident forces the question.<\/em><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;60px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;40px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>The Businesses That Survive Are the Ones That Prepared<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>There is a quiet difference between businesses that recover well from a cyber incident and those that do not. It is rarely about luck, and it is rarely about the size of the company. It almost always comes down to one thing: preparation.<\/p>\n<p>AI-powered cyber threats are real, they are growing, and they are reaching Malaysian businesses at an increasing rate. That is established fact. But the more useful conversation is not about the threat itself. It is about what you can do today to ensure your business is on the right side of that statistic.<\/p>\n<p>This is not a list of things to be worried about. This is a list of things to check, confirm, and put in place. Work through these five questions with your IT team or service provider. The answers will tell you exactly where you stand.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>WHY THIS MATTERS RIGHT NOW<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\">The cybersecurity landscape in 2026 has shifted significantly. AI tools have made attacks faster, more personalised, and harder to detect using traditional security alone. According to the CrowdStrike Global Threat Report 2026, AI-enabled attacks rose 89% year-on-year. Forvis Mazars notes that attacks that once unfolded over a week can now move across identity, cloud, and endpoint layers in hours.<br \/>Source: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.forvismazars.us\/forsights\/2026\/01\/cybersecurity-in-2026-responsible-ai-defense\" target=\"_blank\" rel=\"noopener\">Forvis Mazars<\/a><\/span><span style=\"text-decoration: underline;\"><\/span><\/p>\n<p style=\"font-weight: 400;\">For Malaysian businesses specifically, CyberSecurity Malaysia data shows that <strong>67% of SMEs were hit by ransomware<\/strong> in 2025, and the <strong>average breach cost reached RM 3.2 million<\/strong>. The good news: most of these incidents share common, preventable weaknesses. The five questions below address exactly those weaknesses.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||||false|false&#8221; custom_padding=&#8221;0px||40px||false|false&#8221; custom_padding_tablet=&#8221;||20px||false|false&#8221; custom_padding_phone=&#8221;||20px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_tablet=&#8221;33px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|tablet&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>The 5 Cyber Readiness Questions<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p style=\"font-weight: 400;\">Go through each question with your IT team. A confident, specific answer to all five means your business is in a strong position. A vague or uncertain answer to any of them is your starting point for improvement.<\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#0060ae&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><strong>1. Does every staff member use Multi-Factor Authentication (MFA) on email, cloud, and business systems?<\/strong><\/h3>\n<p style=\"font-weight: 400;\">MFA is the single most impactful security step any business can take. It blocks more than 99% of credential-based attacks, even when a password has been stolen through phishing. If your team logs into Office 365, Google Workspace, your accounting system, or any cloud application with just a username and password, this is your highest-priority action. What to check: Can every staff member log in without MFA? Does MFA cover remote access and admin accounts specifically?<\/p>\n<p style=\"font-weight: 400;\">Source: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/cyberunit.com\/insights\/small-business-cybersecurity-checklist-2026\/\" target=\"_blank\" rel=\"noopener\">Cyber Unit Security Inc.<\/a><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#0060ae&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><strong>2. Are your backups stored offsite, isolated from your main network, and tested regularly?<\/strong><\/h3>\n<p style=\"font-weight: 400;\">Modern ransomware attackers specifically target backup systems before triggering encryption. If your backup drives are connected to the same network as your main systems, they may already be at risk. Offsite, network-isolated, encrypted backups with a tested recovery process are the foundation of ransomware resilience. What to check: When was the last time your team actually restored data from a backup and verified it was complete? Is the answer &#8216;I am not sure,&#8217; or can you give a specific date?