January 16, 2018 By Larry Loeb 2 min read

Companies in Asia-Pacific take almost twice as long to detect a cyberattack as organizations based in other regions, according to recent research.

A report by FireEye and Marsh & McLennan revealed that the median dwell time — the time between a cyber intrusion and its detection — amounted to 172 days in the region, compared to the global median of 99 days. This gap is due largely to structural problems, low security investments and other issues.

Dwelling on Dwell Time in Asia-Pacific

The Asia-Pacific region consists of East Asia, South Asia, Southeast Asia and Oceania. According to the report, the Europe, Middle East and Africa region tallied a median dwell time of 106 days, while the Americas came in at 99 days.

As a result of the region’s heterogeneity, companies located in Asia-Pacific vary widely in terms of their security commitments, preparedness and awareness, the study noted. This inconsistency, along with a lack of investment in security infrastructure, geopolitical tensions and a severe shortage of cybersecurity practitioners, contributes to the high dwell time. A preponderance of legacy systems may also lead to complacency and longer dwell times, according to the report.

In addition, most countries in Asia-Pacific lack regulations that require organizations to report security incidents. The study mentioned, however, that Singapore and Australia do have plans to implement such requirements in 2018.

Financial Services Under Attack

Citing results from Marsh & McLennan’s “2017 Global Cyber Survey,” FireEye noted that 39 percent of international corporations across industry sectors in Asia-Pacific ranked financially motivated attacks as the most significant cyberthreat, as reported by ZDNet.

Furthermore, almost one-third of FireEye clients that suffered cyberattacks in the past year were part of the financial services sector. For comparison, 10 percent of targeted companies hailed from the energy and utilities industry, followed by the telecommunications sector at 9 percent.

Reducing high dwell time can only come from better security practices and more evolved security programs. The report pointed to a particular need for heightened awareness, stronger threat mitigation measures, and stricter privacy and reporting regulations in the Asia-Pacific region.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today