According to one cybersecurity firm’s 2023 data, the picture does not look very good unless the region prioritizes five imperatives religiously.
Many countries in South-east Asia (SEA) have been ramping up digital transformation. The increased reliance on digital technologies and online platforms has rendered organizations far more susceptible to cyber threats than ever.
Over the past year, Steven Scheurmann, Regional Vice President (ASEAN), Palo Alto Networks, has witnesses notable cases of data breaches and ransomware attacks affecting organizations across the region.
CybersecAsia.net finds out more in an interview to discern cyber trends to watch for this year …
CybersecAsia: What were the top cyberattacks your firm’s SEA customers experienced in 2023?
Steven Scheurmann (SS): Data breaches continued to be prevalent across the region, especially those involving sensitive information like personal identifiers, financial data, and trade secrets.
The impact of such attacks on various sectors has prompted proactive responses from governments in the region, which have been actively working towards implementing and amending national privacy regulations. However, it is important to note that the dynamic nature of the threat landscape means that regulations may take time to catch up with emerging threats. Moreover, for businesses, the impact of such attacks extends beyond financial losses and regulatory penalties — encompassing reputational damage, operational disruptions, and the erosion of trust in the digital ecosystem.
On the other hand, ransomware attacks combined with extortion tactics, also comprised top cyberattacks in our customer base due to the financial motivations. In a region with a mix of large corporations and smaller enterprises, such financial burdens can be especially challenging to bear.
In terms of specific threats, our research has uncovered the region’s top cyber threats:
- malware attacks (60%), which underscore the importance of robust endpoint protection, regular updates, and user awareness
- password attacks (51%), which highlight the necessity of multifactor authentication and secure password management practices
- account takeovers (51%), which demonstrate the need for continuous monitoring, threat intelligence, and proactive incident response
- attacks on the public sector and critical infrastructure, which had direct implications for national security, economic stability, regional interconnectivity. The consequences of such attacks on these sectors can be far-reaching and have long-term effects on both individual nations and the region as a whole. These attacks emphasize the significance of strategic investments in cybersecurity, cross-sector collaboration, and the development of resilient, robust systems to safeguard national security and economic stability.
CybersecAsia: What were the top cybersecurity strategies employed by organizations across the region in 2023?
SS: From our research, the top three cybersecurity strategies our customers across the region wanted to incorporate were:
- adopting cloud security (44%)
- identity and access management (40%)
- securing IoT/OT (40%)
Furthermore, our data showed that implementing a Secure Access Service Edge strategy was a focus area for larger businesses with more than 500 employees, while endpoint protection was a focus area for organizations in Malaysia.
CybersecAsia: How do you see the cybersecurity landscape evolving this year?
SS: We foresee the following:
- AI will be leveraged for the execution of attacks. Organizations embracing AI should exercise caution regarding potential vulnerabilities like model poisoning, data leakage, prompt injection attacks, and similar threats.
- The exploitation of innovation gaps is expected to persist as AI continues to gain traction for legitimate use cases. Addressing this challenge involves the implementation of comprehensive security controls, robust vulnerability management, and vigilant threat monitoring across the entire lifecycle of AI development projects.
- Also, how well organizations secure operational technology (OT) will be a critical determinant for the region’s landscape. While some organizations believe that OT environments are safeguarded by an air gap, the evolving landscape reveals a significant IT/OT convergence, connecting OT systems more extensively to the cloud. This intricate connectivity not only broadens the attack surface but also substantially elevates the risk associated with OT networks. Consequently, a trend will emerge whereby organizations allocate resources towards enhancing the maturity of their Operational Technology (OT) cybersecurity to safeguard crucial business systems to effectively manage the heightened risks.Consolidation of cybersecurity tools will also be an imperative
In 2024, organizations should prioritize simplification, opting for integrated cybersecurity stacks to enhance efficiency.
CybersecAsia: What should organizations do to protect themselves this year?
SS: Organizations should strive for the following:
- Maintain a proactive approach in cyber defense by consistently evaluating and adjusting the risk profile in alignment with the dynamic threat landscape. With the evolving sophistication of bad actors, vigilance is the key.
- Utilize AI to supplement security. With AI and automation, analysts can process and analyze large volumes of data more quickly. These tools identify patterns to indicate potential threats before an attack occurs, thereby increasing efficiency by automating repetitive and time-consuming tasks.
- Prioritize investments in cloud security to protect digital assets stored and processed in cloud environments. Although the Cloud offers exceptional agility and efficiency, it introduces major security risks that have become increasingly widespread — according to our own data 80% of security exposures are found in cloud environments, which can result in large-scale breaches.
- Focus on OT cybersecurity maturity to safeguard critical business systems, effectively manage heightened risks, and ensure the resilience of essential operations. The best overall practice organizations can implement is Zero Trust measures.
- do away with disjointed cybersecurity tools and prioritize streamlining their security measures. They should recognize the significance of adopting consolidated cybersecurity stacks, promoting a holistic and efficient approach to threat prevention and mitigation.
With today’s ever-expanding attack landscape, organizations need a unified platform to standardize their security protocols and deliver comprehensive protection.
CybersecAsia thanks Steven Scheurmann for sharing his firm’s cyber insights with readers.