itb-nz logo
Story image

A/NZ organisations slack in Notifiable Data Breach scheme

13 Mar 2019

Following the introduction of the Notifiable Data Breach Scheme (NDB) in February 2018, a survey of ANZ businesses by CompTIA has revealed some concerning findings.

Despite the enforcement of NDB, 23 percent of organisations haven’t made any change to exsiting security policies to comply, while another 35 percent of respondents aren’t sure if their organisation has made changes.

According to the Office of the Australian Information Commissioner (OAIC), more than one third of companies that had data breaches in the past quarter passed on private customer information because of simple human mistakes.

“With human error accounting for a large proportion of breaches, it is concerning that some people are not even aware of whether their company has changed its policy to comply with the NDB,” says CompTIA ANZ Channel Community executive council member and Datto APAC director of sales James Bergi.

“Education and awareness need to play a critical role in protecting customers and mitigating risk.”

When it comes to incident response, 37 per cent of respondents said their organisation did not have formal policies and procedures, but relied on unwritten rules that were typically followed. A further 14 per cent did not have policies and procedures addressing security incident responses.

In the July-September 2018 quarter, 245 breach notifications were reported to the OAIC.

“These breaches are happening, and will continue to do so, which means organisations need to take the threat seriously and make sure they are compliant with the legislation,” says Bergi.

According to the respondents with formal response plans, these included roles and responsibilities for addressing the incident (90 percent), complete backup/recovery plan including prioritisation of systems (80 percent), identification of affected systems (75 percent), identification of attack (74 percent), education on how the incident occurred and future mitigation strategies (73 percent), and a public communications plan if customer/partner data was affected (55 percent).

“Most businesses think they are in control of security. However, the reality is quite different for many. It can be easy to forget how dynamic the danger is, and cybercriminals rely on this complacency,” Bergi says.

“A security risk assessment is an effective way for businesses to assess their current posture. Businesses should treat information security risk assessments as an ongoing process of discovering, correcting, and preventing security problems.”

Story image
Video: 10 Minute IT Jams - Who is Snowflake?
We speak to Snowflake's Asia Pacific vice president of sales, Peter O'Connor.More
Story image
Rising threat of data breaches among enterprises drives growth in network security revenue
"Key factors leading to the growth of network security market revenue in the Asia Pacific region includes instances of ransomware attacks, targeted attacks and phishing."More
Story image
Webinar: TLC for Kids on their usage of Nintex Drawloop DocGen
The charity is using the software to free up resources and enable its team to focus on its mission — which, simply put, is to put smiles back on sick kids’ faces. It does this through its TLC Ambulance, Rapid TLC, and distraction box programs, and its services are used over a million times each year across Australia.More
Story image
MYOB supports New Zealand's construction industry with latest release
MYOB has launched MYOB Advanced Construction Edition, a new software to help contractors and builders manage complex projects and budgets, with real-time visibility.More
Story image
Samsung extends partnership with Google, joins Android Enterprise Recommended programme
Samsung’s participation in the programme gives customers added assurance that its participating products meet the hardware and software requirements set out by Google for the enterprise.More
Story image
Data mastery the difference between success and failure, report finds
"A mindset change is needed - leaders must accept and embrace an agile culture of experimentation if they are to achieve data activation.”More