{"id":8523,"date":"2024-04-23T19:38:18","date_gmt":"2024-04-23T11:38:18","guid":{"rendered":"https:\/\/www.mfb.com.tw\/test-%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86\/test-%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-%e8%b3%87%e8%a8%8a%e5%ae%89%e5%85%a8\/"},"modified":"2024-06-24T18:24:00","modified_gmt":"2024-06-24T10:24:00","slug":"%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity","status":"publish","type":"page","link":"https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity\/","title":{"rendered":"\u516c\u53f8\u6cbb\u7406-Cybersecurity"},"content":{"rendered":"<div id='av_section_1'  class='avia-section main_color avia-section-large avia-no-border-styling avia-full-stretch avia-bg-style-scroll  avia-builder-el-0  el_before_av_submenu  avia-builder-el-first   container_wrap sidebar_right' style='background-repeat: no-repeat; background-image: url(https:\/\/www.mfb.com.tw\/wp-content\/uploads\/2021\/01\/business007.jpg);background-attachment: scroll; background-position: center left;  '  data-section-bg-repeat='stretch'><div class='container' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8523'><div class='entry-content-wrapper clearfix'>\n<div  style='height:1px; margin-top:-55px'  class='hr hr-invisible  av-desktop-hide av-medium-hide  avia-builder-el-1  el_before_av_one_third  avia-builder-el-first '><span class='hr-inner ' ><span class='hr-inner-style'><\/span><\/span><\/div>\n<div class='flex_column_table av-equal-height-column-flextable -flextable' ><div class=\"flex_column av_one_third  flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding first  avia-builder-el-2  el_after_av_hr  el_before_av_one_third  \" style='border-radius:0px; '><div  style='height:50px' class='hr hr-invisible   avia-builder-el-3  avia-builder-el-no-sibling '><span class='hr-inner ' ><span class='hr-inner-style'><\/span><\/span><\/div><\/div><div class='av-flex-placeholder'><\/div><div class=\"flex_column av_one_third  av-animated-generic fade-in  flex_column_table_cell av-equal-height-column av-align-top   avia-builder-el-4  el_after_av_one_third  el_before_av_one_third  \" style='background: rgba(63,63,63,0.75); padding:30px; background-color:rgba(63,63,63,0.75); border-radius:0px; '><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  av_inherit_color '  style='font-size:15px; color:#ffffff; '  itemprop=\"text\" ><p style=\"text-align: center;\">\uff5cMercuries F&amp;B\uff5c<\/p>\n<\/div><\/section><br \/>\n<div  style='height:1px; margin-top:-45px'  class='hr hr-invisible   avia-builder-el-6  el_after_av_textblock  el_before_av_heading '><span class='hr-inner ' ><span class='hr-inner-style'><\/span><\/span><\/div><br \/>\n<div  style='padding-bottom:10px; color:#ffffff;' class='av-special-heading av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-7  el_after_av_hr  avia-builder-el-last  '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Cybersecurity<\/h1><div class='special-heading-border'><div class='special-heading-inner-border' style='border-color:#ffffff'><\/div><\/div><\/div><\/p><\/div><div class='av-flex-placeholder'><\/div><div class=\"flex_column av_one_third  flex_column_table_cell av-equal-height-column av-align-top av-zero-column-padding   avia-builder-el-8  el_after_av_one_third  el_before_av_hr  \" style='border-radius:0px; '><div  style='height:50px' class='hr hr-invisible   avia-builder-el-9  avia-builder-el-no-sibling '><span class='hr-inner ' ><span class='hr-inner-style'><\/span><\/span><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><div  style='height:1px; margin-top:-60px'  class='hr hr-invisible  av-desktop-hide av-medium-hide  avia-builder-el-10  el_after_av_one_third  avia-builder-el-last '><span class='hr-inner ' ><span class='hr-inner-style'><\/span><\/span><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div class='clear'><\/div><div id='sub_menu1'  class='av-submenu-container alternate_color  avia-builder-el-11  el_after_av_section  el_before_av_one_full  av-sticky-submenu  submenu-not-first container_wrap sidebar_right' style='  z-index:301' ><div class='container av-menu-mobile-disabled '><ul id='av-custom-submenu-1' class='av-subnav-menu av-submenu-pos-center'>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-1'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Corporate Governance<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-2'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-%e8%91%a3%e4%ba%8b%e6%9c%83\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Board