Recovering data from tapes isn't trivial but if it's not encrypted then I assure you any junior hacker could have posted the data up on the dark web and asked for help where the resources would be available. As for notifiable data breach, I think it certainly should be now under the new legislation as unless it was encrypted then there is a risk that harm could be caused to someone given the amount of data and type of data makes it worth spending effort on recovering off the lost tapes. Of course the legislation is very open ended and open to wide interpretation here so without actual prosecuted breaches and fines we will never know how the courts take these breaches of the privacy act
27 posts • joined 27 Nov 2012
The Intel security folks must be glad to be at arms length and McAfee again, all this PR spin no substance makes a mockery of the companies security posture. Someone other than a hacker somewhere must have been able to see the potential for side channel attacks and remediate them in the core design surely?
Independent Audit required here
Clearly they have been reading "yes minister" and are not going to comply merely stall. The ANAO should Audit them and if they fail to meet agreed implementation timelines then Finance need to withhold funding and restrict them from accessing any other agencies data until they can become compliant. Nothing in the top 4 is particularly hard to achieve if adequate resources are put into it and procedures are amended to support their adoption not block them. That said this is a big agency merged and mish mash of systems all in need of a savage revision back to the basics of what they need to get the job done.
"Think of the children" and "terrorists" always a good reason to spy on your own citizens and once you have the data well it can only get abused for more and more "good reasons". Of course if you arent allowed to spy on your own citizens then you can always ask your "good friends" to do it for you too.
Drones will need to be registered as their use and popularity increase and I think much like motorised bicycles you pick a power output like 250Watts or total vehicle weight or similar to determine when a Drone starts to represent a vehicle that needs to be registered, insured and requires a licenced operator.
You have to give them points fro prompt disclosure as Australia still lacks mandatory disclosure laws to back the privacy act. Still doubtful that all is known early in the breach detection and if more was know The PR spin merchants now to release the bad bits later say over a long weekend or when Russia bombs the Syrian free army so its back page news. Lets hope free id theft insurance was offered as there would be enough info to get another credit card lost here.
This is a bit misleading so how many breaches are caused by exploits of unpatched known vulnerabilities? It cuts both ways. Patching is the simplest and most effective way of mitigating being breached or compromised and it can be easily automated and managed for a majority of systems for lower cost than anti virus which isn't working anyway. Don't believe me than ask the Australian Signals Directorate. Their 'Top 4 Mitigation Strategies' which are:
3.Patch Operating System;
4.Minimise Administrative Privileges.
Mandatory Breach Reporting Laws need enacting in Australia
Data Breach's like this where nothing is done to assist or help the victims really do go to show you can't trust business to protect its customers data and government need to step in with simple clear legislation requiring prompt disclosure to allow people to take protective action and or $M fines for multiple breach's or late or no disclosure. This will force organisations to essentially do the right thing for their own financial benefit as they clearly won't do it to protect their customers.
Application control works and no it's not hard to decide what apps you want who to run on what. Many groups are very easy to whitelist like standard desktops domain controllers and web servers and database servers with a few exceptions and the exception shouldn't make the rule. Patching whitelisted apps though gets harder and patch management itself while easy is fraught with conflicting goals and timelines from app managers ops and sec-ops people. Still plenty of good sw to automate the Top 4 and make it achievable at a cost of course.