Microsoft has released regional findings from their global Security Intelligence Report (SIR), Volume 22, which found that Malaysia is one of the countries with a growing malware encounter. An approximate average of 12.9% of computers running on Microsoft real-time security products in Malaysia reported a malware encounter in the first quarter of 2017. This is slightly higher than the global average of 9%.
The report provides in-depth data and insights into the global threat landscape, particularly on software vulnerabilities, exploits, malware and web-based attacks. In its latest version, it tracked threat data for both endpoint as well as cloud, and profiled more than 100 individual markets. It also shares best practices and solutions that can help organisations better protect, detect and respond to threats.
“For digitalisation to reach its fullest potential, users must trust the technology they use. Because of this, Microsoft is committed to helping our customers and partners build that trust and the first step is to help them to understand the multitude of cyber threats out there. This will allow them to implement more effective ways to manage and neutralise these risks,” states Dr Dzahar Mansor, National Technology Officer, Microsoft Malaysia.
Some of the key trends identified from the SIR includes:
- Ransomware attacks on the rise
A number of ransomware attacks were disproportionately concentrated in Europe and attackers seems to evaluate several factors when determining which regions to target, such as a country’s GDP, average age of computer users and available payment methods.
- Cloud accounts and services under cyber siege
More and more valuable data and digital assets are being stored to the cloud, making it an attractive target for cybercriminals. The SIR highlighted a 300% increase in consumer and enterprise accounts managed in the cloud being attacked globally over the past year. As the frequency and sophistication of attacks on user accounts in the cloud accelerates, there is an increased emphasis on the need to move beyond passwords for authentication.
- Building trust in the digital world by strengthening cybersecurity posture
With a solid cybersecurity architecture and robust cyber hygiene best practices, organisations will be able to better protect their digital environment, detect threats and respond to attacks. Four of the best practices individuals and organisations can consider includes:
- Practice caution when connected to a public Internet domain
- Ensure your software is up to date
- Use the latest technologies and software to ensure better security and privacy to maximise protection against latest threats
- Make cyber security and data privacy policies and governance high priority in your organisations
“In today’s digital age, security cannot be an afterthought. It must be ‘built-in’, all-inclusive and intelligent. The comprehensive threat intelligence that we provide will all play a critical role in integrating cybersecurity into an organisation’s DNA,” adds Mansor. “By making security a top priority, we can build greater trust in technology and enable digital transformation to reach its fullest potential and fulfil its grandest ambitions.”