IT Brief Australia logo
Technology news for Australia's largest enterprises
Story image

Experts weigh in on Australia's Notifiable Data Breaches scheme

By Julia Gabel
Thu 5 Apr 2018
FYI, this story is more than a year old

Australia’s new mandatory data breach disclosure law has already shown just how regularly organisations are experiencing data breaches.

More than thirty data breach notifications were submitted by Australian businesses in the first three weeks following the enforcement of the Notifiable Data Breaches (NDB) law.

HP Australia’s recent IT Security Study finds that nearly half of the Australian SMBs who would be impacted by the mandatory legislation lacked suitable IT security policies.

A staggering 57% of respondents hadn’t completed any sort of IT risk assessment in the past year.

There are too many Australian organisations open to attack. But, how do organisations even know where to start?

To shed some light on preparing for and mitigating a data breach, executives from SOTI, Seagate and Envisian weigh in with their advice.

The Stakes are Higher, and Business-Critical

SOTI’s Asia Pacific managing director Adele Beachley, says that as companies deepen and broaden their mobility programs and adopt the Internet of Things (IoT), they are becoming more attractive targets.

“Protecting personal information collected and stored within the big data of any business means paying attention to whatever mobile and IoT program your business is running, implementing or even planning for.”

Beachley lists the following as some of the crucial measures to be taken to protect the personal information of employees, customers, users, partners and other stakeholders:

  • Prevention of communication interception e.g. man in the middle attacks, via public unsecured WiFi, Bluetooth, even fake cell phone towers (aka stingrays) which spoof 2G/3G/4G connections.
  • Preventing physical device access through tactics such as strong password policies, enforced encryption, geo tracking and geo fencing.
  • Ensuring device compliance with policies that are suited for your organisation, industry, and types of device usage. This may include enforced separation of work and personal data and apps, to reduce the risk and liability of the business.

Beachley adds, “I mean, 87% of the adult population in Australia use a smartphone - what is everyone doing with it? The short answer is apps, apps and more apps.”

“Five hours, 34 minutes spent on the internet per day and one hour, 39 minutes on social media. In fact, 15 million Australians access social media from a smartphone. That’s 61% of the population, according to IDC’s Data Age 2025 study.”

“The reality is that free apps aren’t really free,” continues Beachley.

“Both apps and social tools collect a surprising amount of data about their users. For example, have you ever done research on a hotel, holiday destination or property online and then suddenly your social feed is full of ‘suggested’ posts specifically related to your search?”

“You are being targeted based on your smartphone habits and data that has been collected and stored about you.”

“The user is generally totally unaware of the extent of the information collated, its intended use or how it is to be monetised – just look at what is happening right now with Cambridge Analytica and Facebook.”

According to SOTI, enterprises are collecting, storing and failing to adequately secure a growing amount of this kind of data, thanks to BYO and BYOA programs without robust, modernised corporate mobility policies and sufficient enforcement of such policies.“

Mobile device and IoT management is already less about the table-stakes tasks of sending out patches, rolling out apps and even tracking devices, and must be focused on integration, data leakage prevention and security,” concludes Beachley.

Protecting Personal Data is now an Enterprise-level Responsibility

Seagate’s regional sales VP for Asia Pacific, Robert Yang, comments: “Thanks to an increase in cross-platform integration, regardless of where the data is created – a smartphone, an autonomous car, via WiFi at the coffee shop, from the transactions of a global financial services company – the challenge of managing more than 97% of the global datasphere falls to enterprises.”  

According to IDC’s Data Age 2025 report, the percentage of data requiring security will grow to nearly 90% by 2025, and will encompass five categories:

  • Lockdown: Information requiring the highest security e.g. financial transactions, personnel files, medical records, military intelligence.
  • Confidential: Business intelligence to be protected e.g. trade secrets, customer lists, memos.
  • Custodial: Account information that, if breached, could lead to or aid in identity theft.
  • Compliance-driven: Information such as emails that might be discoverable in litigation or subject to a retention rule.
  • Private: Information such as an email address on a YouTube upload

“Security and privacy challenges cannot be underplayed,” adds Yang.

