Security Market Segment LS
Tuesday, 29 November 2016 16:08

BAE launches free cyber risk assessment tool


BAE Systems has launched its free cyber risk assessment tool specifically aimed at Australian small business to help them prepare for “when, not if, they are breached.”

BAE Systems  provide some of the world's most advanced, technology-led defence, aerospace and security solutions. It has released research into the cyber security preparedness of Australian businesses, and an online Cyber Risk tool to better understand their cyber security readiness.

The Cyber Risk tool measures a business’ cyber security preparedness across 10 key elements of ICT security, including incident response and information management. It was developed in response to global research indicating potential weaknesses in Australian businesses’ cybersecurity measures.

BAE Systems head of Cyber Solutions Asia-Pacific and Japan, Alex Taverner, said, “When the prime minister launched Australia’s Cyber Security Strategy in April, he identified the need for businesses of all sizes to understand their cyber hygiene through voluntary “health checks”; one of BAE Systems key recommendations during the preceding review process.

The BAE Systems survey found that in Australia, a quarter of businesses don’t know if they have the security controls in place to defend against cyberattack. “This online tool will enable businesses to answer that very question, and take steps to improve their cyber preparedness in the likely case that they are found wanting,” said Taverner.

The research, which is part of a global survey including the US, UK, Malaysia and Singapore, reveals the importance of businesses regularly checking their readiness for cyber-attack and assessing whether they have the right people, technology and processes in place.

The research found:

  • 25% of Australian businesses don’t know if they have the security controls in place to defend against cyberattack. Of all the countries surveyed, this is the highest by a significant 10% (75% in Australia versus 85% globally said they were confident they had the right controls in place).
  • 73% of Australian businesses reported a cyberattack had occurred on average in the last six months – 34% in the last month.
  • The average cost of a cyberattack for an Australian business is over $622,515.
  • 32% said they weren’t very confident their business could return to business as usual within 48 hours, or that they’d never thought about it.
  • 15% have not tested their incident response plan in up to two years. 9% said they don’t have an incident response plan or don’t know if they have one.

“Our research found Australian businesses were more likely to report a cyberattack than the global average. As recent high-profile cyberattacks have demonstrated, businesses of all sizes and in all industries must ensure they’re prepared. Regular testing, training of staff, and updating technology and processes is crucial to avoid or minimise monetary and reputational damage. We encourage all businesses to take this simple test to assess the strengths and weaknesses in their cyber security and understand their vulnerabilities,” said Taverner.

Header image courtesy Australian Defence Magazine

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Ray Shaw

joomla stats

Ray Shaw  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!



Recent Comments