{"id":28258,"date":"2020-10-08T20:08:52","date_gmt":"2020-10-08T09:08:52","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=28258"},"modified":"2020-10-08T22:40:57","modified_gmt":"2020-10-08T11:40:57","slug":"australia-response-to-the-cybersecurity-crisis","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/australia-response-to-the-cybersecurity-crisis\/28258\/","title":{"rendered":"What Industrial Cybersecurity Looks Like Through COVID-19 in Australia"},"content":{"rendered":"<p>With a shift in industry dynamics due to the onset of the pandemic, the cybersecurity industry had to react with a promptness like no other. Adjusting to the \u2018new normal\u2019 wasn\u2019t easy and knowing that a multitude of industries were relying on cybersecurity technology and their service providers to follow through immediately and efficiently, called for an internal structural shift. Evolving into a majorly remote workforce and promoting a seamless transition was vital, as each employee was uprooted from a daily routine into an unstable environment. Beyond an open mind to change, the cybersecurity industry needed brand-new solutions to combat threats that appeared to prey on the chaos that was created.<\/p>\n<p>Over 45 pandemic-themed cybercrime and cybersecurity reports were reported to the Australian Cyber Security Centre (ACSC), and over a 100 were reported to Scamwatch within a span of 15 days in March 2020. The national and state government sectors were the hardest hit, followed closely by the education &amp; research sector, health sector, banking sector and retail sector. Remote workers became the prime focus of several financially motivated crimes while sophisticated attacks were planned to target national databases to debilitate Australia\u2019s national security and economy.<\/p>\n<p>E-commerce and businesses were next in line to come under fire, due to the rise in online shopping \u2014 the retail sector (especially online sales for brick and mortar stores) saw an increase in sales shoot up by a <a href=\"https:\/\/www.smh.com.au\/business\/companies\/new-normal-traditional-retailers-prepare-to-downsize-amid-massive-online-shopping-shift-20200403-p54gs7.html\" target=\"_blank\" rel=\"noopener nofollow\">whopping 100%<\/a> since March. The pandemic has pushed industries to rapidly evolve and sales, marketing and management has seen <a href=\"https:\/\/hub.jhu.edu\/2020\/07\/27\/digital-technology-in-business-joel-le-bon\/\" target=\"_blank\" rel=\"noopener nofollow\">more change<\/a> in the last five months than it has in the last five years. For consumers, this meant convenience like never before. But for industries, this often meant building a whole new structure to enable a digital experience for their consumers, a feat that would often require a lot more approvals or official sign offs prior to a remote workforce. This sudden shift has resulted in massive security loopholes, especially in the case of SMEs who believe they aren\u2019t \u2018big enough\u2019 to garner attention from hackers. Yet, in 2019 itself, 62% of small businesses reported they had previously been a victim of a cybersecurity incident according to the ACSC.<\/p>\n<p>This new level of reliance on transient digital solutions catered towards us has also led to a massive volume of new data being generated and exchanged. With online banking and flexible loans, online ordering and delivering of groceries, remote learning and online classrooms, medical advice over a phone call, and manufacturing supply chains becoming increasingly digitised \u2014 there\u2019s a data boom, if anything. The rate at which the digital lifestyle is becoming the norm is incredible but like all good things, it comes at a price.<\/p>\n<h2><strong>Australia\u2019s response to the cybersecurity crisis in COVID-19<\/strong><\/h2>\n<p><a href=\"https:\/\/www.mckinsey.com\/business-functions\/risk\/our-insights\/covid-19-implications-for-business\" target=\"_blank\" rel=\"noopener nofollow\">McKinsey<\/a> reports that companies relying or managing supply chains are looking at losing half a year\u2019s worth of profits, over a decade. Beyond COVID-19, cyberattacks on the hastily put-together remote workforce has caused a fair amount of disruptions too, resulting in even larger economic losses to companies.<\/p>\n<p>In an effort to take industrial cybersecurity more seriously for both, national security as well as an Australian individual, the government has worked towards a new <a href=\"https:\/\/www.homeaffairs.gov.au\/cyber-security-subsite\/files\/cyber-security-strategy-2020.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Cyber Security Strategy<\/a> for 2020. A quick overview reveals the following key takeaways:<\/p>\n<ul>\n<li><strong>Building towards stronger digital ecosystems (Government-focused)<\/strong><\/li>\n<\/ul>\n<p>A more secure world for Australians stems from Government initiatives towards the same. Protecting Australian government data is high on the list, along with protecting critical infrastructure and strengthening cybersecurity partnerships. Initiatives also largely target corporations and SMEs with funds being put in place for both to support them, if they lack the resources to implement secure systems and practices themselves. Based on the industry and business conducted, a certain standard of cybersecurity will have to be met.<\/p>\n<ul>\n<li><strong>In-house security and training (Business-focused)<\/strong><\/li>\n<\/ul>\n<p>As mentioned earlier, new security obligations will be put in place for designated organisations based on the data procured within the company. Beyond large-scale security initiatives, the government is keen on growing a skilled workforce by supporting SMEs to train staff as well as put strong security structures in place. Businesses are expected to secure their products and services and protect their consumer\u2019s data from online threats.