<\/p>\n<p style=\"font-weight: 400;\">Source: <a href=\"https:\/\/cyberunit.com\/insights\/small-business-cybersecurity-checklist-2026\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Cyber Unit Security Inc.<\/span><\/a> and <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.forvismazars.us\/forsights\/2026\/01\/cybersecurity-in-2026-responsible-ai-defense\" target=\"_blank\" rel=\"noopener\">Forvis Mazars<\/a><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#0060ae&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><strong>3. Do you have an Endpoint Detection and Response (EDR) solution covering every business device?<\/strong><\/h3>\n<p style=\"font-weight: 400;\">Traditional antivirus software detects known threats. EDR monitors behaviour in real time, identifying suspicious activity from previously unknown threats, including AI-generated malware that constantly changes its appearance to bypass signature-based detection. In 2026, EDR on every laptop, desktop, and remote work device is the baseline, not the advanced tier. What to check: Does your current security software have behavioural detection and real-time monitoring, or is it signature-based antivirus? Does it cover all devices, including staff personal devices used for work?<\/p>\n<p style=\"font-weight: 400;\">Source: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.rivialsecurity.com\/blog\/top-ai-cyber-attacks\" target=\"_blank\" rel=\"noopener\">Rivial Data Security<\/a><\/span> and <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.techcrier.com\/2026\/02\/cybersecurity-checklist-10-ways-to.html\" target=\"_blank\" rel=\"noopener\">Techcrier<\/a><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#0060ae&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><strong>4. Does your team know the three warning signs of an AI-generated phishing attempt?<\/strong><\/h3>\n<p style=\"font-weight: 400;\">AI has made phishing emails dramatically more convincing. They are now personalised, grammatically correct, and mimic real colleagues or suppliers. Training that teaches staff to spot generic &#8216;Nigerian prince&#8217; emails is outdated. In 2026, the three practical warning signs your team needs to know are: (1) Any unusual urgency around money movement or access approvals; (2) Any request to verify or confirm credentials by clicking a link; (3) Any communication that bypasses normal channels, such as a WhatsApp message claiming to be from a senior leader. A simple rule: never approve money transfers or access changes based solely on email or voice, without a secondary verification through a separate, trusted channel.<\/p>\n<p style=\"font-weight: 400;\">Source: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.rivialsecurity.com\/blog\/top-ai-cyber-attacks\" target=\"_blank\" rel=\"noopener\">Rivial Data Security<\/a><\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px|30px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;20px|20px|20px|20px|false|false&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_width_all=&#8221;3px&#8221; border_color_all=&#8221;#e2e2e2&#8243; border_width_top=&#8221;10px&#8221; border_color_top=&#8221;#0060ae&#8221; global_colors_info=&#8221;{}&#8221;]<h3 style=\"font-weight: 400;\"><strong>5. Does your business have a written incident response plan, and does your team know what to do in the first 30 minutes of an incident?<\/strong><\/h3>\n<p style=\"font-weight: 400;\">Research consistently shows that businesses with documented, practised response plans recover from incidents significantly faster and at significantly lower cost than those without. The first 30 minutes of a ransomware or data breach incident are the most critical: the decisions made in that window determine how far the damage spreads. What to check: Does a written plan exist? Does it name specific people responsible for specific actions? Has it ever been walked through in a tabletop exercise, even informally?<\/p>\n<p style=\"font-weight: 400;\">Source: <a href=\"https:\/\/cyberunit.com\/insights\/small-business-cybersecurity-checklist-2026\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\">Cyber Unit Security Inc.<\/span><\/a> and <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.forvismazars.us\/forsights\/2026\/01\/cybersecurity-in-2026-responsible-ai-defense\" target=\"_blank\" rel=\"noopener\">Forvis Mazars<\/a><\/span><br \/><span style=\"text-decoration: underline;\"><\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; custom_margin=&#8221;40px||40px||false|false&#8221; custom_padding=&#8221;0px|40px|0px||false|false&#8221; hover_enabled=&#8221;0&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text content_tablet=&#8221;<blockquote>\n<h3>Hybrid cloud is not about splitting environments arbitrarily.