Strategi Mengatasi Data Breaches di Era Industri 4.0: Kasus Data Breaches Bank Rakyat Indonesia
DOI:
https://doi.org/10.54066/jmbe-itb.v3i2.3170Keywords:
cyber security, data breaches, phishing attacks, strategyAbstract
To analyze the strategies implemented by Bank Rakyat Indonesia (BRI) in addressing data breaches in the Industry 4.0 era by identifying contributing factors such as user awareness, security system weaknesses, and the effectiveness of mitigation policies. This study uses a qualitative approach with descriptive methods through document analysis with purposive sampling techniques of official BRI reports and relevant scholarly literature. The research findings indicate that the main causes of data breaches are low digital security awareness, weaknesses in authentication systems, and the rise of phishing attacks. BRI has responded by implementing several key strategies, including digital literacy education, the use of layered security technologies such as multi-factor authentication and AI-based transaction monitoring, as well as early detection and incident response systems. These measures have successfully prevented hundreds of thousands of unauthorized access attempts throughout 2023. The implications of this study emphasize that increasing public awareness of digital security and continuously improving technological infrastructure are crucial steps in minimizing data breach risks and enhancing public trust in digital banking services.
References
Adani, D. W., Nurhayati, I., & Mirati, R. E. (2024). The importance of security awareness in combating phishing attacks: A case study of Bank Rakyat Indonesia. Soshum: Jurnal Sosial dan Humaniora, 14(3), 207–214. https://doi.org/10.31940/soshum.v14i3.207-214
Advertorial. (2024, March 31). Kecerdasan buatan jadi strategi BRI untuk humanisasi layanan perbankan digital. Kompas.com. https://activity.kompas.com/baca-cepat/xplore/biz/read/2024/03/31/153608028/kecerdasan-buatan-jadi-strategi-bri-untuk-humanisasi-layanan-perbankan-digital
Alqudhaibi, A., Albarrak, M., Jagtap, S., Williams, N., & Salonitis, K. (2025). Securing Industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management. Cyber Security and Applications, 3, Article 100067. https://doi.org/10.1016/j.csa.2024.100067
Amin, M. (2014). Pengukuran tingkat keamanan informasi menggunakan Multiple Criteria Decision Analysis (MCDA). Jurnal Penelitian dan Pengembangan Komunikasi dan Informatika, 5(1), 15–24.
Azmi, M. N. A., Saifudin, H., Purba, C. T., Suryaningtyas, A., & Situmorang, U. S. (2024). Analisa kasus kebocoran data pada Bank Indonesia dalam sistem perbankan. Jurnal Multidisiplin Ilmu Akademik, 1(6), 448–458. https://doi.org/10.61722/jmia.v1i6.3267
Baldwin, D. A. (1997). The concept of security. Review of International Studies, 23(1), 5–26. https://doi.org/10.1017/S0260210597000053
Buzan, B., Wæver, O., & De Wilde, J. (1998). Security: A new framework for analysis. Lynne Rienner Publishers.
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: Causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5). https://doi.org/10.1002/widm.1211
Craigen, D., Thibault, N. D., & Purse, R. (2014). Defining cybersecurity. Technology Innovation Management Review, 4(10), 13–21. http://doi.org/10.22215/timreview/835
Darmawan, R. K. (2023, October 31). Pelaku "phishing" kuras tabungan Ratna, uang Rp 1,4 M hasil dagang mendadak lenyap. Kompas.com. https://regional.kompas.com/read/2023/10/31/204000478/pelaku-phishing-kuras-tabungan-ratna-uang-rp-1-4-m-hasil-dagang-mendadak?page=all
Friedman, A. A., & West, D. M. (2010, October 26). Privacy and security in cloud computing. Brookings.edu. https://www.brookings.edu/articles/privacy-and-security-in-cloud-computing/
Hong, J., & Linden, G. (2012). Protecting against data breaches; living with mistakes. Communications of the ACM, 55(6), 10–11. https://doi.org/10.1145/2184319.2184322
Jefferson, B. J. (2024). Cybernetic states: Communication, control, and state-space in the advanced research projects agency. Political Geography, 113, Article 103160. https://doi.org/10.1016/j.polgeo.2024.103160
Kizza, J. M. (2010). Cyberspace, cyberethics, and social networking. In J. M. Kizza (Ed.), Ethical and social issues in the information age (pp. 283–321). Springer. https://doi.org/10.1007/978-0-387-22466-4_11
Kristiyanto, Y., Ismiyana, D., Palah, J. M., & Rachman, M. M. (2024). Dampak serangan social engineering: Studi kasus data breach di Indonesia. Prosiding Manajerial dan Kewirausahaan VIII, 8, 9–17. http://dx.doi.org/10.33370/prc.v8i0.1280
Lending, C., Minnick, K., & Schorno, P. J. (2018). Corporate governance, social responsibility, and data breaches. Financial Review, 53(2), 413–455. https://doi.org/10.1111/fire.12160
Manworren, N., Letwat, J., & Daily, O. (2016). Why you should care about the Target data breach. Business Horizons, 59(3), 257–266. https://doi.org/10.1016/j.bushor.2016.01.002
Oxford University Press. (2014). Oxford online dictionary.