<\/p>\n<ul>\n<li><strong>Building a cybersecurity culture (Community-focused)<\/strong><\/li>\n<\/ul>\n<p>Protecting Australia from cybercrime starts with each individual growing aware of the problems on hand. Access and guidance towards cyber security information and helping consumers understand the basics of cybersecurity etiquette is possibly the best step Australia could take towards shutting down cyber scams. Some basic etiquette includes treating suspicious messages with caution (don\u2019t click on random links!), avoiding financial or personal transactions while on public or free Wi-Fi, using strong passwords, and reporting new scams where possible. As a community, we need to start practicing secure online behaviour; especially if we\u2019re experiencing the largest digital transition yet.<\/p>\n<p>Overall, the government\u2019s three-pronged strategy appears to be a straightforward and effective answer to avoid potential industrial cybersecurity disasters \u2014 if companies are willing to adhere to the guidelines. For a more detailed read or further information, Australia\u2019s Cyber Security Strategy 2020 is available <a href=\"https:\/\/www.homeaffairs.gov.au\/cyber-security-subsite\/files\/cyber-security-strategy-2020.pdf\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>As a business owner or employee, be open to having a conversation about cybersecurity and push for more secure systems to be put in place. Empower your workforce with basic cyber safety practices, upgrade your security skills and stay aware of the latest scams within your industry. Awareness is often key to prevention \u2014 if you\u2019re suspicious of a link via email or text, always go to the official source manually. If it\u2019s a company email, talk to your superior, if it\u2019s your bank, visit the official website or give them a phone call. Always remember to report any scams as well, it helps us win this fight together, one small step at a time.<\/p>\n<p>At Kaspersky, we understand that within the industrial sector, every minute matters, there\u2019s very little room (if at all) for error. Operations are an integral aspect of each industrial organisation. Keeping the above in mind, the <a href=\"https:\/\/www.kaspersky.com.au\/enterprise-security\/industrial?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Industrial CyberSecurity<\/a> technology we provide, isn\u2019t merely IT that helps protect against threats \u2014 a key component of it is operational technology (OT). Working with the right security service provider is crucial for the industrial sector, when business continuity is what your business strives for. With <a href=\"https:\/\/www.kaspersky.com.au\/enterprise-security\/industrial?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Industrial CyberSecurity<\/a>, operational management is not just easier, it\u2019s a whole lot more efficient. Catching the slightest irregularity in the system before it turns into a motion-stopping issue is what we do best; <a href=\"https:\/\/media.kaspersky.com\/en\/business-security\/enterprise\/kaspersky-case-study-agc-germany-english.pdf\" target=\"_blank\" rel=\"noopener nofollow\">in the past<\/a> <a href=\"https:\/\/www.kaspersky.com.au\/enterprise-security\/industrial?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Industrial CyberSecurity<\/a> has been the optimum choice to help prevent cyberattacks upon internal staff computers that could have potentially affected a whole production system.<\/p>\n<p>It\u2019s about more than just a desktop device, it\u2019s about securing entire lines of systems like production equipment, critical infrastructure, and industrial equipment. It\u2019s about doing a clean sweep of every device; portable or connected, to secure your system and handle risk management. We further supplement our technologies with designs specifically for industrial environments such as integrity checks and semantic monitoring of process control commands; adaptable to each system <a href=\"https:\/\/www.kaspersky.com.au\/enterprise-security\/industrial?icid=au_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Industrial CyberSecurity<\/a> is required to work with. It also features a special monitoring mode developed to detect cyberattacks, employees\u2019 operational errors and anomalies within industrial networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digital lifestyle is incredibly useful for customers. But for big industries, it now means building a whole new structure to protect tons of data and operational security for better cyber attack detection.<\/p>\n","protected":false},"author":2616,"featured_media":28265,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2993],"tags":[282,1713,3266],"class_list":{"0":"post-28258","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-cybersecurity","10":"tag-ics","11":"tag-remote-working"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/australia-response-to-the-cybersecurity-crisis\/28258\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ics\/","name":"ICS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/2616"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=28258"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28258\/revisions"}],"predecessor-version":[{"id":28274,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/28258\/revisions\/28274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/28265"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=28258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=28258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=28258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}