target audience: TECH SUPPLIER  Publication date: Sep 2023 - Document type: IDC Survey - Doc  Document number: # AP50334023

The State of Ransomware in Asia/Pacific

By:  Sakshi Grover Loading

Content

  • 27 slides


Get More

When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.



Related Links

On-line Presentation

Abstract


This IDC survey provides insights into the ransomware landscape within the Asia/Pacific region. The study delves extensively into various aspects, such as the frequency of attacks encountered by Asia/Pacific enterprises in the preceding 12 months of the survey, ransom amounts paid, effectiveness of security technologies in promptly detecting ransomware incidents, significance of robust backup and disaster recovery strategies, and initial points of compromise in these attacks. Additionally, the report delves into Asia/Pacific cyberinsurance, encompassing policy details, coverage extent, premiums paid, negotiation approaches, and the most effective strategies in reducing premiums.

Furthermore, the survey furnishes invaluable guidance tailored to technology suppliers, sales leaders, and tech marketing leaders, equipping them with essential insights into the dynamic and critical cyberthreat landscape within the region.

"The ever-evolving cyberthreat landscape in the Asia/Pacific region is a complex tapestry woven with elements geopolitical rivalries, rapid digital transformation, and the increasing sophistication of cyber-malefactors and government-affiliated hackers," says Sakshi Grover, research manager, IDC Asia/Pacific. "Notably, the escalation in ransomware payments within the region underscores a growing concern. Cybercriminals have strategically targeted various sectors, exploiting vulnerabilities to encrypt critical data, leading to ransom payments reaching up to US$1,000,000 from Asia/Pacific enterprises. In such a dynamic ecosystem, technology suppliers are advised to tailor solutions to regional needs, prioritize robust identity and access management, concentrate on threat intelligence, cloud security, and monitoring, and embrace modular solutions with flexible pricing models," she adds.



Coverage


Do you have questions about this document
or available subscriptions?