January 16, 2018 By Larry Loeb 2 min read

Companies in Asia-Pacific take almost twice as long to detect a cyberattack as organizations based in other regions, according to recent research.

A report by FireEye and Marsh & McLennan revealed that the median dwell time — the time between a cyber intrusion and its detection — amounted to 172 days in the region, compared to the global median of 99 days. This gap is due largely to structural problems, low security investments and other issues.

Dwelling on Dwell Time in Asia-Pacific

The Asia-Pacific region consists of East Asia, South Asia, Southeast Asia and Oceania. According to the report, the Europe, Middle East and Africa region tallied a median dwell time of 106 days, while the Americas came in at 99 days.

As a result of the region’s heterogeneity, companies located in Asia-Pacific vary widely in terms of their security commitments, preparedness and awareness, the study noted. This inconsistency, along with a lack of investment in security infrastructure, geopolitical tensions and a severe shortage of cybersecurity practitioners, contributes to the high dwell time. A preponderance of legacy systems may also lead to complacency and longer dwell times, according to the report.

In addition, most countries in Asia-Pacific lack regulations that require organizations to report security incidents. The study mentioned, however, that Singapore and Australia do have plans to implement such requirements in 2018.

Financial Services Under Attack

Citing results from Marsh & McLennan’s “2017 Global Cyber Survey,” FireEye noted that 39 percent of international corporations across industry sectors in Asia-Pacific ranked financially motivated attacks as the most significant cyberthreat, as reported by ZDNet.

Furthermore, almost one-third of FireEye clients that suffered cyberattacks in the past year were part of the financial services sector. For comparison, 10 percent of targeted companies hailed from the energy and utilities industry, followed by the telecommunications sector at 9 percent.

Reducing high dwell time can only come from better security practices and more evolved security programs. The report pointed to a particular need for heightened awareness, stronger threat mitigation measures, and stricter privacy and reporting regulations in the Asia-Pacific region.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today