itb-au logo
Story image

A/NZ organisations slack in Notifiable Data Breach scheme

13 Mar 2019

Following the introduction of the Notifiable Data Breach Scheme (NDB) in February 2018, a survey of ANZ businesses by CompTIA has revealed some concerning findings.

Despite the enforcement of NDB, 23 percent of organisations haven’t made any change to exsiting security policies to comply, while another 35 percent of respondents aren’t sure if their organisation has made changes.

According to the Office of the Australian Information Commissioner (OAIC), more than one third of companies that had data breaches in the past quarter passed on private customer information because of simple human mistakes.

“With human error accounting for a large proportion of breaches, it is concerning that some people are not even aware of whether their company has changed its policy to comply with the NDB,” says CompTIA ANZ Channel Community executive council member and Datto APAC director of sales James Bergi.

“Education and awareness need to play a critical role in protecting customers and mitigating risk.”

When it comes to incident response, 37 per cent of respondents said their organisation did not have formal policies and procedures, but relied on unwritten rules that were typically followed. A further 14 per cent did not have policies and procedures addressing security incident responses.

In the July-September 2018 quarter, 245 breach notifications were reported to the OAIC.

“These breaches are happening, and will continue to do so, which means organisations need to take the threat seriously and make sure they are compliant with the legislation,” says Bergi.

According to the respondents with formal response plans, these included roles and responsibilities for addressing the incident (90 percent), complete backup/recovery plan including prioritisation of systems (80 percent), identification of affected systems (75 percent), identification of attack (74 percent), education on how the incident occurred and future mitigation strategies (73 percent), and a public communications plan if customer/partner data was affected (55 percent).

“Most businesses think they are in control of security. However, the reality is quite different for many. It can be easy to forget how dynamic the danger is, and cybercriminals rely on this complacency,” Bergi says.

“A security risk assessment is an effective way for businesses to assess their current posture. Businesses should treat information security risk assessments as an ongoing process of discovering, correcting, and preventing security problems.”

Story image
How e-invoicing works and why it’s essential for business survival
The reasons for implementing e-invoicing centre on unlocking many benefits for all stakeholders by automating previously manual processes, writes MessageXchange managing director John Delaney.More
Link image
Modern device management for Windows with Microsoft Intune & Mobile Mentor
In today’s hybrid workforce, hands-on device management is almost impossible to coordinate. Why waste hours visiting homes when you can do it all, remotely? Transform your Windows machines in three easy steps with Microsoft Intune and Mobile Mentor.More
Story image
Okta's $6.5b Auth0 acquisition carves deeper path into identity market
Auth0 will become an independent business unit within the security giant, Okta.More
Story image
CSO Group scores AU$16m deal with NSW Government
The deal focuses on the refresh and uplift of cybersecurity capabilities and technologies for the cloud, endpoint and email, leveraging the recently launched CSO Managed Security Service.More
Story image
Cloud-based email threats capitalising on chaos of COVID-19
Trend Micro blocked 16.7 million high-risk email threats that slipped past webmail providers' native filters, an increase of nearly a third on 2019 figures.More
Story image
IBM partners with Portworx by Pure Storage to help enterprises manage hybrid cloud workloads
“With the pace of cloud adoption accelerating, companies are increasingly turning to hybrid cloud to allow them to innovate more efficiently, while maintaining high levels of security and control."More