By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Q&A: Southeast Asian governments face advanced persistent threats online, says FireEye
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Q&A: Southeast Asian governments face advanced persistent threats online, says FireEye
EnterpriseInternet

Q&A: Southeast Asian governments face advanced persistent threats online, says FireEye

Alfred Siew
Last updated: November 17, 2015 at 12:03 PM
Alfred Siew
Published: September 26, 2014
6 Min Read
SHARE
Dave Merkel, FireEye chief technology officer
Dave Merkel, chief technology officer for FireEye’s Mandiant Services Team

Hardly a week passes these days without news of yet another high-profile cyber attack or a potential loophole being exploited by increasingly sophisticated online criminals.

The cyber defence community, however, is working round the clock to stay a step ahead of hackers and malware creators out to earn a quick buck, make a political point or even to embarrass a celebrity.

Just how secure are our digital lives in an age where everything is online? We got hold of Dave Merkel, a chief technology officer from cyber security firm FireEye, which monitors online attacks globally, to answer some pressing issues.

(NOTE: The responses have been edited for brevity and house style)

Q: What seems to be making  digital snooping more advanced and widespread today?

A: Technology is prevalent in everything we do. We live in a fully connected world. Where information goes, spies follow. Where money goes, crime follows.

Information is exchanged and business is transacted across the Internet in tremendous volumes. It is only natural to expect nation states and criminal enterprise to follow that data and money online.

Furthermore, the Internet affords attackers the ability to achieve their goals at a distance, operating from countries with weak or no laws addressing cyber-crime and cyber-espionage.

They can operate with near impunity, attacking an endless variety of victims across the globe. With the lure of increased returns and reduced risk, spies and criminals see more lucrative opportunities using cyber attacks versus traditional “real world” espionage and theft.

Q: We have seen organised crime groups threatening to attack a network or leak information of users if a ransom is not paid. Will governments one day be threatened with such a digital attack, having to pay off hackers or risk a wipe-out of citizens’ data or even damage to critical infrastructure?

A: From FireEye’s Advanced Threat Report, governments are a major target of a variety of APT (advanced persistent threat) malware, particularly the Southeast Asian governments.

However, these attacks are largely focused on espionage, not destructive acts. If cyber criminals or spies were to target a government with an attack that threatened the destruction of data or other systems, they would realise that governments have significant resources and options at their command to pursue the attackers if they feel sufficiently threatened.

“We live in a fully connected world. Where information goes, spies follow. Where money goes, crime follows.”

–Dave Merkel, chief technology officer for FireEye’s Mandiant Services Team

A criminal organisation that engages in cyber-blackmail against a government versus an individual might find themselves at significantly greater risk.

An organisation that threatens the destruction of critical infrastructure might find itself being branded as a terrorist organisation and pursued with the same vigour as groups perpetrating more traditional acts of terror.

Q: From your work with clients and monitoring of global attacks, do you believe governments are ready for such attacks? Which regions tend to be more prepared?

A: From our experiences, governments are definitely key targets worldwide for cyber attacks, whether it’s nations targeting other nations to steal state secrets; tech-savvy activists subverting government websites to protest national policies or simply cyber criminals trying to get their hands on the treasure trove of citizens’ personal data.

Across the globe, cyber-attack preparedness varies and many governments are still not able to block advanced cyber-attacks given the speed at which attackers adapt to digital defences.

However, governments gradually recognise cyber-attacks as the new normal and are taking steps to adopt more effective methods to counter them.

Q: What can end users do to prevent their data being leaked?

A: Today’s cyber-attacks are becoming increasingly prevalent, with many attacks being executed by organised groups. There are three primary areas most users can focus on:

1. Password management: Use different passwords for each online site or service and ensure that each password is sufficiently strong. There are many password management applications that can help with this effort. Where possible, opt in for two-factor authentication services when supported by the site or service they’re using.

2. Good security hygiene on computing or mobile devices: Configure and use software firewalls and anti-virus, and restrict the installation of new applications.

3. Be selective with who you do business with online: Consider the security track record of companies and organisations that you choose to transact with online.

Any organisation can potentially be breached, but the most diligent will manage a breach aggressively, limiting damage, and offer transparency about the impact to their customers.

For the companies charged with safeguarding the information of their users, they must designate someone to be in charge of cyber security in their organisation.

Next, companies must bring cyber security up as a topic of discussion in their business leadership, making it a priority and having their executives come to a consensus on its priority in the business.

Only then can the necessary and critical action of putting in place a cyber security plan be implemented and sustained sufficiently to address the challenges posed by modern attackers.

After a rush to the cloud, enterprises seek easier way to manage infrastructure
Google Meet to be free for everyone from early May 2020
Singapore government to give out S$2.4 billion in ICT tenders this year
Singapore workers turn to personal devices to get their jobs done
All under one roof at ConnecTechAsia
TAGGED:cyber securityFireEyeQ&A

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article MDA proposes tougher rules, more consumer protection for pay-TV services
Next Article Hands on: Asus Memo Pad 8
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?