Did you know that your organisation's data is more valuable than gold? In this article, we’ll unravel the secrets of protecting your organisation's digital assets so you don't become another victim.
In our modern, interconnected society, where technology permeates every facet of our existence, cyber security has risen to unprecedented levels of importance. The expanding array of digital assets coupled with the escalating complexity of cyber threats necessitates a comprehensive grasp of the cyber security landscape. Remaining vigilant and proactive is essential in defending against potential dangers. Therefore, let's dive into the multifaceted realm of cyber security, examining its core principles, analysing recent trends and recurring patterns in cyber incidents, reviewing examples of actual incidents, and outlining strategies for effective mitigation.
Cyber security encompasses a set of practices, technologies, and processes designed to protect computer systems, networks, and data from unauthorised access, attacks, and exploitation. It’s like a digital immune system, constantly monitoring and defending against threats.
In the field of cyber security, the landscape of incidents is ever-changing as attackers formulate ever improving and sophisticated techniques and capitalise on vulnerabilities. Nevertheless, certain consistent themes and trends have emerged in recent times:
In recent years, there has been a significant surge in ransomware attacks, with cybercriminals targeting organisations of varying sizes. These attacks typically involve encrypting data and demanding ransom payments in exchange for decryption keys. Notably, high-profile incidents have underscored the severe impact of ransomware on busines
In recent years, there has been a significant surge in ransomware attacks, with cybercriminals targeting organisations of varying sizes. These attacks typically involve encrypting data and demanding ransom payments in exchange for decryption keys. Notably, high-profile incidents have underscored the severe impact of ransomware on businesses and critical infrastructure. In this article, you’ll find several examples of such notable incidents.
Phishing attacks continue to pose a significant threat, as cybercriminals employ cunning methods to deceive individuals into divulging sensitive information or unwittingly installing malware. These attacks often leverage social engineering techniques, such as impersonation and pretexting, to manipulate victims into compromising their security.
Supply chain attacks entail focusing on third-party vendors or service providers with the aim of illicitly accessing their clients’ networks or data. By exploiting vulnerabilities in these supply chain partners, attackers can infiltrate target organisations and execute sophisticated cyber assaults.
Insider risks represent a substantial danger to organisations, as both malicious insiders and unintentionally negligent employees can compromise security. These insider attacks might encompass activities such as data theft, sabotage, or unauthorised system access.
The widespread adoption of Internet of Things (IoT) devices and operational technology (OT) systems has brought forth fresh security complexities. Vulnerabilities in these IoT and OT devices can be leveraged to initiate cyber attacks, disrupt operations, or compromise critical infrastructure.
The Office of the Australian Information Commissioner (OAIC) is an independent Australian Government agency responsible for privacy and freedom of information.
The Notifiable Data Breach (NDB) scheme was established in February 2018 to drive better security standards and accountability for protecting personal information and to improve consumer protection. Under the scheme, any organisation or government agency covered by the Privacy Act 1988 that experiences an eligible data breach must notify affected individuals and the OAIC.
According to the OAIC Report:
1. 📉 Breaches Decline
2. 🦹 Leading Causes
3. 📅 Swift Identification
4. 🏥 Top Reporting Sectors
5. 👤Impact on Individuals
According to OAIC, and their Notifiable Data Report from January 2023 to June 2023:
1/4
Having covered the trends of cyber incidents, as well as the statistics as reported by the OAIC, let's now explore several real-world examples of such incidents and examine their profound impacts on individuals, organisations, and communities alike.
The Optus data breach stands as one of the largest security breaches in Australian history. As Australia’s second-largest telecommunications company, this incident has prompted inquiries into the country’s data security policies and corporate practices.
Data Breach Details
Personal information of 11 million customers was compromised. The accessed data included names, birth dates, phone numbers, email addresses, home addresses, driver’s licenses, passport numbers, and Medicare ID numbers.
Customer Notification
Optus proactively contacted all customers. They began by notifying those directly impacted by the breach and then extended notifications to those whose data remained secure.
Phishing Attacks Surge
In the aftermath of the breach, there was a notable increase in phishing attacks and fraudulent attempts specifically targeting the affected customers.
Ransom Demand and Data Exposure
Despite a ransom demand, Optus chose not to comply. As a consequence, the attackers publicly released a text file containing 10,000 customer records on September 26. This exposed the data to other malicious actors who could potentially use it for their own phishing campaigns.
Data Breach Impact
Approximately 40% of the population had their personal data compromised.
High-Risk Individuals
Among those affected, approximately 2.8 million people whose passport or license numbers were stolen face a significant risk of identity theft and fraud.
Medicare Card Theft
The breach also resulted in the theft of 37,000 Medicare cards belonging to customers.
In December 2022, Medibank, the prominent Australian health insurance company, fell victim to a significant data breach that impacted the personal information of 9.7 million customers. The privacy breach was first discovered when the attackers posted on a dark web blog a folder that contained 6GB of raw data samples, indicating that they had larger amounts of data to release, and demanded a $10 million ransom.
Data Breach Impact
The personal data of 9.7 million Australians was compromised, and the health claims data of 480,000 customers was publicly posted on the dark web.
Infiltration Method
The attackers gained access to the systems by obtaining worker’s login credentials. These compromised credentials allowed them to infiltrate and compromise the security.
Data Breach and Dark Web Exposure
A hacker group gained unauthorised access to the personal information of 9.7 million current and former customers. Subsequently, they published this data on the dark web.
