HomeLatest NewsOpinionAre cyberattacks outpacing telecommunication security in Asia Pacific?

Are cyberattacks outpacing telecommunication security in Asia Pacific?

With rising cyber threats and high-profile breaches, Asia Pacific's telecommunication sector must urgently strengthen security measures to protect user data and critical infrastructure.

Preferred Source of Google

By Takanori Nishiyama

When it comes to telecommunications, the Asia Pacific has some of the most advanced technological implementations in the world, with China, , Singapore and South Korea having some of the most comprehensive 5G coverage. With such pervasive mobile broadband coverage comes convenience as well as the need for heightened cybersecurity, both from the telcos’ front as well as for end-users.

This concern showed up in the media recently, where a data breach exposed 27 million records at South Korea’s SK Telecom. In a world where your personal identifiable information (PII) can be used against you by threat actors masquerading as you online, data breaches can indeed be a migraine for telecommunications providers holding on to such information, as well as the individuals who entrust them with it.

Advertisement
Saksham Bharat 2026
Saksham Bharat 2026
A multi-stakeholder dialogue on skilling gap in Cybersecurity, Data Resilience and AI — and the roadmap to a Saksham Bharat.
Register Now →
VeeamON 2026 Tour India - Mumbai
VeeamON 2026 Tour India - Mumbai
A VeeamON 2026 India Leadership Series Mumbai for senior public sector and government technology leaders.
Register Now →
Cyber Surakshit Uttar Pradesh
Cyber Surakshit Uttar Pradesh
Find out strategies, frameworks and solutions for building a resilient and secure digital ecosystem across Uttar Pradesh.
Register Now →
VeeamON 2026 Tour India - Bengaluru
VeeamON 2026 Tour India - Bengaluru
A VeeamON 2026 India Leadership Series Bengaluru for senior public sector and government technology leaders.
Register Now →
VeeamON 2026 Tour India - Delhi
VeeamON 2026 Tour India - Delhi
A VeeamON 2026 India Leadership Series Delhi for senior public sector and government technology leaders.
Register Now →
Infosec Reimagined
Infosec Reimagined
Infosec Reimagined 2026 is the premier information security summit where top leaders—CISOs, CROs, CIOs, CTOs and risk executives—converge to redefine cyber resilience.
Register Now →
Digital Senate
Digital Senate
Digital Senate is a premier conference uniting government leaders, technologists and innovators to share ideas, success stories and strategies on digital governance, public sector transformation, cybersecurity and emerging technologies in India.
Register Now →
CIO Prism
CIO Prism
CIO Prism unites forward-thinking technology leaders to exchange transformative insights, shape digital strategies, and foster innovation, empowering enterprises to excel in an era of rapid technological change.
Register Now →

Data breaches are now commonplace

Data breaches are now a regular occurrence, and their impact on privacy is worse than ever. For example, in our internal 2024 report, we found, identity-based attacks as the main cause of this trend. Compromised user credentials, unauthorised access and standing and excessive access permissions are still the most common ways for threat actors to enter and move within a network.

Worse yet, cybersecurity attacks are not one-time incidents, as threat actors are often relentless in their targeted or brute-force attacks, increasingly supported and scaled with the use of artificial intelligence (AI). With sufficient computational power, threat actors can accelerate their onslaughts and scale the size of their campaigns to maximise the number of targets.

It is not uncommon to find, for example, Content Management System (CMS) websites based on WordPress typically “invite” brute-force attacks relentlessly when they become online, which makes securing any node, server, or web property a dedicated job. In 2024, Wordfence reported over 4.3 million brute-force attacks against WordPress sites.

Advertisement

Identity and access management controls are an important first line of defence. Keeper Security’s research found that 52% of information technology and cybersecurity leaders said their teams have trouble with securing passwords against theft, signifying that it is a significant challenge even today.

To keep up with how quickly threat actors speed up and scale their attacks, organisations must secure their passwords and secrets, implement a zero-trust security model and enforce the Principle of Least Privilege (PoLP) with a modern Privileged Access Management (PAM) solution.

Telecommunications organisations are prime targets

Threat actors attack and attempt to breach their targets based on a variety of motivations, which can range from from financial incentives to political reasons and even “bragging rights” to their nefarious peers.

Advertisement

Telecommunications service providers are naturally prime targets for threat actors because they are well-known brands, handle vast amounts of sensitive and run critical infrastructures. Nation-state actors and cybercriminals are relentless in their efforts to exploit potential security lapses and vulnerabilities that can lead to a catastrophic breach.

These vulnerabilities can include stolen login information and excessive access rights for particular users. When threat actors traverse through a network, they do the most damage by slowly and insidiously gaining more access and gathering sensitive data without anyone noticing.

Phishing is often the most common way threat actors begin, since the barrier to entry is very low and end-users without heightened hygiene can easily be compromised. In the telecommunications industry, even one hacked account can put millions of users and important systems at risk.

Keeping vigil

So, how should organisations adapt and lead in securing their networks, systems and users in the Asia-Pacific region?

First, the idea of simply setting up a comprehensive perimeter defence is no longer enough. As cyber attacks grow in sophistication and organisations adopt models, traditional security models have become vulnerable, prompting many organisations to adopt zero-trust security. Perimeter defence models assume trust for users inside their networks, whereas zero-trust security verifies every user and device by default, requiring continuous authentication.

Organisations in the Asia Pacific need to examine their security architecture and protect the account credentials and access rights that can lead intruders to sensitive systems as well as business and customer data. Poor credential management and too many access rights for individual users are often what lead to the worst data breaches.

A modern cybersecurity posture requires the use of a privileged access management platform to enforce least-privilege access, secure password management to get rid of weak, reused and compromised credentials and the ability for administrators to monitor and control who has access to what.

While regulatory compliance is the bare minimum, organisations must rise above the minimum and understand that the real costs come from the damage to reputation, the trust of customers and the costly disruption to the business.

The author is SVP of APAC & Japan Country Manager, Keeper Security. Views are personal.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Powered By Veeam Logo
- Advertisement -

Subscribe to our Newsletter

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

CPGRAMS grievance pendency rises to 2.11 lakh despite 77,445 disposals in April

India's public grievance pendency rose to 2,11,701 cases by April 2026 despite states disposing of 77,445 complaints. Citizen feedback shows 36 per cent dissatisfaction with resolved cases.

RELATED ARTICLES