2024 Survey Insights

Adam Cassar

Co-Founder

4 min read

Recent customer account takeovers have highlighted the growing need for robust security measures. Our 2024 survey of Australian CISOs and CTOs provides insights into how businesses are adapting their web application security and account protection strategies to meet these challenges, particularly in response to credential stuffing attacks and the emerging threat of residential proxies.

Account Protection: Current State and Future Plans

Our survey found 76.23% of Australian businesses use Multi-Factor Authentication (MFA). While this indicates a recognition of security needs, it also reveals gaps in comprehensive protection strategies.

Current Security Measures of Australian Businesses

Notably, 39.34% of organisations currently implement bot protection, a crucial defence against automated attacks like credential stuffing. This figure, while concerning, is set to improve, with 34.65% of businesses planning to implement bot protection in the future.

Planned security measures

These statistics demonstrate a growing awareness of the need for more comprehensive security measures beyond MFA alone.

Current Bot Management Solutions

Our survey revealed interesting insights into the bot management solutions currently employed by Australian businesses. Cloudflare emerged as the clear leader, with nearly half of the respondents using their services.

Current bot management solutions used by Australian businesses

The breakdown of bot management solutions is as follows:

  • Cloudflare: 48.24%
  • AWS WAF Bot Ruleset: 10.59%
  • Other solutions make up the remaining percentage

This distribution highlights a significant market concentration, with Cloudflare dominating the landscape. However, it also reveals opportunities for other providers to increase their market share, particularly in addressing emerging threats like those posed by residential proxies.

The choice of bot management solution can significantly impact a business's ability to detect and mitigate sophisticated attacks, including those leveraging residential proxies. As the threat landscape evolves, we may see shifts in this distribution as businesses seek more advanced protection measures.

The Rising Threat of Residential Proxies

A key finding from our survey is the low adoption rate of residential proxy (resip) detection, with only 13.11% of organisations currently using this technology. However, businesses are recognising the growing threat posed by resips, with a significant number planning to implement resip detection in the near future.

Resips pose a unique challenge to account security by making malicious traffic appear legitimate. They enable attackers to:

  1. Bypass traditional IP-based rate limiting
  2. Evade geolocation-based restrictions
  3. Conduct large-scale credential stuffing attacks
  4. Scrape sensitive data undetected

The planned adoption of resip detection technology indicates a shift in security strategies to address this emerging threat.

Learn more about the threat of residential proxies and how to detect them

Credential Stuffing: A Persistent and Growing Concern

Credential stuffing attacks continue to be a major concern for businesses. These attacks exploit the common practice of password reuse across multiple sites, allowing attackers to gain unauthorised access to user accounts.

The survey reveals a growing recognition of this threat, with businesses planning to implement various measures to combat credential stuffing:

  • 34.65% plan to implement bot protection
  • 32.67% intend to add multi-factor authentication
  • 31.68% aim to check credentials against known breaches

These planned implementations demonstrate the industry's move towards more robust, multi-layered security approaches.

Mobile Applications: An Emerging Attack Surface

While mobile applications weren't directly addressed in our survey, the data suggests a potential oversight in mobile security strategies. The low adoption rate of Web Application and API Protection (WAAP) - implemented by only 27.87% of respondents - indicates many businesses may be underprepared to protect their mobile assets.

As mobile apps increasingly become primary interfaces for critical operations, this gap in protection leaves businesses vulnerable to attacks, including those leveraging resips.

Balancing Security and User Experience

As businesses recognise the need for enhanced security measures, they also face the challenge of maintaining a positive user experience. Key considerations for enhancing account protection while preserving usability include:

  1. Expanding beyond MFA
  2. Implementing bot protection
  3. Adopting WAAP solutions
  4. Monitoring credential leaks
  5. Focusing on API security
  6. Implementing residential proxy detection

Explore strategies for balancing security and user experience

Executive vs Engineer Perspectives

Our survey revealed differences in cybersecurity priorities between executives and engineers:

Executive vs Engineer Cybersecurity Priorities

Figure 3: Comparison of cybersecurity priorities between executives and engineers

These differences highlight the need for a comprehensive approach to cybersecurity that addresses concerns at all levels of an organisation, including the emerging threat of RESIPs.

Final Thoughts

Our 2024 survey results demonstrate a growing recognition among Australian businesses of the need for enhanced account protection measures. While gaps in security strategies persist, particularly regarding resip detection and mobile application security, the planned implementation of various security measures indicates a positive trend towards more comprehensive protection.

As the threat landscape evolves, with resips emerging as a significant concern, businesses must continue to adapt their security strategies. By implementing multi-layered security solutions that address the full spectrum of threats, from credential stuffing to resip-based attacks, Australian businesses can better protect their assets, reputation, and customer trust in an increasingly complex digital environment.

Enterprise-Grade Security and Performance

Peakhour offers enterprise-grade security to shield your applications from DDoS attacks, bots, and online fraud, while our global CDN ensures optimal performance.

Contact Us

Related Content

Why Don't We Have an AI UI Yet?

Why Don't We Have an AI UI Yet?

If AI is the next great computer interface, why are we still clicking on icons and navigating menus? Exploring the major hurdles standing between us and a true AI-native operating system.

AI as the Translator Between Human and Machine

AI as the Translator Between Human and Machine

We've gone from command lines to graphical interfaces. The next great leap in how we interact with computers won't be seen, it will be understood. AI is poised to become the ultimate translator between human intent and machine execution.

From Research Paper to Running Code

From Research Paper to Running Code

Exploring how AI can dramatically accelerate the process of turning complex academic research into functional code, with examples from anomaly detection to small LLMs.

My Programming Journey

My Programming Journey

A personal journey through the evolution of programming, from the early days of DOS and BASIC to the current age of AI-assisted coding.

A Complete Guide to SMS Pumping Fraud

A Complete Guide to SMS Pumping Fraud

SMS pumping fraud cost businesses $6.7 billion in 2021. Learn how these sophisticated attacks work, which companies face the highest risk, and the most effective protection strategies.

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.