The last decade saw an explosion in the amount of data entrusted to third parties with a corresponding explosion in instances of cybercriminals targeting personal information for profit.
The COVID-19 crisis has seen cybercriminals tailoring their attacks to take advantage of the crisis. This has included a dramatic increase in cyberattacks directed at businesses across a range of industries.
The Australian Cyber Security Centre1 reports that cybercriminals are distributing COVID-19 related SMS and email campaigns. The Australian Competition and Consumer Commission has reportedly received reports of losses from COVID-19 scams in Australia in the vicinity of $130,000.2 Some commentators have reported a 37% increase in hacking and phishing attacks.3 The true extent of malicious cyber activity is likely to be much greater as not all cases are reported.
In the context of COVID-19, with more and more of us working from home, and the increasing use of technology as a means of fighting COVID-19, including the Australian Government’s COVIDSafe contact tracing app, understanding privacy is more important than ever.
• The necessity for remote working during the COVID-19 pandemic has meant that understanding privacy law obligations is more important than ever.
• There has been increased activity from cybercriminals looking to take advantage of and exploit privacy gaps in business identified during the crisis.
• With the foreseeable future likely focusing on a hybrid model of office work and work from home, businesses need to put in place appropriate cyber risk mitigation strategies to protect the personal information they hold.
Working from home
Entities that are covered by the Privacy Act 1988 (Cth) must remember that the Privacy Act and the Australian Privacy Principles (APPs) will apply when employees are working from home. See the following in particular (but not limited to only these):
• APP 11 (security of personal information) mandates that entities must take active measures to protect the personal information they hold from misuse, interference and loss, as well as unauthorised modification or disclosure.
• The Notifiable Data Breach4 scheme requires entities to notify affected individuals and the Office of the Australian Information Commissioner (OAIC) in the event of an eligible data breach.
Entities should consider how working from home impacts the way their employees handle personal information and conduct an assessment of potential privacy risks.
If privacy risks are identified, the business should put in place appropriate risk mitigation strategies.
Some factors that entities should consider in assessing risks arising from handling personal information where employees are working from home include:
• the level of IT security — Do employees have secure remote access? Does the business use multifactor authentication for remote access?
• What measures are in place to prevent other persons from accessing personal information that an employee may access remotely?
• plan for data breaches — Is there a response plan in place to deal with data breaches?
Here are some specific recommendations for reducing your risk.
The key to risk reduction is an entity understanding the nature and location of the data it holds that may be at risk. To do this, data should be classified by sensitivity. There is little point enhancing security measures on data that can be deemed public, however keeping secure sensitive and/or confidential data is essential. The first step to data security is to undertake a data classification exercise.
A data classification exercise examines the critical data groups within your organisation. Through workshops, innovative data discovery tools and a security evaluation platform, entities can identify critical data within their environment, where it is stored, and the controls and processes wrapped around it. The value of conducting a data classification exercise is that it will give an organisation an advantage in responding to any breaches, because it will be able to quickly identify the nature of a data breach and respond accordingly.
Once data has been classified and storage security identified, it is important to test what network users (and thus cybercriminals if they find a way in) may be able to find and copy. CTRL Group recommends scanning your assets for vulnerabilities and thoroughly testing any vulnerable systems. Many data breaches are a result of cybercriminals gaining access to the organisation’s environment and performing reconnaissance to find vulnerable systems. Regular external and internal vulnerability and penetration testings, combined with swift remediation of any issues, are key defensive techniques to keep sensitive data secure.
Cybersecurity strategy and incident response
Once data classification exercises and system testings are completed, organisations can identify their vulnerabilities and build and modify their cybersecurity strategy with a focus on data privacy and information security. The high percentage of reported breaches caused by human error underscores the need to improve privacy and security awareness of all staff. This can be achieved through an interactive program of awareness training.
Undertaking the measures set out above and having a robust cybersecurity strategy will improve your organisation’s ability to protect the privacy of the data it holds. However, there will always be risk of a data breach due to unforeseen circumstances. Given this, organisations should be prepared to respond to a data breach by response planning and scenario testing. Incident simulation exercises also amplify a culture of “privacy and security first”, which is crucial as pools of sensitive data continue to grow. Handling a data breach well will reduce the potential negative impact to the organisation including interest from regulators and damage to brand and reputation.
IN THE CLEAR: There are no ‘systemic’ failures to address, special commissioner Bret Walker has found.
The price we pay for the martyrdom of Peter Ridd - Crikey