sb-nz logo
Story image

DDoS attacks are 'no longer isolated events'

Ransomware and malware activation has been discovered within 34% of cyberattacks within APAC, according to Neustar.

This discovery follows Neustar publishing its DDoS Attacks & Protection Report: A Steady Threat in the Connected World,” a research report focused on DDoS attack and protection trends.

The report highlights that DDoS attack volume has remained consistently high and that they could actually do organisations some real damage.

Rob Ayoub, research director of Security Products for IDC, says that Distributed denial-of-service attacks are no longer isolated events limited to large, highly visible, targets.

“Sophisticated attacks hit companies of all sizes, in all industries,” he says.

Neustar conducted the research with respondents from more than 1,000 information security professionals including CISOs, CSOs and CTOs across Asia-Pacific (APAC), North America, Europe, and the Middle East (EMEA).

Among key findings, Neustar points out that DDoS Attacks Are Time-Consuming and Expensive. It can sometimes take hours to detect and mitigate a DDoS attack at major cost to the organisation.

A total of 81% of organisations in APAC took an hour or more to detect a DDoS attack and 72% took an additional hour or more to respond to the attack.

Globally, 49% of surveyed organisations would lose $100,000 or more per hour of downtime during these attacks.

Robin Schmitt, head of  Security for APAC at Neustar, says organisations across Asia Pacific are becoming more digitalised and as a result risk being exposed to increasingly complex and relentless attacks

“IT and business leaders need to realise the potential damage that an attack can cause, and apply adequate security measures that will protect their company from a DDoS attacks.”

Story image
SOC, SIEM, SOAR and SASE define Fortinet’s Security Fabric
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, deciphers the jargon and explains how an alphabet soup of integrated security services spells comprehensive protection for your network and ensures business continuity.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
IDC survey: Nearly 1/3 of data-ransomed businesses pay up
A Rubrik-commissioned A/NZ survey by IDC finds that despite only 6% saying they would pay ransomware attackers, the reality is quite different.More
Story image
COVID-19 crushes fingerprint reader market
However, the biometrics market is expected to regain momentum with alternatives already beginning to find their feet.More
Story image
Businesses left to make decisions based on old, inaccurate data, study finds
"It is more critical than ever that organisations have access to actionable, contextualised, near real-time threat data to power the network and application security tools they use to detect and block malicious actors."More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More