<\/h3>\n<br>\n<h3>It is about intentional workload placement based on risk analysis.<\/h3>\n<\/blockquote>&#8221; content_phone=&#8221;<blockquote>\n<h3>Hybrid cloud is not about splitting environments arbitrarily.<\/h3>\n<br>\n<h3>It is about intentional workload placement based on risk analysis.<\/h3>\n<\/blockquote>&#8221; content_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_line_height=&#8221;1.6em&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding=&#8221;|||60px|false|false&#8221; custom_padding_tablet=&#8221;|||60px|false|false&#8221; custom_padding_phone=&#8221;|||20px|false|false&#8221; custom_padding_last_edited=&#8221;on|desktop&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_3_font_size_tablet=&#8221;&#8221; header_3_font_size_phone=&#8221;&#8221; header_3_font_size_last_edited=&#8221;on|desktop&#8221; header_3_line_height_phone=&#8221;1.6em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<blockquote>\n<h3><em>&#8220;The speed at which attacks are happening has gone from days to minutes. Defenses must operate at the same velocity: continuous validation, automated containment, and AI-driven detection that reacts before attackers finish their sequence.&#8221;<\/em><\/h3>\n<p><em>Ross Filipek, CISO, Corsica Technologies | Solutions Review Cybersecurity Predictions 2026<\/em><\/p>\n<\/blockquote>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<div>\n<h2><b>What Good Cyber Readiness Looks Like in Practice<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|20px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p>A Malaysian business that can answer all five questions confidently has the foundations in place. This does not mean it is impenetrable. No system is. But it means that if an attack comes, the damage is contained, the recovery is fast, and the business continues.<\/p>\n<p>Forvis Mazars&#8217; 2026 cybersecurity analysis makes the point clearly: organisations that treat cyber risk as a business priority, pair human judgment with AI-assisted detection, and compress their detection and response time are significantly better positioned than those still relying on perimeter-only defences. The difference is not exotic technology. It is consistent, layered basics done properly. Source: <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.forvismazars.us\/forsights\/2026\/01\/cybersecurity-in-2026-responsible-ai-defense\" target=\"_blank\" rel=\"noopener\">Forvis Mazars<\/a><\/span><\/p>\n<p>For Malaysian SMEs operating under PDPA and the Cybersecurity Act 2024, there is an added dimension. Demonstrating that your business has appropriate safeguards in place is not just good practice. It is a legal and regulatory requirement. The five questions above map directly to the controls that regulators and cyber insurers look for when assessing a business&#8217;s security posture.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||20px||false|false&#8221; custom_padding=&#8221;0px|40px|0px|40px|false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#f7f7f7&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;off|desktop&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243; custom_margin_last_edited=&#8221;off|desktop&#8221;]<div>\n<h2><b>YOUR QUICK READINESS SCORE<\/b><\/h2>\n<\/div>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;0px|0px|40px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<p><span style=\"color: #339966;\"><strong>5 of 5 answered confidently:<\/strong><\/span><br \/>Your foundations are solid. Focus on testing and continuous improvement.<\/p>\n<p><span style=\"color: #ff9900;\"><strong>3 to 4 answered confidently:<\/strong><\/span><br \/>Good progress. Address the gaps systematically, starting with MFA and backup testing.<\/p>\n<p><span style=\"color: #ff0000;\"><strong>2 or fewer answered confidently:<\/strong><\/span><br \/>This is the right time to review your security posture with your IT provider. The gaps are actionable, not overwhelming.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; custom_margin=&#8221;40px|0px|0px|0px|false|false&#8221; custom_margin_tablet=&#8221;60px||||false|false&#8221; custom_margin_phone=&#8221;40px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_phone=&#8221;26px&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h2><b>A Final Word<\/b><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;18px&#8221; custom_margin=&#8221;10px|0px|10px|0px|false|false&#8221; custom_margin_tablet=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_phone=&#8221;0px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; hover_enabled=&#8221;0&#8243; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<p>We encourage every Malaysian business owner to review their cyber readiness with their current IT adviser or service provider. Use the five questions above as a practical starting point. Ask for a written backup and recovery plan. Request a risk assessment. These are reasonable, professional conversations that any qualified IT partner should welcome.