Cyber threats are becoming more sophisticated, targeted, and relentless. While businesses continue to digitize and expand their systems, attackers are just as quick to adapt—exploiting vulnerabilities faster than many companies can respond. Many organizations, however, still underestimate how rapidly the threat landscape is evolving. Why do certain types of attacks persist? What vulnerabilities are most commonly targeted? And more importantly—what can be done to stay ahead?
In this blog, we’ll share NRI Thailand’s hands-on experience with cybersecurity, drawn from real-world work alongside our clients across the ASEAN region. By supporting organizations on the ground, we’ve gained direct insight into the threats they face and the practical steps they’re taking to protect themselves.
Malware Tops the List of Cyber Threats in ASEAN
Malware is the most common form of cyber-attack in ASEAN across all industries, followed by exploitation of vulnerabilities and intrusion attempts such as phishing, password attack. The most attacked sectors are Manufacturing, Finance and Government (*see table 1, figure 1).
These attacks have already caused serious troubles for many organizations, especially by malware-based attacks like ransomware, which demand payment to restore data or the system. Here are a few examples:
- SingHealth (Singapore-healthcare) was fined for a malware attack of around $11million, and 1.5 million Patient records were breached. (see reference 1)
- NDC (Indonesian government) attackers demanded $8 million ransom, and it took a lot of time to recover with business disruption (see reference 2)
- CDK (Global-automotive) experienced a ransom demand for $50 million; this attack disrupted the system and impacted approximately 15,000 dealerships (see reference 3)
Table 1. Attacked sectors and cause of incidents in ASEAN countries (see reference 4)
Figure 1. Cause of Reported Cyber Incidents (APAC) (see reference 5)
Cybersecurity Challenges and Preventive Measures in the Most Targeted Sectors
Based on NRI Thailand’s research and expert interviews, we’ve found that while the top three most-targeted sectors—Manufacturing, Finance, and Government—have different priorities and pain points, they tend to focus their cybersecurity efforts on similar core areas:
- Raising cybersecurity awareness and training among employees
- Ensuring compliance with security regulations and legal standards
Below is an overview of each sector’s unique challenges and the common measures they are implementing to improve cybersecurity resilience:
Manufacturing:
Challenges:
- Reliance on legacy systems
- High operational risks and costs
- Outdated infrastructure
Measures in-place:
- Enhancing OT (Operational Technology) security and migration to a cloud-based system
- Conducting annual security testing
- Strengthening IT security (access level, anti-virus, data loss prevention aka DLP)
Recommended Technologies:
- SASE(Secure Access Service Edge):
Adopt a cloud-based SASE framework that integrates networking and security to provide secure, seamless access to applications and data—regardless of location. It’s especially effective for monitoring IoT devices and protecting remote access environments. - DLP(Data Loss Prevention):
Use DLP tools to detect and prevent the unauthorized access, use, or transmission of sensitive data—helping safeguard intellectual property and reduce the risk of data breaches.
Finance:
Challenges:
- Store intellectual property and sensitive financial data
- Strong demand for advanced cybersecurity and digital privacy systems
Measures in-place:
- Improving IT security (e.g., threat detection, managed security, monitoring tool)
- Outsource consultant services and hire security personnel
- Performing annual security testing for the system and application, along with security audits
Recommended Technologies:
- SIEM (Security Information and Event Management):
Deploy a SIEM platform to collect, analyze, and correlate security data across your IT environment—enabling real-time threat detection and response. - UEBA (User and Entity Behavior Analytics):
Leverage AI-powered UEBA tools to monitor user and device behavior, identifying unusual patterns that could indicate insider threats or compromised accounts. - SOAR (Security Orchestration, Automation, and Response):
Implement SOAR tools to automate and coordinate security operations. These systems streamline the handling of suspicious traffic, improving the speed and consistency of threat resolution.
Government:
Challenges:
- Storing vast amounts of citizen data
- Budget constraints in cybersecurity investment
- Dependence on legacy systems and complex governance operations
Measures in-place:
- Protecting critical infrastructure
- Improving security standards through consultant services
- Strengthening network security (e.g., firewall, backups, managed security services)
Recommended Technologies:
- IAM (Identity and Access Management):
Use IAM solutions to ensure that the right individuals have access to the right resources at the right time—crucial for managing large volumes of sensitive personal data. - DLP (Data Loss Prevention):
Implement DLP tools to detect and prevent unauthorized access, use, or transfer of sensitive or confidential information, helping protect citizen data and prevent data leaks.
Cross-Industry Cybersecurity Challenges
There are also several challenges that are common across industries. These shared issues continue to make it difficult for organizations to build and maintain strong cybersecurity defenses.
Among the most pressing challenges are:
- Shortage of skilled cybersecurity professionals:
The demand for cybersecurity expertise far exceeds the supply, leading to fierce competition for talent. Many organizations face high turnover and struggle to recruit or retain experienced security professionals. - Low cybersecurity awareness and poor hygiene practices:
Despite growing threats, many employees are still not fully aware of how their actions can put systems at risk. As companies adopt new technologies, continuous user education and secure behavior are more important than ever. - Outdated tools and systems:
Legacy infrastructure and outdated security frameworks leave organizations vulnerable. Poorly configured tools and aging systems are easier for attackers to exploit, putting data and operations at risk.
In Summary: Empowering People, Not Just Systems
While advanced tools and frameworks are essential, one of the most effective defenses remains human awareness. Across ASEAN and beyond, a major weakness in cybersecurity remains insufficient staff training—both in general awareness and technical literacy.
To build true resilience, organizations must regularly assess their digital assets, close knowledge gaps, and foster a culture of vigilance. This includes adopting models like Zero Trust, implementing AI-powered monitoring, and ensuring that all employees—from frontline staff to executives—understand their role in maintaining system security.
With the right tools, consistent training, and a proactive mindset, organizations can significantly reduce their risk and stay ahead of evolving threats.
- https://www.kas.de/documents/288143/14393910/4.1+Prevention+is+No+Cure.pdf/
- https://www.centraldatatech.com/blog-news/ransomware-strikes-national-data-center-the-importance-of-disaster-recovery/
- https://www.techtarget.com/whatis/feature/The-CDK-Global-outage-Explaining-how-it-happened
- https://global.ptsecurity.com/en/research/analytics/cybersecurity-threatscape-in-southeast-asia/#Navigation-36
- https://edge.sitecorecloud.io/krollllc17bf0-kroll6fee-proda464-0e9b/media/Kroll/PDFs/Publications/apac-state-of-incident-response-2022.pdf
- 5 Must-Know AI-Powered Cybersecurity Tools and Services
Profile
-
Papon DumrhideePortraits of Papon Dumrhidee
NRI Thailand
Joined NRI in 2021, experienced in Software development in Automotive industries and Big data.
* Organization names and job titles may differ from the current version.