Public Safety Canada. (2010). Canada’s cyber security strategy. https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/archive-cbr-scrt-strtgy/archive-cbr-scrt-strtgy-eng.pdf
PT. Bank Rakyat Indonesia (Persero) Tbk. (2024, July 18). Ini langkah BRI perkuat keamanan digital dari serangan siber. https://bri.co.id/-tidak-diclick/-/asset_publisher/G3x3P8wG7JRn/content/ini-langkah-bri-perkuat-keamanan-digital-dari-serangan-siber
Seemma, P., Nandhini, S., & Sowmiya, M. (2018). Overview of cyber security. International Journal of Advanced Research in Computer and Communication Engineering, 7(11), 125–128. https://doi.org/10.17148/ijarcce.2018.71127
Singer, P. W., & Friedman, A. (2013). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
Sugiyono. (2018). Metode penelitian kualitatif (Edisi ke-3). Alfabeta.
Whitman, M. E., & Mattord, H. J. (2018). Principles of information security (6th ed.). Cengage Learning.
Setiawati, S. (2024, June 10). Cashless makin digemari, ini 5 digital banking pilihan warga RI. CNBC Indonesia. https://www.cnbcindonesia.com/research/20240610063016-128-545113/cashless-makin-digemari-ini-5-digital-banking-pilihan-warga-ri
Shaid, N. J. (2022, November 25). Apa itu phishing: Definisi, cara kerja, ciri-ciri, dan cara mencegahnya. Kompas.com. https://money.kompas.com/read/2022/06/16/183024326/apa-itu-phising-definisi-cara-kerja-ciri-ciri-dan-cara-mencegahnya?page=all
Solms, B. von, & Solms, R. von. (2018). Cyber security and information security – What goes where? Information & Computer Security, 26(1), 2–9. https://doi.org/10.1108/ICS-04-2017-0025
Srinivas, S., & Liang, H. (2022). Being digital to being vulnerable: Does digital transformation allure a data breach? Journal of Electronic Business & Digital Economics, 1(1/2), 111–137. https://doi.org/10.1108/jebde-08-2022-0026
Sukmawan, D. I., & Setyawan, D. P. (2023). Hacker, fear, and harm: Data breaches and national security. Jurnal Global & Strategis, 17(1), 153–182. https://doi.org/10.20473/jgs.17.1.2023.153-182
Suprio, Y. A. B., & Farid, M. (2022). Pengelompokan tingkat kesadaran masyarakat tentang pentingnya keamanan informasi data pribadi berdasarkan clusterisasi K-Means menggunakan Euclidean Distance. Jurnal Informatika, Manajemen dan Komputer, 4(1), 17–23. http://dx.doi.org/10.36723/juri.v14i1.311
Suprio, H., & Farid, M. (2022). Cybersecurity awareness and financial literacy of BRI customers in Jakarta.
Wikina, S. B. (2014). What caused the breach? An examination of use of information technology and health data breaches. Perspectives in Health Information Management, 11, 1–16.
Yuniarti, D., Alfarizy, H., Siallagan, Z., & Rizkyanfi, M. (2023). Analisis potensi dan strategi pencegahan cyber crime dalam sistem logistik di era digital. Jurnal Bisnis, Logistik dan Supply Chain (BLOGCHAIN), 3(1), 23–32. https://doi.org/10.55122/blogchain.v3i1.714
Yusran, M., & Hariadi, R. (2023). Evaluasi akurasi sistem deteksi AI pada keamanan transaksi bank digital. Prosiding Seminar Nasional Teknologi Informasi, 4(1), 101–110.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JURNAL MANAJEMEN DAN BISNIS EKONOMI

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.