Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou t...
AI‑agent social network exposes millions of credentials and emails
VIVOTEK Enhances VORTEX with Generative AI and Safety Detection
Android spyware campaign exploits AI platform and accessibility servic...
Emerging third-party cyber risks via agentic AI
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Emerging third-party cyber risks via agentic AI

      Emerging third-party cyber risks via agentic AI

      Tuesday, February 3, 2026, 10:22 AM Asia/Singapore | Features
    • Featured

      Rethinking customer identity for financial cybersecurity

      Rethinking customer identity for financial cybersecurity

      Tuesday, January 27, 2026, 4:13 PM Asia/Singapore | Features
    • Featured

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      Wednesday, January 14, 2026, 4:06 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Tips

Cyber education in schools: The overlooked frontline of national security

By Balasubramanian Swaminathan, IMAWS | Thursday, October 2, 2025, 3:57 PM Asia/Singapore

Cyber education in schools: The overlooked frontline of national security

Governments can rewrite cyber risk narratives by turning primary schools into cost-effective incubators of resilient, skilled defenders and AI-resilient workforces.

In today’s digital age, children and teenagers spend considerable time online — whether on social media platforms, streaming services, or multiplayer gaming. Although these activities offer connectivity and entertainment, they also expose young users to cybersecurity risks such as phishing, malware, identity theft, and privacy invasions.

With such digital natives already exposed to the entire spectrum of digital benefits and risks, would it be appropriate for them to be formally schooled about cybersecurity from the outset?

The CybersecAsia.net team recently interviewed Mick Baccio, Global Security Strategist, Splunk, who took the opportunity to share his thoughts and ideas on why cybersecurity education in schools is a vital long-term strategy that governments should urgently adopt to strengthen national defenses.

Inculcating lifelong cyber awareness

Baccio stressed that early education on digital safety is essential, highlighting that the way young people consume and interact with information today is vastly different from that of the previous generations, making tailored cybersecurity education critical.

He advocates introducing cybersecurity concepts starting in primary school:

  • Students can begin with simple yet powerful lessons such as creating strong, unique passwords, enabling multi-factor authentication (MFA) on their accounts, recognizing suspicious emails or messages, and understanding how to protect their personal data.
  • By instilling these habits early, educators can train children to form a security-conscious mindset that they carry into adulthood, potentially spreading the benefits to their families and communities.

Comparing the cultivation of  good cyber hygiene to adopting a healthy lifestyle, Baccio noted: “You start eating better at home. You start working out. The same applies for a good cyber life.” Just as repeated healthy choices build physical resilience, consistent cybersecurity practices create digital resilience.

Once cybersecurity habits become second nature, the young digerati are much harder targets for cybercriminals.

Reinforcing cyber-awareness at the national level
In addition to integrating cybersecurity awareness into early educational curriculums, governments can reinforce the training by supporting year-round national cyber literacy campaigns. This is a proactive approach that addresses vulnerabilities at the root: by empowering the population with knowledge and practical skills from an early age.

Baccio cited some public-awareness initiatives by National Cybersecurity Alliance in the USA. “The theme is to be more secure online and to be stronger online. For example, educating citizens on basic aspects like using multi-factor authentication and strong password hygiene would make individuals phishing resistant. In the long term there would be no more account take over or at least it would be reduced drastically.”

Addressing human capital and resource constraints

While the urgency for cybersecurity talent pools is universal, governments worldwide face varying budget constraints and resource challenges. Baccio likened cybersecurity investment to personal health: “You’re supposed to drink water, eat green, exercise — if you don’t, your body reflects that,” he said. “Similarly, neglecting core cybersecurity basics leaves systems exposed and vulnerable to attack.”

So, governments can prioritize affordable, high-impact practices first — such as enforcing MFA usage, regularly patching software and operating systems, and segmenting networks to limit potential breaches — before investing in highly specialized or expensive solutions. These foundational measures are proven, accessible, and form the backbone of any strong security posture, he said.

Investing in human capital is equally important. An educated population trained in cybersecurity fundamentals reduces preventable security incidents and lessens government response burdens. “An educated population means fewer basic errors that lead to large-scale compromises. The long-term benefits include lower incident costs, reduced downtime, and enhanced public trust in digital government services.”

Recognizing that one size does not fit all, Baccio is urging governments to build flexible strategies tailored to their maturity level and local conditions. “The basics are the same everywhere,” he observed, “but after that, each environment requires customized solutions that best fit their threat landscape and operational needs.”

Technical defenses benefit from cyber-educated workers

Among the many cyber threats governments face, Baccio singles out ransomware as a particularly insidious and underestimated scourge. Often dismissed as a typical business email compromise, ransomware generates billions in fraudulent payments annually and disrupts critical services worldwide — from local governments to healthcare providers, Baccio said.

The ever-growing ransomware landscape demands a comprehensive approach rooted in both technology and human cyber awareness. Baccio emphasized that technical defenses such as regular data backups, network segmentation, and detection systems must be paired with extensive user education to recognize suspicious activity and avoid falling victim. This cyber education, when started from early schooling years, will prepare people even more effectively. More broadly, Baccio stressed that no cyber threat should be ignored or deprioritized. Every attack vector — from phishing to insider threats — poses risks that compound the overall threat landscape.

Governments need to adopt multi-layered defense strategies supported by an informed populace to effectively safeguard digital infrastructure. Education, he argued, is the first line of defense and the foundation upon which technical defenses rely. “Empowered citizens make stronger governments. By embedding cybersecurity knowledge deeply into societies starting from school curriculums, governments take an important step toward a safer digital future.”

Share:

PreviousInterpol’s Africa-wide cybercrime crackdown nets 260 sextortion, romance scam suspects
NextHOSTWAY gains 73% operational efficiency for private cloud operations  

Related Posts

Will a cyberattack destroy or just nick your organization? The choice is yours

Will a cyberattack destroy or just nick your organization? The choice is yours

Tuesday, November 23, 2021

Safeguarding elections amid growing cyberthreats and disinformation

Safeguarding elections amid growing cyberthreats and disinformation

Tuesday, April 22, 2025

Has your digital device been crypto-jacked? Know the signs and precautions

Has your digital device been crypto-jacked? Know the signs and precautions

Wednesday, September 4, 2024

Mobile threat vectors are growing in scale and sophistication

Mobile threat vectors are growing in scale and sophistication

Tuesday, June 13, 2023

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more

Bottom sidebar

Other News

  • ICAC Commissioner attends APEC anti-corruption meetings in Guangzhou to foster collaborations in the Asia Pacific region

    Thursday, February 5, 2026
    HONG KONG, Feb. 4, 2026 …Read More »
  • VIVOTEK Enhances VORTEX with Generative AI and Safety Detection

    Tuesday, February 3, 2026
    Expanding the cloud security ecosystem …Read More »
  • Fraud Syndicates Now Operate Like Businesses: VIDA Urges Malaysian CISOs to Rethink AI-Era Defense

    Tuesday, February 3, 2026
    KUALA LUMPUR, Malaysia, Feb. 2, …Read More »
  • Baseus Security Brings Kickstarter Success X1 Pro Smart AI Dual-Tracking Security Camera to Amazon

    Tuesday, February 3, 2026
    SHENZHEN, China, Feb. 3, 2026 …Read More »
  • SECOM Singapore Receives Frost & Sullivan’s 2025 Singapore Customer Value Leadership Recognition in the Integrated Security Services Industry

    Monday, February 2, 2026
    The company is recognized for …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.