The Philippines’ first and only industry magazine that deals with safety and security matters pervading the environment today.

Facing the surge in cyberattacks: What Philippine businesses need to do

Ram Vaidyanathan, Chief IT Security Evangelist at ManageEngine

The Philippines’ digital economy is growing rapidly, and with this progress comes greater exposure to cyber threats. As more services move online, the country’s exposure to cyberattacks is increasing. In 2024, the Philippines’ digital economy accounted for 8.5% of its GDP (a 7.6% increase from 2023). According to a report, the Philippines has reclaimed its title as Southeast Asia’s fastest-growing internet economy, fueled by a young, mobile-first population and government-backed programs.

The country’s growing reliance on online services and platforms makes it an increasingly attractive target for cybercriminals. According to the Cybercrime Investigation and Coordinating Center (CICC), the agency received over 10,000 complaints in 2024, more than three times the amount from the previous year, with total losses reaching nearly ₱198 million.

Businesses and agencies haven’t been spared either; the financial sector was among the hardest hit industries. Bangko Sentral ng Pilipinas (BSP) revealed that from 2022 to 2024, unauthorized banking transactions in the Philippines amounted to ₱3.37 billion in losses. This includes phishing, account takeovers, and other forms of digital fraud.

It’s clear that the more connected the Philippine economy becomes, the more urgent it is to establish a secure digital foundation. 

Understanding cyberattacks to build better defenses

Most cybercriminals follow a pattern. They often begin with credential access—stealing usernames, passwords, or authentication tokens—to use as an entry point. From there, they escalate privileges to gain broader access and control within a system. Once inside, cybercriminals move laterally across networks to find valuable data, disable security tools, and avoid detection. Finally, they extract data or deploy destructive payloads like ransomware.

These tactics, techniques, and procedures (TTPs) form the backbone of most modern cyberattacks. By studying TTPs, organizations can understand what attackers look for, how they get in, and what they do once inside. This knowledge can be used to spot unusual activity early and close off weak points before they’re exploited.

Strong defenses rely on more than just technology. Security teams need tools that can detect threats, respond quickly, and adapt to new attack methods. However, even the best tools fail if they’re isolated or misconfigured—integration and clarity matter.

Cybersecurity should be treated like physical security, where locks, alarms, and security guards are standard. Networks need the same care—constant monitoring, strict access rules, and trained users. Zero Trust policies are no longer optional. Everyone and everything should be verified, no matter their location. Trust must be conditional, not assumed.

Also, cybersecurity education is just as important as software. When it comes to cyberthreats, employees need to know what to look for and how to respond. Simple awareness can stop many attacks before they start. Regular drills, refresher courses, and updates on new threats should be part of an ongoing learning culture.

Building a strong cyberdefense strategy

An organization’s defense strategy starts with an understanding of what’s happening inside its systems. Visibility and control are non-negotiable. Security teams need to see everything—network traffic, devices, user behavior, endpoints, and apps. If one part of the system goes unchecked, attackers can find their way in. Threats often hide in plain sight, taking advantage of blind spots caused by siloed tools or incomplete data. A full view of the IT environment makes it easier to catch irregular activity and respond before irreversible damage is done.

However, detection is only one part of the process. Once a threat is spotted, the response must be fast and well-coordinated. That means detection tools must be linked to systems that can act on alerts. An alert from a firewall should trigger automated checks across connected systems. Suspicious logins should prompt identity checks or access restrictions. If your tools don’t communicate with each other, you lose time. That lost time can turn a minor breach into a full-blown incident.

Security tools matter, but how they work together matters more. A good defense strategy includes threat detection, response automation, and orchestration. It also includes backup and recovery plans. If an attacker locks down a system, the response team needs a reliable way to restore it. Recovery plans shouldn’t sit on paper—they must regularly be tested and updated when systems or tools change.

Compliance management is another key piece. Meeting security standards helps teams adopt good habits, follow proven practices, and stay accountable. Regular reporting builds trust across the organization and helps leaders see what’s working—and what isn’t. It also sets a baseline for measuring long-term improvement. Finally, good reporting can help organizations meet insurance and audit requirements.

Preparing the Philippines’ digital future

The Philippines’ digital future depends on how well its defenses grow with its ambitions.

Businesses, agencies, and users alike must stay alert, informed, and prepared. Without proactive investment in cybersecurity education, infrastructure, and collaboration between the government and the private sector, the very tools enabling economic growth could become conduits for widespread risk. 

Cybersecurity is no longer just an IT issue—it’s a business imperative, a safeguard of public trust, and a cornerstone of national resilience. If the Philippines is to lead in the digital age, its defenses must evolve with its ambitions.