Skip to content

Australasian Businesses Lag in Cybersecurity Recovery, Taking 28 Days on Average

Australasian businesses struggle with cybersecurity recovery. Longer dwell times and lack of testing put organizations at risk.

In this image we can see the information board, buildings, shed, trees, electric cables and sky...
In this image we can see the information board, buildings, shed, trees, electric cables and sky with clouds.

Australasian Businesses Lag in Cybersecurity Recovery, Taking 28 Days on Average

Australasian organizations face a significant challenge in cybersecurity, with recovery from attacks taking longer than the global average. A new report reveals that local businesses take an average of 28 days to bounce back, compared to the global norm of 24 days. This is partly due to a lack of confidence in data management capabilities, with more than half of Australasian organizations expressing uncertainty in this area.

The report highlights several factors that contribute to better cybersecurity. Organizations that regularly test their incident response plans, maintain strong communication between CISOs and senior management, and utilise AI tools are more likely to achieve security. However, only 30% of organizations test their incident response plan across all mission-critical workloads, indicating a significant gap in preparedness.

Threat actors are also exploiting longer dwell times, remaining in an organization's IT environment for an average of 199 days before launching a ransomware attack. This underscores the importance of robust detection and response capabilities. Interestingly, while 80% of businesses expect to recover from a cybersecurity incident within five days, with 23% aiming for 24 hours or less, the CISO typically expects a recovery time of five days, while the CEO expects 24 hours or less, indicating a disconnect between expectations and reality.

The report underscores the need for Australasian organizations to improve their cybersecurity posture. Regular testing, strong communication, and AI tools can help achieve this. However, with only 30% of organizations testing their incident response plans across all critical workloads, there is still much work to be done. Organizations that have been breached tend to improve their awareness and resiliency, suggesting that experience can be a valuable teacher in cybersecurity.

Read also:

Latest