<\/p>\n<p>If you would like a second perspective, or if you are evaluating your options and want an independent view of your cyber readiness, BigBand is happy to offer a no-obligation conversation. We are not here to replace your current provider. We are here to make sure your business is as protected as it can be.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#0060ae&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;60px||60px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;0px|0px|0px|0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"color: #ffffff;\"><strong>FREE BUSINESS TOOL<\/strong><\/span><\/p>[\/et_pb_text][et_pb_text content_tablet=&#8221;<h2>The Reality of Cyber Risk<br \/>in Malaysia Today<\/h2>&#8221; content_phone=&#8221;<h2>The Reality of Cyber Risk in Malaysia Today<\/h2>&#8221; content_last_edited=&#8221;off|desktop&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;|700|||||||&#8221; header_2_text_align=&#8221;left&#8221; header_2_text_color=&#8221;#0060ae&#8221; header_2_font_size=&#8221;44px&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; header_2_font_size_tablet=&#8221;42px&#8221; header_2_font_size_phone=&#8221;34px&#8221; header_2_font_size_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<h2><span style=\"color: #ffffff;\">Cyber Security<br \/>Risk Review Checklist<\/span><\/h2>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;20px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_text_align=&#8221;center&#8221; custom_margin=&#8221;10px|0px|0px|0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;18px&#8221; text_font_size_phone=&#8221;18px&#8221; text_font_size_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"color: #ffffff;\">Most organisations are unsure of their actual cyber risk exposure. BigBand&#8217;s self-assessment tool evaluates your protection across 7 critical areas and places your organisation into one of four risk levels.<\/span><\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #11aa5d;\">\u2713 Low Exposure<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #f7c318;\">\u26a0 Moderate Risk<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #ef8017;\">\u26a0 High Risk<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #e02b20;\">\u2715 Critical Exposure<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;14px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px||0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;24px&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_phone=&#8221;1.3em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; border_color_top=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"source-note\"><span style=\"color: #ffffff;\"><em><strong>Reviews:<\/strong> Firewall &amp; network \u00b7 Endpoint coverage \u00b7 Remote access \u00b7 Backup readiness \u00b7 Email &amp; phishing \u00b7 Monitoring capability \u00b7 Incident response<\/em><\/span><\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_form use_spam_service=&#8221;on&#8221; recaptcha_list=&#8221;BigBand Website|BigBand Website-0&#8243; email=&#8221;edward@bigband.net.my&#8221; title=&#8221;Download Your Free Checklist&#8221; custom_message=&#8221;Big Band Blog||et_pb_line_break_holder||Zero Trust: The Security Model Every Malaysian Business Needs in 2026.||et_pb_line_break_holder||||et_pb_line_break_holder||||et_pb_line_break_holder||Name:||et_pb_line_break_holder||%%Name%%||et_pb_line_break_holder||||et_pb_line_break_holder||Company Name:||et_pb_line_break_holder||%%Company%%||et_pb_line_break_holder||||et_pb_line_break_holder||Business Email Address:||et_pb_line_break_holder||%%Email%%||et_pb_line_break_holder||||et_pb_line_break_holder||Contact Number:||et_pb_line_break_holder||%%Contact%%||et_pb_line_break_holder||||et_pb_line_break_holder||||et_pb_line_break_holder||This email was sent from a contact form on https:\/\/bigband.net.my\/index.php\/2026\/03\/27\/zero-trust-security-malaysia-2026\/||et_pb_line_break_holder||&#8221; use_redirect=&#8221;on&#8221; redirect_url=&#8221;\/index.php\/cyber-security-services-risk-review-checklist-thank-you\/&#8221; submit_button_text=&#8221;Download Cyber Security Risk