of Directors<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-3'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-functional-committee\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Functional Committee<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-4'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/0619%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-internal-audit\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Internal audit<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-5'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86%e6%83%85%e5%bd%a2-corporate-governance-status\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Corporate Governance Status<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-6'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-ethical-corporate-management\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Ethical Corporate Management<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-7'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Cybersecurity<\/span><\/a><\/li>\n<li class='menu-item menu-item-top-level av-menu-button av-menu-button-colored menu-item-top-level-8'><a href='https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-%e5%85%ac%e5%8f%b8%e8%a6%8f%e7%ab%a0\/' ><span class='avia-bullet'><\/span><span class='avia-menu-text'>Company Rules<\/span><\/a><\/li>\n<\/ul><\/div><\/div><div class='sticky_placeholder'><\/div><div id='after_submenu'  class='main_color av_default_container_wrap container_wrap sidebar_right' style=' '  ><div class='container' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-8523'><div class='entry-content-wrapper clearfix'>\n<div class=\"flex_column av_one_full  flex_column_div av-zero-column-padding first  avia-builder-el-12  el_after_av_submenu  el_before_av_hr  avia-builder-el-first  \" style='border-radius:0px; '><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '  style='font-size:18px; '  itemprop=\"text\" ><div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<h1>Risk management framework<\/h1>\n<p>To ensure the sustainable operation of the Company&#8217;s data, systems, and equipment and to enhance cybersecurity, the Company has appointed a dedicated Cybersecurity Officer responsible for overseeing cybersecurity policy guidelines and resource allocation:<\/p>\n<p>A. Establish information-related management procedures.<br \/>\nB. Operate and implement relevant cybersecurity rules.<br \/>\nC. Monitor and audit the implementation status of information equipment.<br \/>\nD. Thereby maintaining and improving overall cybersecurity.<\/p>\n<h1>Cybersecurity policy<\/h1>\n<p>To ensure the confidentiality, integrity, and availability of corporate information, the Company has adopted information-related management procedures for compliance. Including system development, program modification, information and data file access and changes, and irregular cybersecurity promotion, etc., to enhance the cybersecurity awareness of employees.<\/p>\n<\/div>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\"><\/div>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\"><\/div>\n<\/div>\n<\/div><\/section><\/div>\n<div  style=' margin-top:15px; margin-bottom:30px;'  class='hr hr-custom hr-center hr-icon-no   avia-builder-el-14  el_after_av_one_full  el_before_av_one_full '><span class='hr-inner   inner-border-av-border-thin' style=' width:100%; border-color:#cccccc;' ><span class='hr-inner-style'><\/span><\/span><\/div>\n<div class=\"flex_column av_one_full  flex_column_div av-zero-column-padding first  avia-builder-el-15  el_after_av_hr  el_before_av_hr  \" style='border-radius:0px; '><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '  style='font-size:18px; '  itemprop=\"text\" ><h1>Concrete management plan<\/h1>\n<p>A. System and data management<br \/>\n(A) The Information Center and users jointly evaluate system development, modification, conversion, and on-line validation. Subsequent parameter adjustments cannot be modified until they are reviewed and approved.<br \/>\n(B) The user department prepares and keeps the relevant operating documents of the system. When the program is modified, the documents are updated simultaneously to ensure the correctness and completeness of the operating data input by the personnel.<br \/>\n(C) Establish account privilege control, and request authorization to access data. Prevent unauthorized personnel from accessing information.