Story image

Microsoft: Asia's emerging economies vulnerable to malware

05 Sep 2017

Asia’s emerging economies such as Bangladesh, Indonesia and Myanmar are amongst the world’s most vulnerable to malware and other cyber threats, according to findings from Microsoft’s latest Global Security Intelligence Report.

The report shows that Bangladesh, Pakistan, Cambodia, Indonesia and Mongolia were the most at risk in terms of malware encounter rates, while Hong Kong, Singapore, Australia, New Zealand and Japan were least at risk. Japan was rated as the safest country in the world.

Across Bangladesh, Pakistan, Cambodia and Indoensia, one in four computers running real-time Microsoft security products reported a malware encounter between January and March 2017.

According to Keshav Dhakad, Microsoft Asia’s assistant General Counsel and regional director, Digital Crimes Unit (DCU), digital transformation brings profound societal impacts, but users must first trust the technology.

Myanmar, Nepal, Thailand and Vietnam all had an average malware encounter rate of more than 20% in the first quarter – more than double the global average of 9%.

Taiwan hosted the most drive-by download pages with malware in its code.

Japan and China have fared best in terms of avoiding ransomware encounter rates but South Korea had the second highest rate in the world.

The most commonly encountered ransomware was Win32/Spora, which encrypts files with a number of extensions including .doc, .jpg, .docx, .pdf, .xlsx and .zip.

Major headline attacks like WannaCry and NotPetya were ‘disproportionally concentrated’ in Europe and most Asia markets were not heavily impacted by the threats.

According to Microsoft, attackers take GDP, average age of computer users and available payment methods as factors when considering attacks.

Microsoft says that as the threat landscape grows, organisations need solid cybersecurity architecture.

“In today’s digital age, security cannot be an afterthought. It must be “built-in”, all-inclusive and intelligent. By making security a top priority, we can build greater trust in technology and enable digital transformation to reach its fullest potential and fulfil its grandest ambitions,” Keshav says.

Microsoft recommends the following best practices:

1. Do not work in public Wi-Fi hotspots where attackers could eavesdrop on digital communications, capture logins and passwords, and access personal data. 2. Regularly update the operating system and other software programs to ensure the latest patches are installed. This reduces the risk of vulnerability exploitation. Users should also install the most recent release of Windows 10 to take advantage of its improved hardening and security mitigations. 3. Reduce the risk of credential compromise by educating users on why they should avoid simple passwords and enforcing multi-factor authentication methods. 4. Enforce security policies that control access to sensitive data and limit corporate network access to appropriate users, locations, devices, and operating systems. 

Ping Identity offerings accelerates cloud MFA and SSO adoption
90% of respondents trust MFA as an effective security control to protect identity data in public clouds, yet only 60% of organisations have formally adopted it.
Trend Micro introduces cloud and container workload security offering
Container security capabilities added to Trend Micro Deep Security have elevated protection across the DevOps lifecycle and runtime stack.
Veeam joins the ranks of $1bil-revenue software companies
It’s also marked a milestone of 350,000 customers and outlined how it will begin the next stage of its growth.
Veeam enables secondary storage solutions with technology partner program
Veeam has worked with its strategic technology alliance partners to provide flexible deployment options for customers that have continually led to tighter levels of integration.
Veeam Availability Orchestrator update aims to democratise DR
The ability to automatically test, document and reliably recover entire sites, as well as individual workloads from backups in a completely orchestrated way lowers the total cost of ownership (TCO) of DR.
Nuix eyes legal sector as eDiscovery demand skyrockets
eDiscovery must encompass so much more than email and documents. If you haven’t looked at text messages and online chats, digital images, mobile devices, data in the cloud and social media, you’re not getting the whole story.
EXCLUSIVE: Forcepoint global channel chief talks strategy
As a solution sold 100% via the channel, cybersecurity solutions company Forcepoint places a strong emphasis on its partner relationships.
Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."