Story image

Aussie firms slow to adopt 'breakthrough innovation' for cyber defence

06 Feb 2018

Australian businesses need to be on the lookout for malicious insiders, phishing and social engineering or face price tags of as much as $137,000 according to statistics from The Ponemon Institute and Accenture.

As part of the 2017 Cost of Cybercrime study, the two firms conducted a global survey of 2182 people, of which 169 were from Australia. Other countries included Japan, Germany, the UK, France, Italy and the United States.

Information loss and business disruption were also rated by Australians as being the most costly effects of an attack.

While cybercrime against Australian businesses rose 25% last year, the amount spent on cyber defences rose the same amount.

The global average for the number of security breaches in one year topped 130, however Australian businesses experienced an average of 53.

Businesses are sinking most of their defence costs into detection, which accounts for a third of security costs on average.

While Australians are slow to use technologies such as AI (24%) and advanced analytics (32%), the survey posits that those technologies are able to produce higher cost savings compared to other security and defence costs.

“With cyber incidents on the rise, and ever evolving in terms of scale and sophistication, Australian businesses should ensure they are appropriately prepared. It is encouraging to see strong investment in this field, however it is clear that businesses should consider the targeted deployment of advanced analytics and artificial intelligence in their cyber defences,” comments Accenture Asia Pacific managing director Josh Kennedy-White.

“These advanced technologies represent significant return on investment.”

Most Australian businesses are instead focusing on security intelligence systems (64%) and advanced identity and access governance (60%).

Steps to improve effectiveness of cybersecurity efforts

By taking the following three steps, Australian organisations can further improve the effectiveness of their cybersecurity efforts to fend off and reduce the impact of cyber-crime:

  • Build cybersecurity on a strong foundation: invest in the ‘brilliant basics’ such as security intelligence and advanced access management and yet recognise the need to innovate to stay ahead of hackers.
  • Undertake extreme pressure testing: Organisations should not rely on compliance alone to enhance their security profile but undertake extreme pressure testing to identify vulnerabilities more rigorously than even the most highly motivated attacker. 
  • Invest in breakthrough innovation: Balance spend on new technologies, specifically analytics and artificial intelligence, to enhance program effectiveness and scale value.
SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.