HomeContributing AuthorsProtecting crucial Data & Assets by APAC organisation

    Protecting crucial Data & Assets by APAC organisation

    COVID-19 pandemic has significantly impacted the security of businesses and individuals worldwide. While some industries have been severely hit, others are experiencing sudden and exponential growth in demand for their services. Not surprisingly, this difficult time became a great breeding ground for cybercriminals who are using the pandemic crisis and our dependencies in online services for various gains.

    Latest cyberthreats that CIOs need to be aware of in the APAC region:

    Ransomware – The #1 risk to remote desktop services. Almost two-thirds of ransomware contains an infection vector based on RDP and one of the most persistent services when it comes to account takeover attacks.

    Servers from enterprises are much wanted resources for malicious actors as they can be abused for spam distribution, lateral movement and exfiltration of sensitive information followed by ransom, command and control server for botnets, attack stations for attacking other organizations, cryptocurrency mining and finally deploying ransomware, sometimes after the previous scenarios have been tried and dried, as a last resort to monetize a successful breach.

    Encrypted attack protection – More than 90% of web traffic is now HTTPS encrypted. While HTTPS is crucial for data protection, it opens the door for new DDoS attacks. HTTPS requires many more resources from the target server than the client, meaning hackers can unleash devastating attacks with limited requests. Protection against encrypted DDoS floods is a critical requirement.

    Massive global capacity – Internet of Things (IoT) botnets are growing larger and more sophisticated and becoming more capable of launching larger attacks. They can be purchased on the dark net for relatively small sums, for example the cost of a cup of coffee. Botnets are a significant threat during the massive COVID-19 public health emergency.

    Application layer (L7) DDoS attacks – These pose a unique challenge for DDoS defenses, as they require insight into application behavior, and it is difficult to tell whether a request is legitimate or malicious simply by looking at the network-layer traffic. Moreover, as more and more web traffic is encrypted by SSL and HTTPS, DDoS defenses are frequently unable to look at the contents of the packet itself.

    As a result, many types of DDoS defenses are unable to tell the difference between a legitimate spike in customer traffic (for example, during a flash crowd or a holiday peak) and an actual attack. Examples of attacks are: HTTP/S floods, SSL negotiation attack, Low and Slow attacks, HTTP/S bomb attack and large file download.

    Account takeover/credential theft– Compromised accounts have been traded for financial gain for years. Email addresses, passwords and credentials are low-hanging fruit, as they are relatively cheaper and go in masses. Payment details are another favorite, with prices dictated by different parameters such as country of issue, credit score and more at the highest end.

    The decisions and tools that organizations choose now, and the training they provide to their employees, will have enduring effects on security for years to come. It’s crucial that companies get it right.

    By Nikhil Taneja, Vice President & Managing Director - India , SAARC , Middle East & GSI at Radware
    By Nikhil Taneja, Vice President & Managing Director – India , SAARC , Middle East & GSI at Radware
    ELE Times Bureau
    ELE Times Bureauhttps://www.eletimes.ai/
    ELE Times provides a comprehensive global coverage of Electronics, Technology and the Market. In addition to providing in depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build awareness, drive traffic, communicate your offerings to right audience, generate leads and sell your products better.

    Related News

    Must Read

    India’s Electronics Push: Ambition Is Clear. Execution Will Decide the Outcome

    India’s electronics story has entered a decisive phase. The...

    India on the Road to Semicon Self-Reliance with Three More Plants

    India to welcome three more semiconductor plants after PM...

    Upcoming years to Bring Boom for Semiconductors and Electronics

    Union Minister for Electronics and Information Technology Ashwini Vaishnaw...

    R&S Propels 6G Readiness With FR1–FR3 Carrier Demonstration

    Rohde & Schwarz and Qualcomm Technologies, Inc. have reached...

    ROHM and Suchi Semicon Establish a Strategic Semicon Manufacturing Partnership in India

    ROHM and Suchi Semicon have announced the establishment of...

    Keysight to Demonstrate NR-NTN devices Mobility Testing at MWC 2026 in Collaboration with Samsung

    Keysight Technologies, Inc. will demonstrate lab-based validation of new...

    ROHM Strengthens Supply Capability for GaN Power Devices

    Combining TSMC’s Process Technology to Build an End-to-End, In-Group...

    element14 Community launches smart security and surveillance design challenge

    element14, an Avnet Community, in collaboration with ADI, has...

    R & S and LITEON demonstrate high‑throughput 5G femtocell testing with the PVT360A

    Rohde & Schwarz and LITEON collaborate to showcase a...