Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19's budget impacts. But until we strengthen our cyber defences, we're all at risk.
Australia is coming under sustained cyber attack by a 'state-based' actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks.
Office of the Iranian Supreme Leader via AP
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised.
Shutterstock.com
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
Power grids are high priority targets during conflict.
Shutterstock
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
WhatsApp says more than 1 billion use the app.
Shutterstock/XanderS
Scott Morrison has bragged about 'stopping the boats', but his government has failed to do anything meaningful to bolster cyber security and stop the malware.
Your voting preference might be subtly influenced by social media exposure in the lead up to an election.
Ellen Smith/AAP
If another country wants to weaponise data hacked through Australia's parliament, we'll likely see them try to inflame religious and ethnic differences, and drive votes to minor parties.
States that come under cyber attack from state actors have few good legal remedies available to them.
Shutterstock
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here's what could happen if you do – and how you can minimise your risk.
The German government held a press conference in Berlin on January 4 about a hack which targeted German politicians.
AAP/Clemens Bilan
German MPs were outraged they weren't notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Shutterstock
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Circuit Board.
Photo by Alexandre Debiève on Unsplash