Review&#8221; module_id=&#8221;et_pb_contact_form_0&#8243; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; _unique_id=&#8221;57644e57-22ad-4d0c-be78-8720b39a3eb5&#8243; form_field_background_color=&#8221;#FFFFFF&#8221; form_field_text_color=&#8221;#58595b&#8221; form_field_focus_background_color=&#8221;#FFFFFF&#8221; form_field_focus_text_color=&#8221;#58595b&#8221; title_font=&#8221;|600|||||||&#8221; title_text_color=&#8221;#FFFFFF&#8221; title_font_size=&#8221;26px&#8221; captcha_text_color=&#8221;RGBA(255,255,255,0)&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#123884&#8243; button_bg_color=&#8221;#f6921e&#8221; button_border_width=&#8221;0px&#8221; button_border_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_radius=&#8221;7px&#8221; button_font=&#8221;|600|||||||&#8221; custom_margin=&#8221;45px||||false|false&#8221; custom_margin_tablet=&#8221;30px||||false|false&#8221; custom_margin_phone=&#8221;20px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_contact_field field_id=&#8221;Name&#8221; field_title=&#8221;Your Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Company&#8221; field_title=&#8221;Company Name&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Email&#8221; field_title=&#8221;Business Email Address&#8221; field_type=&#8221;email&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; global_colors_info=&#8221;{}&#8221; button_text_size__hover_enabled=&#8221;off&#8221; button_one_text_size__hover_enabled=&#8221;off&#8221; button_two_text_size__hover_enabled=&#8221;off&#8221; button_text_color__hover_enabled=&#8221;off&#8221; button_one_text_color__hover_enabled=&#8221;off&#8221; button_two_text_color__hover_enabled=&#8221;off&#8221; button_border_width__hover_enabled=&#8221;off&#8221; button_one_border_width__hover_enabled=&#8221;off&#8221; button_two_border_width__hover_enabled=&#8221;off&#8221; button_border_color__hover_enabled=&#8221;off&#8221; button_one_border_color__hover_enabled=&#8221;off&#8221; button_two_border_color__hover_enabled=&#8221;off&#8221; button_border_radius__hover_enabled=&#8221;off&#8221; button_one_border_radius__hover_enabled=&#8221;off&#8221; button_two_border_radius__hover_enabled=&#8221;off&#8221; button_letter_spacing__hover_enabled=&#8221;off&#8221; button_one_letter_spacing__hover_enabled=&#8221;off&#8221; button_two_letter_spacing__hover_enabled=&#8221;off&#8221; button_bg_color__hover_enabled=&#8221;off&#8221; button_one_bg_color__hover_enabled=&#8221;off&#8221; button_two_bg_color__hover_enabled=&#8221;off&#8221;][\/et_pb_contact_field][et_pb_contact_field field_id=&#8221;Contact&#8221; field_title=&#8221;Contact Number&#8221; fullwidth_field=&#8221;on&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_contact_field][\/et_pb_contact_form][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;14px&#8221; header_3_font=&#8221;|600|||||||&#8221; header_3_font_size=&#8221;20px&#8221; header_3_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;10px|0px||0px|false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; custom_padding=&#8221;||||false|false&#8221; text_font_size_last_edited=&#8221;off|desktop&#8221; header_3_font_size_tablet=&#8221;24px&#8221; header_3_font_size_phone=&#8221;24px&#8221; header_3_font_size_last_edited=&#8221;off|desktop&#8221; header_3_line_height_phone=&#8221;1.3em&#8221; header_3_line_height_last_edited=&#8221;off|desktop&#8221; border_color_all=&#8221;RGBA(255,255,255,0)&#8221; border_color_top=&#8221;RGBA(255,255,255,0)&#8221; global_colors_info=&#8221;{}&#8221;]<div class=\"source-note\"><span style=\"color: #ffffff;\"><em>** Your details are kept strictly confidential. No spam, ever. **<\/em><\/span><\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n","protected":false},"excerpt":{"rendered":"<p>5 Questions Every Malaysian Business Owner Should Ask About Cyber Readiness TodayA practical guide to knowing where you stand, before an incident forces the question.The Businesses That Survive Are the Ones That PreparedThere is a quiet difference between businesses that recover well from a cyber incident and those that do not. It is rarely about [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28131,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[38],"tags":[81,82,80,41,83,76,56],"class_list":["post-28129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-aithreats","tag-checklist","tag-cyberreadiness","tag-cybersecurity","tag-digitalsecurity2026","tag-malaysiasme","tag-pdpa"],"_links":{"self":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/comments?post=28129"}],"version-history":[{"count":12,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28129\/revisions"}],"predecessor-version":[{"id":28153,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/posts\/28129\/revisions\/28153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media\/28131"}],"wp:attachment":[{"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/media?parent=28129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/categories?post=28129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bigband.net.my\/index.php\/wp-json\/wp\/v2\/tags?post=28129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}