Legal Action
In response to the breach, three separate class action lawsuits have been filed against the company in Australian courts. These legal actions aim to represent the interests of the affected customer.
Affected Customer Breakdown
The breach impacted a total of 9.7 million individuals, including:
Health Claims Data Access
The breach allowed unauthorised access to health claims data for the following customer groups:
Specific Patient Groups
Among those affected, there were:
The Australian personal loan and financial service provider, was affected by a data breach that impacted millions of people from Australia and New Zealand. Latitude is currently being investigated for its role in the attack and whether or not it had sufficient ability to prevent the attack from happening. The company is also being investigated for a class-action lawsuit.
Several Service NSW staff email accounts were hacked through a series of phishing attacks. This led to millions of documents being accessed, a small percentage of which contained sensitive data impacting members of the community.
March 2020 Data Breach
Document Access and Sensitive Data
Lack of Multi-Factor Authentication
Canva, the Australian unicorn in the online design space, experienced a massive data breach affecting millions of users. To contextualise this, Canva currently boasts approximately 55 million active monthly users.
The breach occurred when a cybercriminal group infiltrated Canva’s defenses. Although Canva detected malicious activity in their systems and intervened, the interception did not happen swiftly enough to prevent the breach.
Mitigation strategies in cyber security aim to reduce the risk of cyber threats and attacks. Here are some common mitigation strategies:
Implement a comprehensive cyber security strategy by combining various protective measures. These include deploying
firewalls, antivirus software, encryption protocols, and intrusion detection
systems. Additionally, ensure timely software updates and patches to mitigate known vulnerabilities.
Provide comprehensive cyber security training to employees, covering essential practices such as identifying and reporting suspicious activities, avoiding phishing scams, and safeguarding sensitive data. Regularly conduct training sessions and awareness campaigns to enhance security consciousness.
Before entering into business relationships, evaluate the security readiness of third-party vendors and service providers. Define explicit security criteria and protocols for supply chain partners, and actively oversee their adherence to established security standards.
Minimise access to sensitive data and systems by adhering to the principle of least privilege. Additionally, deploy robust authentication methods, such as multi-factor authentication, to verify user identities and thwart unauthorised access.
Develop a thorough incident response plan that details protocols for detecting, addressing, and recovering from security incidents. Regularly practice the plan through tabletop exercises and drills to verify its effectiveness and enhance preparedness.
Keep yourself informed about emerging cyber security threats, current trends, and best practices by regularly following industry publications, reading threat intelligence reports, and participating in security forums. Additionally, continuously evaluate and enhance your security measures to stay resilient against evolving threats and vulnerabilities.
An increasing trend in the industry is now the adoption, or alignment, to several frameworks focused on improving an organisation's ability to mitigate cyber incidents.
ISO27001
It is an internationally recognised standard for Information Security Management Systems (ISMS). It provides guidance for organisations of any size and across all sectors to establish, implement, maintain, and continually improve their information security management systems.
SOC2
Service Organisation Control 2, is a widely recognised auditing standard developed by the American Institute of CPAs (AICPA). It is specifically designed for service providers, such as cloud computing vendors, Software as a Service (SaaS) providers, data centres, and other entities that handle customer data or provide services to other organisations.
The SOC 2 framework focuses on five key trust service criteria:
CPS 234
CPS 234 refers to a prudential standard issued by the Australian Prudential Regulation Authority (APRA), known as CPS 234 Information Security, which came into effect on July 1, 2019. CPS 234 sets out requirements for APRA-regulated entities, such as banks, insurance companies, and superannuation funds, regarding their management of information security risks.
The primary objective of CPS 234 is to ensure that APRA-regulated entities take appropriate measures to protect their information assets and maintain the confidentiality, integrity, and availability of those assets. This standard is crucial for safeguarding the financial sector against cyber threats and ensuring the resilience of critical financial systems and services.
In the ever-evolving landscape of cyber security, staying ahead of potential threats requires vigilance, preparedness, and collaboration. By understanding emerging trends, recognising recurring patterns of cyber incidents, and implementing effective mitigation strategies, organisations can enhance their resilience against cyber threats and safeguard their digital assets and operations. As technology continues to emerge and advance, maintaining a proactive approach to cyber security will be paramount in mitigating risks and protecting against potential harm.
If you don't want to be a victim and you believe that your organisation is at risk of cyber attacks, or you wish to uplift your data and information security to align with various frameworks, reach out to Symphonic on contact@symphonic.com.au and we can discuss your needs.
References:
Jose, R & Manekar, S 2023, ‘Australia regulator tells Medibank to set aside $167 million after data breach’, Reuters, 27 June.
Kost, E 2024, ‘13 Biggest Data Breaches in Australia [Updated 2024]’, UpGuard, 18 January.
Office of the Australian Information Commissioner 2023, ‘Notifiable Data Breaches Report: January to June 2023’, OAIC, 5 September.
Powell, O 2022, ‘IOTW: Everything we know about the Optus data breach’, Cyber Security Hub, 29 September.
Taylor, J 2022, ‘Medibank hackers announce ‘case closed’ and dump huge data file on dark web’, The Guardian, 1 December.
Tidy, J & McCallum, S 2023, ‘23andMe: Profiles of 6.9 million people hacked’, BBC News, 5 December.
Turnbull, T 2022, ‘Optus: How a massive data breach has exposed Australia’, BBC News, 29 September.
Date Published: 27 February 2024
Copyright © 2024 Symphonic Management Consulting Pty Ltd - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.