Building a Blended Cybersecurity Defence
APPLY FOR PARTNERSHIP
Thank you for your interest. Kindly fill out the details below and we will contact you back soon.
Please complete this form to be contacted by one of our experts.
IDC recently released results from Wave 2 of their 2023 Future Enterprise Resiliency and Spending (FERS) Survey (links below). The data contained some interesting snippets about cyberattacks in the Asia-Pacific region.
Cyber Threats in APAC According to IDC Data
The rate of cyberattacks is increasing at an alarming rate and attack vectors are becoming more sophisticated. Cybercriminals continuously develop new methods to exploit vulnerabilities, steal sensitive data, and deploy ransomware or other malware. Securing applications and critical infrastructure is becoming increasingly challenging for defenders as the complexity of their systems increases. This makes it easier for attackers to find vulnerabilities to exploit. Bad actors are increasingly using automated bots and AI tools to make the scanning and probing for weaknesses faster. As a result, businesses face frequent, targeted, and complex cyberattacks that lead to significant financial burdens, business losses, and damage to brand reputation.
The IDC FERS wave 2 report has some illuminating stats about the APAC region. An IDC article discussing the survey (see ref 1) includes this quote about APAC:
“The region is influenced by geopolitical tensions, rapid digitalization, and the growing expertise of cybercriminals and state-sponsored hackers.”
The Wave 2 data states:
- 59% of enterprises in APAC fell victim to ransomware attacks in 2022.
- 32% paid the ransom.
- 97% of those impacted reported that disruption lasted between a day and several weeks.
- Australia, New Zealand, Singapore, and India were the worst impacted.
Dealing With Evolving Cyber Threats
The threats from ransomware and other cyberattacks aren’t going to diminish any time soon. Dealing with current and evolving threats requires a blended and consolidated approach combining protection technologies from multiple vendors and modifications to human behaviour. There is no single deploy-and-forget-about-it solution that will provide guaranteed defence.
Incidentally, this lack of guarantees or certainty from cybersecurity defences should be a core part of all cybersecurity defence strategy planning. Assume, and plan accordingly, that a cyberattacker will gain access at some point. Make sure there are recent useable backups that system admins can use to restore systems from scratch in case of a ransomware attack or any other disaster. Ideally, backups should be physically or logically air-gapped from the network to prevent ransomware from finding and destroying them. Many ransomware attacks actively look for backups to encrypt to increase the chances of getting their ransom demands met.
Designing a Blended Defence Strategy
Organisations looking to enhance their cybersecurity defences do better when they engage with external experts. The threat landscape is complex, and staying current with the threats is a full-time endeavour. One that experts in security vendors and managed security service providers have the time for.
The Halodata Vendor & Partner network has the expertise and the solutions to analyse any organisation’s cybersecurity position and then work with them to design and implement what’s required to lift cybersecurity protections to the levels needed. Our network provides technologies, services, and training across five headline areas:
Identity & Access Management – Ensure that user authentication is strong via technologies such as MFA, privileged access management, and increasingly via the emerging certificate-based passwordless solutions.
Endpoint & Mobile Security – Ensure that devices are up to date with patches, encrypted, can be wiped if lost, have anti-malware protection, and are easy to manage.
Data Protection – Data is what cybercriminals want the most (usually to steal before they encrypt it with ransomware). The Halodata partner network has multiple solutions that work to protect data across multiple levels and locations from leaks or theft.
Risk Management & Compliance – Many organisations must work within Government or industry-mandated frameworks. Solutions to check for and maintain compliance across various frameworks are available via Halodata vendors.
Cloud Security – The Cloud is now the first choice for many application deployments. Ensuring the cybersecurity of any data stored or processed by cloud-hosted applications is still the responsibility of the business that controls the data. Solutions are available to build on and enhance core Cloud and SaaS vendor security.
Find Out More
Contact Halodata to have a conversation about how our expert team plus the industry-leading solutions available from our Vendor and Partner network can enhance your cybersecurity and reduce risk from ransomware and other attacks.
- IDC: Evolving from Threat Detection and Response to Threat Intelligence – https://blogs.idc.com/2023/08/24/evolving-from-threat-detection-and-response-to-threat-intelligence/.
- IDC: Future Enterprise Resiliency and Spending Survey: A Summary View into IT and Network Management Drivers and Direction (Paywalled) – https://www.idc.com/getdoc.jsp?containerId=US50943223.