In March this year, a cyber-attack disrupted live broadcasts on one of Australia’s national television networks.
In April, an attack forced the operator of four hospitals in Melbourne to postpone some elective surgeries, and soon after, several Queensland health service providers had to process patients manually when another attack brought down IT systems.
Then, in May, a cyber-attack forced the shutdown of a pipeline that carries 45 per cent of the US East Coast’s supply of diesel, petrol, and jet fuel.
Even in the last few weeks, we have seen attacks delivered through text messages with a link to a voicemail, camouflaged as a means to get victims to download a malicious app. First reported to the Australian Cyber Security Centre on August 4, the ‘Flubot’ malware operates under the disguise of targeting those waiting for COVID tests and vaccination appointments.
Suddenly, cyber-attacks were having major consequences for well-defended organisations and causing significant disruption to people’s lives.
And there is no sign that cybercriminals will stop their onslaught any time soon. The simple truth for most business owners is that managing cyber security is not their organisation’s core business focus. But for cybercriminals, finding holes in their defence is their only business.
Rapid response
The IT industry evolves quickly, and so too do the techniques used by cybercriminals.
And as we’re all asking questions regarding risk, they need to be asked and answered to the satisfaction of the organisation’s most senior leaders.
Right now, this question is especially relevant for leaders of organisations that will fall under the proposed revisions to the Australian Security of Critical Infrastructure (SOCI) Act 2018, which significantly expands the definition of those industries considered critical and introduces new cyber defence obligations for them.
Leaders should pay particular heed to the introduction of a Positive Security Obligation (PSO) relating to how they manage the security and resilience of critical infrastructure assets, and to the need to take an all-hazards approach to identifying and mitigating material risks.
That means understanding the risks involved in their infrastructure and the investments they have made to protect it, including those risks endemic to the providers they work with.
With this in mind, the Epicor Industry Insights Report 2021 found that 86 per cent of respondents whose organisations were mostly on the cloud said cloud solutions helped them adhere to government data regulations.
Cloud security landscape
Business leaders have no shortage of options for how they can spend their cyber defence budgets. Increasingly, they are making a choice that boosts their defences and delivers new business capabilities.
According to our Industry Insights Report 2021, of the 1250 industry decision-makers surveyed, 94 per cent declared an interest in cloud-based solutions over the next twelve months.
This was a massive change from the 25 per cent who stated cloud was a strategic priority a year earlier and has been driven by the need for enhanced agility brought on by the shifting landscape and further fuelled by the growing cyber threat.
According to the report, decision makers regarded the cloud highly for the attributes of adaptability, futureproofing, partnership, and security.
This last point was reinforced by the 90 per cent of respondents who believed data was safer in cloud-based solutions – a critical consideration for the growing number of organisations investing in Big Data.
Cyber security steps
The single biggest threat to an organisation’s IT security is the growing number of phishing attacks experienced globally and locally. The level of sophistication administered through these attacks are getting more subtle and clever; even the most security-aware organisation can fall victim. Alongside training and upskilling the entire workforce on how best to identify a threat, having strong cloud-based systems in place can dwarf the current security systems of most legacy on premise security systems.
Cloud-based security provides superior protection for cyber security and frees up time for in-house IT experts to focus on business processes and efficiencies to enable the organisation to grow revenue and improve margins.
To best deliver your organisation’s business objectives, first review your approach to risk management and then work through the following processes:
- Risk management: Take a risk-based approach to securing your data and systems
- Engagement and training: Collaboratively build security that works for people in your organisation
- Asset management: Know what data and systems you have and what business needs they support
- Architecture and configuration: Design, build, maintain and manage systems securely
- Vulnerability management: Keep your systems protected throughout their lifecycle
- Identify and access management: Control who and what can access your systems and data
- Data security: Protect data where it is vulnerable
- Logging and monitoring: Design your systems to be able to detect and investigate incidents
- Incident management: Plan your response to a cyber incident in advance
- Supply chain security: Collaborate with your suppliers and partners
Cloud security advantages
While the cloud is not a panacea for cyber woes, it offers a range of advantages that weigh heavily in its favour.
For starters, the money that hyper-scale cloud service providers devote to securing their systems far outstrips the spending of all but the largest organisations and government agencies.
Australian government security and policing agencies now acknowledge the security of the cloud, with many services assessed against the Information Security Registered Assessors Program (IRAP) as suitable for hosting data classified as PROTECTED.
Most cloud services in Australia have also solved data residency concerns by opening onshore data centres, allowing them to provide certainty that data will never leave the country.
Another advantage of cloud-hosted software is that when users are dealing directly with the software’s provider, they can be assured the version they are using is the most up-to-date available – and hence fully patched and secured.
As the report shows, leaders who have taken their businesses to the cloud are future-proofing their business in two ways: bolstering its defences from short term cyber threats and giving it long-term flexibility.
Read more: Cyber security threats are increasing, what can you do?
Keep up to date with our stories on LinkedIn, Twitter, Facebook and Instagram.