<\/p>\n<p>B. Computer equipment security management<br \/>\n(A) The authorization of each system must be issued upon application, and the password must be changed periodically.<br \/>\n(B) Install anti-virus software on information equipment, update virus patterns, and scan for viruses to ensure the detection of the latest virus attacks and strengthen endpoint protection.<br \/>\n(C) In addition to patching the security loopholes of information equipment, the relevant software\/firmware versions are updated as necessary.<br \/>\n(D) The Administrative Department regularly inventories the cybersecurity systems, establishes a list of core system information assets, and identifies their value.<\/p>\n<p>C. Network security management:<br \/>\n(A) Employees logging in to the Company&#8217;s intranet from a remote location must apply for VPN activation before accessing related services from the Company&#8217;s computer.<br \/>\n(B) Email security control: Enhance cybersecurity protection by filtering unsafe attachments and spam through firewalls, antivirus software, and client software.<\/p>\n<\/div><\/section><\/div>\n<div  style=' margin-top:15px; margin-bottom:30px;'  class='hr hr-custom hr-center hr-icon-no   avia-builder-el-17  el_after_av_one_full  el_before_av_one_full '><span class='hr-inner   inner-border-av-border-thin' style=' width:100%; border-color:#cccccc;' ><span class='hr-inner-style'><\/span><\/span><\/div>\n<div class=\"flex_column av_one_full  flex_column_div av-zero-column-padding first  avia-builder-el-18  el_after_av_hr  avia-builder-el-last  \" style='border-radius:0px; '><section class=\"av_textblock_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock  '  style='font-size:18px; '  itemprop=\"text\" ><h1>Invest resources in cybersecurity management<\/h1>\n<p>(A) Information equipment is placed in a dedicated server room. The server room is equipped with independent air-conditioning, temperature control, and UPS, and access is registered and controlled.<\/p>\n<p>(B) Strengthen network security, establish firewall protection, block illegal intrusion, and enhance the defense mechanism.<\/p>\n<\/div><\/section><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":12,"featured_media":0,"parent":8513,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u516c\u53f8\u6cbb\u7406-Cybersecurity - \u4e09\u5546\u9910\u98f2\u4f01\u696d\u5b98\u7db2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mfb.com.tw\/en\/\u516c\u53f8\u6cbb\u74060619\/\u516c\u53f8\u6cbb\u7406-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u516c\u53f8\u6cbb\u7406-Cybersecurity - \u4e09\u5546\u9910\u98f2\u4f01\u696d\u5b98\u7db2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mfb.com.tw\/en\/\u516c\u53f8\u6cbb\u74060619\/\u516c\u53f8\u6cbb\u7406-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"\u4e09\u5546\u9910\u98f2\u4f01\u696d\u5b98\u7db2\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T10:24:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\">\n\t<meta name=\"twitter:data1\" content=\"eunice\">\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data2\" content=\"8 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mfb.com.tw\/#website\",\"url\":\"https:\/\/www.mfb.com.tw\/\",\"name\":\"\\u4e09\\u5546\\u9910\\u98f2\\u4f01\\u696d\\u5b98\\u7db2\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.mfb.com.tw\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity\/#webpage\",\"url\":\"https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity\/\",\"name\":\"\\u516c\\u53f8\\u6cbb\\u7406-Cybersecurity - \\u4e09\\u5546\\u9910\\u98f2\\u4f01\\u696d\\u5b98\\u7db2\",\"isPartOf\":{\"@id\":\"https:\/\/www.mfb.com.tw\/#website\"},\"datePublished\":\"2024-04-23T11:38:18+00:00\",\"dateModified\":\"2024-06-24T10:24:00+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mfb.com.tw\/en\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%860619\/%e5%85%ac%e5%8f%b8%e6%b2%bb%e7%90%86-cybersecurity\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/pages\/8523"}],"collection":[{"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/comments?post=8523"}],"version-history":[{"count":7,"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/pages\/8523\/revisions"}],"predecessor-version":[{"id":9718,"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/pages\/8523\/revisions\/9718"}],"up":[{"embeddable":true,"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/pages\/8513"}],"wp:attachment":[{"href":"https:\/\/www.mfb.com.tw\/en\/wp-json\/wp\/v2\/media?parent=8523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}