Pages

73% of Malaysian organisations expect data breach that impacts customer data in next 12 months


KUALA LUMPUR (Aug 24): A survey by Trend Micro Incorporated revealed that 73% of organisations in Malaysia reported that they are likely to experience a data breach that impacts customer data in the next 12 months.

The findings come from Trend Micro’s biannual Cyber Risk Index (CRI) report, which measures the gap between respondents’ cybersecurity preparedness versus their likelihood of being attacked, noted the cybersecurity company in a statement today. 

In the first half of 2021 (1H21), the CRI surveyed more than 3,600 businesses of all sizes and industries across Asia-Pacific, North America, Europe and Latin America.

The CRI is based on a numerical scale of -10 to 10, with -10 representing the highest level of risk. 

The current index for Malaysia stands at 0.08, which indicates moderate risk, pointed out Trend Micro.

“Once again we’ve found plenty to keep CISOs (chief information security officers) awake at night, from operational and infrastructure risks to data protection, threat activity and human-shaped challenges,” said Goh Chee Hoh, the managing director for Trend Micro Malaysia and Nascent Countries. 

“To lower cyber risk, organisations must be better prepared by going back to basics, identifying the critical data most at risk, focusing on the threats that matter most to their business, and delivering multilayered protection from comprehensive, connected platforms.”

Key findings for Malaysia from the report include:

  • 58% said it is somewhat to very likely that they would suffer serious cyberattacks in the next 12 months
  • 30% suffered more than seven cyberattacks that infiltrated networks/systems
  • 14% had more than seven data breaches of information assets
  • 21% suffered more than seven breaches of customer data over the past year

In Asia-Pacific (APAC), the top five cyberthreats highlighted in the report were as follows:

  1. Ransomware
  2. Watering hole attacks
  3. Advanced persistent threats (APTs)
  4. Malicious insiders
  5. Fileless attacks
The Edge 

No comments:

Post a Comment