News Security

Most Breaches in Asia Pacific Never Become Public: FireEye Report

Asia Pacific organizations were breached for a median period of 520 days before discovering it, trailing European and American counterparts

FireEye has released the first Mandiant M-Trends Asia Pacific report. The report shares statistics and insights gleaned from Mandiant investigations in the region in 2015 and also assesses the latest cyber trends and tactics threat actors used to compromise businesses and steal data.

As per the release, clear findings observed that most breaches in the Asia Pacific region never became public. Unlike in markets with greater security maturity such as the United States, most governments and industry-governing bodies lack effective breach disclosure laws. Asia Pacific organizations are often unprepared to identify and respond to breaches. They cannot defend their networks from attackers because they frequently lack basic response processes and plans, threat intelligence, technology and expertise. Organizations across the region allowed attackers to dwell in their environments for a median period of 520 days before discovering them. This is 374 days higher than the global median of 146 days.

Prior to engaging Mandiant, many client organizations had already conducted forensic investigations internally, or using third parties, but failed to eradicate the attackers from their environments. These efforts sometimes made matters worse by destroying or damaging the forensic evidence needed to understand the full extent of a breach or to attribute activity to a specific threat actor.

Rob van der Ende, Vice President for Mandiant Consulting, Asia Pacific and Japan at FireEye said, “Unfortunately being unprepared for a breach is business as usual in Asia Pacific, and the region’s governments and boards need to address this further. To significantly improve, organizations must bring together the technology, threat intelligence and expertise necessary to quickly detect and respond to cyber attacks. Firms can benefit by embracing modern response techniques rather than legacy approaches, which often fail to find the attacker’s needle in the haystack.”

Related posts

New Relic Named a Cloud Observability Leader by GigaOm

enterpriseitworld

Quantum Announces the Scalar i7 RAPTOR for Data Lakes

enterpriseitworld

HPE Leverages GenAI to Enhance AIOps Capabilities of HPE Aruba Networking Central Platform

enterpriseitworld