At our May Techshop, cybersecurity experts Rob Dawson and Marissa Dimarco delivered crucial insights on managing cyber breaches and understanding the legal landscape surrounding data protection.
With cyber threats evolving rapidly and Australian regulations becoming increasingly stringent, their timely presentation couldn’t be more relevant for businesses navigating multiple digital platforms.
The case study presented during the Techshop painted a sobering picture: a small financial services firm with just 20 employees fell victim to a devastating ransomware attack that could have been prevented with proper security measures. The breach occurred through an open Remote Desktop Server port, exploited an inactive employee account, and resulted in 600GB of data being encrypted, whilst 20GB was stolen. This all happened silently outside business hours.
This real-world example from 2025 demonstrates how cybercriminals exploit basic security oversights that many businesses unknowingly maintain.
The breach analysis revealed several critical vulnerabilities that businesses must address immediately:
Remote Desktop Protocol (RDP) Exposure: Open RDP ports remain prime targets for brute force attacks. Businesses should immediately block these ports and implement VPN endpoints requiring authentication before accessing internal resources. Configure account lockout policies after maximum password attempts to prevent automated attacks.
Inactive Account Risks: The compromised account belonged to a former employee but remained active. This is a common oversight with severe consequences. Implement automated processes for account deactivation and conduct regular audits of user accounts. Remember, each inactive account unnecessarily increases your attack surface.
Password Complexity and MFA: Low-complexity passwords without multi-factor authentication (MFA) are essentially welcome mats for cybercriminals. Enforce strong password policies requiring complexity, encourage passphrase usage, and mandate MFA across all user accounts. As the presentation emphasised, MFA adds that crucial extra security layer beyond passwords alone.
Operating System Vulnerabilities: The case study revealed Windows 8 systems on the network: outdated operating systems with known vulnerabilities. With Windows 10 reaching end-of-life in October 2025, businesses must urgently upgrade to supported systems like Windows 11 or implement additional security measures for legacy systems.
Security Monitoring: The breach went undetected because it occurred outside business hours with no monitoring systems in place. Implement:
Marissa Dimarco’s presentation highlighted significant legal developments affecting Australian businesses:
The Privacy and Other Legislation Amendment Bill 2024 introduced substantial reforms:
Commencing 29 November 2024, this legislation introduces:
This landmark case illustrates the regulatory authorities’ growing resolve in addressing cybersecurity failures. FIIG faced enforcement action for:
The key takeaway: Cybersecurity measures are integral to business obligations, not optional add-ons.
When a breach occurs, your response in the first 72 hours is critical:
Myrtec’s compliance reporting reveals common security gaps across Australian businesses. Regular assessments should evaluate:
The case study’s 600GB encryption could have been significantly reduced through proper data governance:
While cyber insurance provides crucial protection, insurers maintain stringent prerequisites due to the high risk of breaches. Requirements typically include hardware and software compliance, identity security measures, and implementation of the Essential Eight security controls. Many businesses find themselves ineligible due to inadequate security postures, making proactive security investments essential.
The Techshop’s key message was clear: any single security measure could have prevented or significantly reduced the impact of the breach. For Australian businesses, the path forward requires:
As regulations tighten and cyber threats evolve, businesses can no longer treat security as an afterthought. The combination of substantial financial penalties, reputational damage, and operational disruption makes proactive cyber security investment a business imperative.
Myrtec’s Techshops provide invaluable insights into navigating the complex intersection of technology, security, and compliance. These sessions break down complex technical concepts into actionable strategies, ensuring businesses feel confident and in control of their IT systems.
Ready to strengthen your cybersecurity posture? Book your spot at our next Techshop or contact our team to discuss how the FLEX Managed Service Agreement can help you stay ahead of evolving threats and regulatory requirements.
We offer a sense of partnership that goes beyond the typical IT experience. Our value starts where the scope of a traditional managed service ends. Contact us to book a no-obligation discovery meeting.
We’re not just another faceless IT company. We are all about old school professionalism, which means rather than hiding behind our screens, we’d like to meet you face to face (or virtually if required!).
Let’s organise an initial in-person or online meeting to scope if we’d be a good fit for you.
Copyright Ⓒ 2025 Myrtec All Rights Reserved