"The stock authority performs a routine check two hours before opening at 9 a.m. I directly oversaw todays monitoring system; I hope the market is protected from any threats, including the virus (ransomware)," Sulistio said in Jakarta.
Some 88 countries, including Indonesia, have adopted a multi-layered security system which was already being used by US-based Nasdaq stock market.
"We have Nasdaqs JATS-NextG (Jakarta Automated Trading System Next Generation) in our security protocols," Sulistio revealed, while adding that the stock authority would continue to protect the system from any upcoming threats.
During a separate occasion, earlier, Adena T Friedman, Nasdaq President, remarked her agency had committed to support IDXs trading and monitoring systems.
"We have been partnering with Indonesia Stock Market to provide technology application for improving supervision and trading activities," Friedman affirmed.
Concerning the malware threat, the Indonesian Internet Service Providers Association (APJII) had suggested several preventive acts to reduce the impact of ransomware WannaCry.
As the malware has infected only Microsoft-based computers, users have been asked to update the system by downloading Security Update Patch MS-17-010.
"If the users are not aware about system updates, they can disconnect from any internet wires (LAN), or Wifi, and download the security patch from a non-Microsoft computer by clicking on the links: https://technet.microsoft.com/en-us/library/security/ms17-010 and https://blogs.technet.microsoft.com/msrc/2017/05/12/customer-guidance-for-wannacrypt-attacks/," Much Rifan, the associations deputy of Inter-Agency Relations, mentioned in a written statement received by ANTARA, Monday.
Rifan has also recommended that users back up their files in a separate flash drive (USB) or a portable hard disk, before updating the security system on the computer.
He further revealed that WannaCry malware had attacked computers in some 200 countries, including Indonesia.
The malware works by locking the computers internal system and encrypting the file, after which the users are asked to pay a "ransom" in exchange for their data.(*)