• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home People Culture and Behaviour

APAC's cybercrime surge: effective measures for operational resilience

Melinda Baylon by Melinda Baylon
July 15, 2024
APAC's cybercrime surge: effective measures for operational resilience

APAC's cybercrime surge: effective measures for operational resilience

Share on FacebookShare on Twitter

The Asia Pacific accounted for 23% of global cybersecurity incidents in 2023, according to the IBM X-Force Threat Intelligence Index, underscoring that the region is more prone to cyber-attacks than the others.

The World Economic Forum tagged the region as the new "ground zero" for cybercrime incidents, citing research revealing that APAC had the highest year-over-year increase in weekly cyberattacks in the first quarter of 2023, with an average of 1,835 attacks per organisation, higher than the global average of 1,248 attacks per week.

Alex McMullan

Alex McMullan, CTO International at Pure Storage, cites several reasons, such as "the accelerated digital transformation taking place throughout the region while making organisations more connected, and also more vulnerable to cyber attacks."

He also noted the heavy concentration of manufacturing companies in Asia, making it a common target for cybercriminals. In recent years, Southeast Asia has risen as a global manufacturing hub and retains its attractiveness to global investment even with reshoring movement in other areas.

Aside from that, McMullan said the lower awareness of security among employees in the region makes APAC more vulnerable to cyberattacks.

"Security training firm KnowBe4 recently carried out 600,000 phishing simulation tests in 1,200 organisations in APAC and found that one in three employees were likely to click on a suspicious link or comply with a fraudulent email, well below the global baseline of 34.3%," he explained.

However, the Pure Storage executive said that APAC companies experience the same impact of cyber attacks as in other regions, such as "operational downtime, disruption to the business, loss of intellectual property, and resulting financial losses which could include payment of ransom and penalties by regulators."

Related:  PodChats for FutureCISO: Agility meets security in times of change

Recently, a cyber attack compromised Indonesia's data centre, disrupting government services and compromising sensitive data. McMullan describes this as a "high-profile example of how vulnerable organisations in the region are and how damaging these attacks can be, disrupting airport immigration and other government services."

Most disruptive operational impacts of cyber attacks

"The headline grabber will always be the financial losses," McMullan said on the most disruptive impacts of cyberattacks, citing a study by Microsoft and Frost & Sullivan revealed that the potential economic loss from cyber-attacks could reach US$1.745 trillion in the Asia Pacific region.

McMullan also included business operations disruption negatively affecting regulated industries' revenue, reputation, and financial penalties. "We have observed these impacts in shipping, healthcare, financial services, and transport across the globe," he said.

"However, what could potentially be more damaging long term for any organisation is the loss of its data and intellectual property, which in most cases leads to incalculable losses," said McMullan.

Communication strategies

When a cyberattack happens, companies' communication strategies are essential for the benefit of the company stakeholders.

"The organisations that have emerged best from cyber attacks are those that have been proactive in their communications in the immediate aftermath of an attack and the ongoing resolution," McMullan posits.

The organisations that have emerged best from cyber attacks are those that have been proactive in their communications in the immediate aftermath of an attack and the ongoing resolutionAlex McMullan

He said publicly listed companies must comply with rules, mainly when a cyber attack compromises consumer data and requires the involvement of external authorities.

"The best approach is to be as upfront as possible, within any guidelines and regulations, and be clear about the impact to customers and other stakeholders," he added.

Related:  CrowdStrike launches AI-powered network vulnerability assessment to streamline cybersecurity

Emerging trends and technologies

In the event of cyberattacks, technology leaders can consider emerging trends and technologies to mitigate their operational impacts.

McMullan believes that emerging technologies, when harnessed correctly, can be a boon for an organisation's cybersecurity strategy, offering a ray of hope amidst the cyber threat landscape.

"Take AI, for example. The rapid advancement of deepfake technologies combined with Generative AI is creating new ways to dupe employees. On the flip side, AI can also be used to combat cyber attacks by predicting, detecting, analysing, and responding to threats," he explains.

Further, he said that hardware or software systems have imperfections that require cutting-edge technologies to strengthen security. He warns that "criminal enterprises and nation-state adversaries have access to those same technologies to try and detect security flaws."

He recommends that organisations consider storage systems with enterprise-grade encryption and a default SafeMode that creates immutable snapshots, as well as enhanced cyber recovery and resilience service level agreements that ensure the restoration of normal operations.

"We are seeing cyber resilience service level agreements as an increasingly favourable approach to give customers peace of mind and to put the onus on their technology providers," he said.

Not if, but when

According to McMullan, it's crucial for technology leaders to remember that cybersecurity is an ongoing process. He urges organisations to be prepared, as a cyber attack is not a matter of 'if' but 'when '.

With this more proactive approach, organisations can better prepare for cyber attacks and help minimise their operational impact.

Tags: IBM Securityoperational resiliencePure Storage
Melinda Baylon

Melinda Baylon

Melinda Baylon joins Cxociety as editor for FutureCIO and FutureIoT. As editor, she will be the main editorial contact for communications professionals looking to engage with aforementioned media titles. 

Melinda has adecade-long career in the media industry and served as TV reporter for ABS-CBN and IBC 13. She also worked as a researcher for GMA-7 and a news reader for Far East Broadcasting Company Philippines. 

Prior to working for Cxociety, she worked for a local government unit as a public information officer. She now ventures into the world of finance and technology writing while pursuing her passions in poetry, public speaking and content creation. 

Based in the Philippines, she can be reached at [email protected]

No Result
View All Result

Recent Posts

  • Reimagining security for the AI Era
  • PodChats for FutureCISO: Articulating the business value of security in 2025
  • New standard for cybersecurity at the storage layer
  • Cybersecurity challenges persist despite improved defenses
  • Weak password reuse crisis remains

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl