Skip to navigationSkip to contentSkip to footerHelp using this website - Accessibility statement
Advertisement

How to avoid joining Optus and Medibank on the cybersecurity walk of shame

John DavidsonColumnist

Subscribe to gift this article

Gift 5 articles to anyone you choose each month when you subscribe.

Subscribe now

Already a subscriber?

Another day, another revelation that Australian companies are chronically underinvesting in cybersecurity.

Today, it’s Medibank revealing that the damage wrought by its recent cyberattack is worse than it had previously stated, which in turn was far worse than Medibank’s prior update, which in turn was dramatically worse than Medibank’s first revelation on October 13 that it had suffered a cyberattack but that there was “no evidence that any sensitive data, including customer data, has been accessed”.

Who knows what tomorrow will bring? Does Medibank even have any data left that it’s yet to realise was exposed in the data breach?

Indeed, who knows what the next seven minutes will bring? That’s how often the Australian Cyber Security Centre (ACSC) receives a report of another cybercrime attack nowadays, now that (as the ACSC says) Russian crime gangs appear to be working with the Russian state to help fund the war in Ukraine.

What we do know is that the chronic underinvestment in cybersecurity has become an acute threat to Australian businesses and institutions.

But it’s not a new threat. Boardrooms around the country might only now be waking up to the importance of cybersecurity, but it’s a field that’s been around a long time, and much is known about what the threats are, and what to do to defend against them, and what to do when your defences fail.

What are the major cybersecurity threats?

Alastair MacGibbon, the former national cyber security adviser and head of the ACSC who is now the chief strategy officer at CyberCX, breaks the cyber threats into three, broad categories, each one every bit as scary as the others: availability, confidentiality, and integrity.

Availability threats include ransomware and Distributed Denial of Service (DDoS) attacks. These are threats that cripple your technology infrastructure and grind your business to a halt.

Advertisement

And if your business is, say, running a hospital or the power grid, availability threats are the “nightmare scenario”, says MacGibbon, though it’s not a nightmare you get to wake from till the other two threats have also passed.

Confidentiality threats, meanwhile, can be characterised in two words: Optus, and Medibank. These involve some sort of data loss, either through exfiltration of data (which is what both Optus and Medibank have reported, and reported, and reported) or the physical loss or theft of data storage media.

Lately, says MacGibbon, cybercriminals have been combining the first two threats, exfiltrating data before they encrypt the victim’s copy of that data in a ransomware attack.

This is what appears to have happened in the Medibank breach. Medibank blocked the availability threat so the attackers fell back to the confidentiality threat instead, letting Medibank know they had downloaded the confidential medical records of Medibank customers.

All of that is bad enough, but add the integrity threat into the mix, and this is where whole systems can come unstuck.

Integrity threats are where some or all of the data held by a company or institution gets changed in ways that are hard to detect or remediate.

They range from disgruntled employees getting in and changing their leave balances, all the way up to nation-state actors rewriting the records of a major financial institution in an effort to cripple the entire economy.

Just as the first two threats are now often combined, it’s possible that the third threat could be added to the first two in a devastating attack: cybercriminals download your data, change all your copies of that data, and then encrypt all your copies, so that even when or if you recover from the availability and confidentiality attacks, you still don’t know what data you can trust.

MacGibbon says this triple threat isn’t happening yet, but when he contemplates the possibility, he does use the word “nightmare” a lot.

How can you stop a cyberattack?

Advertisement

We’ve asked a half dozen experts about what can be done to prevent a successful cyberattack, and they all said the same thing: you can’t.

But you can reduce the risk of an attack down to acceptable levels, and all the experts we’ve spoken to say this starts with one thing: data hygiene.

Inventory the data you have, including the “shadow IT” data being kept in an old Windows Server under the CFO’s desk. Destroy the data you don’t absolutely need for the operation of your business, and stop collecting it.

And then, says Kris Lovejoy, head of the global security and resilience practice at the world’s largest IT infrastructure services provider, Kyndryl, you triage what remains.

Calculate which system will cost you the most if it succumbs to a threat, including the cost of regulatory fines, reputational damage and customer loss, as well as the immediate cost of the business going offline, in that calculation, and start there.

Build up robust cyber defences around your most important assets first, and develop practices that routinely look for holes in those defences just in case someone in the company makes an error.

And someone will make an error, says Lovejoy. “In 99.9 per cent of the incidents that I’ve ever responded to, human stupidity has been a factor,” she says.

And if dealing with the big risks first means that the lowly marketing department’s systems are left relatively undefended until you can hire enough cybersecurity staff, then so be it. This is triage. Not everyone gets to live.

Or, as MacGibbon puts it, “There will always be blood loss. The only question is, how much blood?”

Advertisement

How can companies best defend against a cyberattack?

It turns out that putting up defences is only the first step in a cybersecurity three-step.

The dance goes like this: defend, monitor, react.

(In an era when cybersecurity experts are hard to find – Australia is expected to have a shortfall of roughly 30,000 skilled professionals in the next four years – for many companies this will be a partner dance, done together with a cybersecurity outsourcer which may, for instance, do the monitoring for them, having advised them which monitoring software to install at which points in the IT system.)

And the thing is, it’s not an easy dance to get right.

Monitoring, for instance, may involve keeping a detailed log of every query made against a corporate database, so that if someone does get through your defences, at least you know the “radius of the bomb blast”, as MacGibbon puts it.

(And knowing the radius of the damage is important, as we’ve seen in the Optus and Medibank cases because it helps you communicate with stakeholders, minimising the reputational damage caused by the breach. It does you no good at all to tell your customers that their data was safe, only to turn around three weeks later and tell them, well, actually, your data is all over the dark web, and you should have cancelled your credit card three weeks ago.)

But now you not only have a database to defend, you also have a log to defend because it, too, will almost inevitably contain sensitive data. What do you do? Keep a log of what data has been accessed in the log? Now you have another log to defend, before you know it you’ll have logs upon logs upon logs, spiralling away into infinity, and that’s just one example of the tricky interplay between the steps in this dance.

But dance it you must. Put up walls around your IT systems. Monitor those walls for weaknesses, and monitor inside the walls for signs of infiltration. Put plans in place to fix weaknesses when they are found, and put plans in place to shut off an attack when it’s discovered.

Advertisement

How much does it cost to prevent a cyberattack?

All this costs money, of course, and for many businesses it will involve spending more money than they’re already spending, for the simple reason that many businesses are only investing in step one (defending) and they’re not investing enough (or anything at all) in the ongoing costs of monitoring their systems (step two), and of having on call internal or outsourced experts who can step in when a breach has been detected (step three).

We’ve asked quite a few experts how much of an IT budget should be spent on cybersecurity, and they’ve all equivocated. How sensitive is the data? How many legacy systems are there in the IT system, and how have they been modernised? How long is a piece of string?

But there is one rule of thumb everyone agrees on. When you’re calculating how much it will cost you to put in place a proper cybersecurity plan, first ask yourself this question: how much will it cost you to not put in place a proper plan?

Cybersecurity is an existential issue now. As the privacy expert Anna Johnston told us, if you can’t afford to defend your data against cyber threats, then you probably shouldn’t be in business in the first place.

What you need to know about cyberattacks

Subscribe to gift this article

Gift 5 articles to anyone you choose each month when you subscribe.

Subscribe now

Already a subscriber?

Read More

John Davidson
John DavidsonColumnistJohn Davidson is an award-winning columnist, reviewer, and senior writer based in Sydney and in the Digital Life Laboratories, from where he writes about personal technology. Connect with John on Twitter. Email John at jdavidson@afr.com

Latest In Technology

Fetching latest articles