BLUF
Australian companies are banding together to share information on cybercrime with other companies and governments across the world.Summary
Criminal hackers are getting more and more sophisticated in the way they attack Australian businesses. Many cybercriminals set up as fake companies with media releases, accountants etc. Porter notes that 5G networks benefit companies as they can quickly share huge amounts of data, however, 5G also benefits cyber criminals who can very quickly download huge amounts of hacked data. Companies are now banding together to share information with companies and governments in Australia and across the world—using open-source but secure methods. Note some of the methods cyber criminals use:
-
Asking for crypto—bitcoin— currency ransoms.
-
Placing sleeper malware inside company networks.
-
Using asymmetric warfare
-
Using companies own cyber tools to hack the company.
The basics of good cyber hygiene are: -
-
Study your logs
-
Patch operating systems on a regular basis.
-
Report anything unusual
-
Use multi-factor authentication (MFA)
How do you think the ADF can better protect itself from cyberattack?
References
- Dec 2020, ABC News, Australian Signals Directorate boss Rachel Noble says not all Australians are the good guys, defends spying
- Dec 2020 Infosecurity Magazine The Cyber Sleeper Cells Lying in Wait for the Return to the Office
- Dec 2020 The Atlantic Everybody Spies in Cyberspace. The U.S. Must Plan Accordingly.
- Dec 2020 The Economist Hackers have vaulted into the heart of America’s government
- Jan 2021 Cyber Defense Magazine Cybersecurity: Innovation Needed
- Jan 2021 Cyber Defense Magazine 3 Email Hacking Techniques to Watch In 2021
- Jan 2021 ABC Are Australians at a 'turning point' on cybersecurity or still unprepared?