“It is no surprise that the Australian government is enacting measures to encourage greater protection of data and personal information.”

“Our world will be awash with data by 2025 – 163 zettabytes, a startling ten-fold increase over what was created in 2016. And yet an IDC study also reveals that by 2025 less than half of the data requiring security will actually be secured.”

On this, the experts agree: there is an increasing need for improved security, systems, policies and processes to handle the deluge of data and protect the private information of individuals and organisations, alike.

But, therein lies the rub, says Envisian IT’s consulting director and co-founder, David Robinson.

“Encouraging security and process improvements is essential,” says Robinson.

“However, in today’s world of online markets, collaboration and digital economies, data must be accessible.”

“The evolution of automobile braking systems design happened because we wanted to go faster and mitigate the risks of going faster, not because we wanted to be safer. Otherwise we’d prevent high speed driving altogether.”

“It should be similar with data. Protection improvements should be driven by the desire for better accessibility, not by the fear of contravention.”

Robinson advocates for putting the right security measures in place, but he says this must not compromise an organisation and its stakeholder’s access to necessary data, the organisation’s capabilities, the functionality with which it provides its employees to do their jobs.

“Striking the right balance is a challenge that organisations must tackle,” adds Robinson.

“The objective of the NDB scheme is to hold Australian businesses and government agencies to a high standard of personal information security.”

Yang agrees that were the data flow to stop for any reason, not only would our business operations cease but also the smooth operation of our daily lives.

“IDC estimates that by 2025, nearly 20% of the data in the global datasphere will be critical to our daily lives and nearly 10% of that will be hypercritical. It isn’t enough to get your house in order to comply with mandatory data breach reporting,” explains Yang.

“To handle the emergence of hypercritical data, a business must develop and deploy data capture, analytics, and infrastructure that delivers extremely high reliability, bandwidth, and availability.”

“This calls for more secure systems, new business practices and yes - new legal and legislative infrastructures around shifting and potentially debilitating liabilities,” says Yang.

Beachley cautions organisations against setting and forgetting solutions and policies for another few years.

“No single initiative will guarantee mobile security, and you will always be trying to hit a moving target,” adds Beachley.

“An effective enterprise mobile and data security strategy involves multiple approaches and continuous improvement.”

