fbpx

Techshop Wrapup: Navigating a Cyber Breach

At our May Techshop, cybersecurity experts Rob Dawson and Marissa Dimarco delivered crucial insights on managing cyber breaches and understanding the legal landscape surrounding data protection.

 

With cyber threats evolving rapidly and Australian regulations becoming increasingly stringent, their timely presentation couldn’t be more relevant for businesses navigating multiple digital platforms.

Understanding the Cyber Threat Landscape

The case study presented during the Techshop painted a sobering picture: a small financial services firm with just 20 employees fell victim to a devastating ransomware attack that could have been prevented with proper security measures. The breach occurred through an open Remote Desktop Server port, exploited an inactive employee account, and resulted in 600GB of data being encrypted, whilst 20GB was stolen. This all happened silently outside business hours.

 

This real-world example from 2025 demonstrates how cybercriminals exploit basic security oversights that many businesses unknowingly maintain.

Critical Security Vulnerabilities and Their Solutions

Protect Internet-Facing Assets

The breach analysis revealed several critical vulnerabilities that businesses must address immediately:

 

Remote Desktop Protocol (RDP) Exposure: Open RDP ports remain prime targets for brute force attacks. Businesses should immediately block these ports and implement VPN endpoints requiring authentication before accessing internal resources. Configure account lockout policies after maximum password attempts to prevent automated attacks.

 

Account Management and Access Control

Inactive Account Risks: The compromised account belonged to a former employee but remained active. This is a common oversight with severe consequences. Implement automated processes for account deactivation and conduct regular audits of user accounts. Remember, each inactive account unnecessarily increases your attack surface.

Password Complexity and MFA: Low-complexity passwords without multi-factor authentication (MFA) are essentially welcome mats for cybercriminals. Enforce strong password policies requiring complexity, encourage passphrase usage, and mandate MFA across all user accounts. As the presentation emphasised, MFA adds that crucial extra security layer beyond passwords alone.

 

System Updates and Monitoring

Operating System Vulnerabilities: The case study revealed Windows 8 systems on the network: outdated operating systems with known vulnerabilities. With Windows 10 reaching end-of-life in October 2025, businesses must urgently upgrade to supported systems like Windows 11 or implement additional security measures for legacy systems.

Security Monitoring: The breach went undetected because it occurred outside business hours with no monitoring systems in place. Implement:

  • Business-grade antivirus solutions (like Sophos)
  • Firewall rules for both inbound and outbound traffic
  • Logon hour restrictions for standard users
  • Regular compliance reporting to identify security gaps

The Legal Landscape: Privacy Act Changes and Cyber Security Act 2024

Marissa Dimarco’s presentation highlighted significant legal developments affecting Australian businesses:

Privacy Act Amendments (November 2024)

The Privacy and Other Legislation Amendment Bill 2024 introduced substantial reforms:

  • Serious privacy breaches now face penalties up to $50 million or 30% of adjusted turnover for corporations
  • New tort action for serious invasions of privacy
  • Criminal offence for doxxing
  • Enhanced OAIC powers, including infringement and compliance notices
  • Children’s Online Privacy Code requirements
  • Mandatory technical and organisational measures for data protection
Cyber Security Act 2024

Commencing 29 November 2024, this legislation introduces:

  • Mandatory ransomware payment reporting (effective 30 May 2025) for businesses with turnover above $3 million
  • Cyber Incident Review Board for post-incident analysis
  • Civil penalties for non-compliance with reporting obligations

Learning from Enforcement Actions

ASIC v FIIG Securities Limited (March 2025)

This landmark case illustrates the regulatory authorities’ growing resolve in addressing cybersecurity failures. FIIG faced enforcement action for:

  • Lacking a cyber incident response plan
  • Poor privileged access management
  • Inadequate security event monitoring
  • Absence of mandatory MFA
  • No ongoing cyber security training

 

The key takeaway: Cybersecurity measures are integral to business obligations, not optional add-ons.

 

Building Your Incident Response Plan

Immediate Response Steps

When a breach occurs, your response in the first 72 hours is critical:

  1. Notify Your Insurer: Contact your cyber insurance provider immediately with full incident details
  2. Assess OAIC Obligations: Determine if the breach meets notification criteria under the Notifiable Data Breaches scheme
  3. Notify Affected Individuals: Clearly communicate what data was compromised and provide guidance on protective measures
Proactive Security Controls

Myrtec’s compliance reporting reveals common security gaps across Australian businesses. Regular assessments should evaluate:

  • Backup integrity and encryption
  • Microsoft Secure Score metrics
  • Administrative access controls
  • Operating system currency
  • Password management systems
  • Memory optimisation
  • BitLocker encryption status

 

Data Governance: Reducing Impact

The case study’s 600GB encryption could have been significantly reduced through proper data governance:

  • Access Control Lists: Implement the Principle of Least Privilege: users should only access data necessary for their roles.
  • Data Loss Prevention: Establish DLP policies to protect sensitive data from unauthorised access or transfer.
  • Auditability: Implement granular auditing on data storage locations and monitor outbound traffic to detect exfiltration attempts.

Cyber Insurance Considerations

While cyber insurance provides crucial protection, insurers maintain stringent prerequisites due to the high risk of breaches. Requirements typically include hardware and software compliance, identity security measures, and implementation of the Essential Eight security controls. Many businesses find themselves ineligible due to inadequate security postures, making proactive security investments essential.

 

Moving Forward: Your Action Plan

The Techshop’s key message was clear: any single security measure could have prevented or significantly reduced the impact of the breach. For Australian businesses, the path forward requires:

  1. An immediate security assessment against the vulnerabilities discussed
  2. Updated privacy policies aligned with new legislation
  3. Comprehensive data breach response plans
  4. Regular security audits and compliance reporting
  5. Ongoing staff training on cybersecurity best practices

 

As regulations tighten and cyber threats evolve, businesses can no longer treat security as an afterthought. The combination of substantial financial penalties, reputational damage, and operational disruption makes proactive cyber security investment a business imperative.

Ready to level up? 

Myrtec’s Techshops provide invaluable insights into navigating the complex intersection of technology, security, and compliance. These sessions break down complex technical concepts into actionable strategies, ensuring businesses feel confident and in control of their IT systems.

Ready to strengthen your cybersecurity posture? Book your spot at our next Techshop or contact our team to discuss how the FLEX Managed Service Agreement can help you stay ahead of evolving threats and regulatory requirements.

Navigating a Cyber Breach