Related stories
Top stories
Story image
Thales on recruitment hunt for next disruptive innovations
"Recruiting new talent is part of Thales's belief in the power of innovation and technological progress to build a safer, greener and more inclusive world."
Story image
Palo Alto Networks' cloud security platform receives IRAP assessment
"We provide help protect all forms of compute, cloud native services and access to data within public and private sectors."
Story image
Jamf introduces new content filtering solution for education providers
Jamf has announced the launch of Jamf Safe Internet, a new offering that looks to deliver a safe online experience to students while offering better management options for admins.
Story image
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Story image
Supply chain
Supply chains continue to be disrupted, enterprises embrace circular economy
“Businesses urgently need to find a solution that can help them to manage this disruption, and transition to a circular economy."
Story image
Ericsson and Ciena, Telstra enhance service capacity for Telstra's optical network
Ericsson, Telstra, and Ciena have announced new enhancements to Telstra's Next Generation Optical Network, which will increase the service capacity of Telstra's optical network to 400 GE (Gigabit per Second Ethernet).
Story image
New VMware offerings improve cloud infrastructure management
VMware has unveiled VMware vSphere+ and VMware vSAN+ to help organisations bring benefits of the cloud to existing on-prem infrastructure.
Story image
State Library of Victoria
State Library of Victoria entrusts Oracle support and security to Rimini Street
“Our finance team are very happy with the support and security that Rimini Street provides, which keeps our assets and our customers secure."
Project management
Discover the 4 crucial factors for choosing the right job-costing solution. Is your team struggling to cost jobs and keep projects running on budget?
Link image
Supply chain
Discover the 4 critical priorities for wholesale distribution businesses in FY23. Are you worried about how supply chain issues may affect your business in 2023?
Link image
Story image
Honeywell named Frankston facility services provider
Honeywell has been named the joint facility services provider for Frankston Hospital’s AU$1.1 billion redevelopment.
Story image
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Four factors to consider when choosing the right job accounting solution
Progressive job-based businesses can achieve success by strengthening their ability to quantify every cost attributable to the delivery of an outcome for a customer.
Story image
How organisations can mitigate IoT and IIoT security risks
IoT and IIoT come with inherent risks because they are often deployed faster than they can be secured, putting organisations in danger of cyber threats. Here are tips on how to mitigate those risks.
Story image
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Story image
How the metaverse will change the future of the supply chain
The metaverse is set to significantly change the way we live and work, so what problems can it solve in supply chain management?
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Story image
Data Protection
Five signs your business is ready to move to the cloud
Many organisations are thinking about moving to the cloud. But what are the signs you are ready, and what are the reasons to move?
Story image
Remote Working
RDP attacks on the rise, Kaspersky experts offer advice
"Given that remote work is here to stay, we urge companies to seriously look into securing their remote and hybrid workforce to protect their data."
Story image
Businesses unprepared to defend against ransomware attacks
Ransomware attacks continue to impact organisations worldwide with high costs, but businesses are still largely unprepared.
Story image
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Evonik relies on Getac F110 tablet to control autonomous robot
The aim of the project is to evaluate the practicality of an automated robotic maintenance and inspection solution in the chemical industry.
Digital Transformation
Discover the 5 signs your business is ready for a cloud-based ERP. Is your business being left behind as more of your competitors switch to the cloud?
Link image
Story image
Ivanti puts spotlight on power of employee digital experiences
The report revealed that 49% of employees are frustrated by the tech and tools their organisation provides and 64% believe this impacts morale.
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
Multi Cloud
Cloud is a tool, not a destination
For many years, “cloud” has been thought of as a destination which has led to a misguided strategy that sees an enterprise trying to shift all its applications to a single cloud provider – regardless of the specific needs and nuances of each individual workload.
Story image
Macquarie Data Centres
Macquarie deal to pioneer CO2-cutting data centre tech in Australia
Macquarie Data Centres has signed a multi-year deal with ResetData, an Australian first provider using Submer data centre technology. 
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image
Story image
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
NEC expands Open RAN ecosystem with Aspire Tech acquisition
With its agreement to acquire Aspire Technology, NEC Corporation has further increased its capacity to deliver End-to-End Open RAN ecosystems.
Story image
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Intel Labs unveils integrated photonics research advancement
"This new research demonstrates that its possible to achieve well-matched output power with uniform and densely spaced wavelengths."
Story image
Delinea’s Joseph Carson recognised with OnCon Icon Award
Delinea chief security scientist and advisory CISO Joseph Carson has been recognised as a Top 50 Information Security Professional in the 2022 OnCon Icon Awards.
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
What brands can expect from Amazon Prime Day in Australia
Amazon Prime Day is the annual two-day shopping event, kicking off this year from July 12-13 and is the global online shopping platform's biggest sales event. 
Story image
Four things wholesale distributors need to consider for FY2023
In a post-pandemic world, there are many things for a distribution business to juggle. ERP solutions company Wiise narrows down what companies should focus on.
Story image
New study reveals 51% of employees using unauthorised apps
The research shows that 92% of employees and managers in large enterprises want full control over applications, but they don't have it.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why its time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Dicker Data
EXCLUSIVE: Why women in IT makes good business sense - Dicker Data
The Federal government wants to bolster female participation in the tech industry to at least 40% by 2030. Here's how one homegrown Australian company has already reached that goal.
Discover the 5 ways your ERP may be letting you down. Is your current system outdated, difficult to manage, and costing you a fortune?
Link image
Story image
Industry-first comprehensive risk-based API security enhances protection
Application Programming Interfaces (APIs) have become a crucial part of operating web and mobile application businesses and are causing significant economic growth in the digital sector.
Story image
Artificial Intelligence
Juniper study reveals top AI trends in APAC region
Juniper's research shows an increase in enterprise artificial intelligence adoption over the last 12 months is yielding tangible benefits to organisations.
Story image
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.