Home Security Are you prepared for mandatory data breach reporting, asks Mimecast

Are you prepared for mandatory data breach reporting, asks Mimecast

The arrival of mandatory breach reporting in Australia is a ticking clock. Cloud-based email management provider Mimecast is concerned many Australian businesses are not ready.

“I don’t remember anything as big, being talked about as little,” says Garrett O'Hara, principal consultant for Mimecast.

“Christmas is very close and many businesses wind down mid December to Australia Day. This legislation starts in February and organisations may get caught out,” he says.

“It’s a ticking clock but there isn’t much attention. For many people the reputation damage is the big thing that will cause them to close the doors,” he says.

There are prominent examples of data breaches, such as last year’s Australian Red Cross Blood Bank Service breach where the details of many donors were potentially available to malicious persons.

However, O’Hara says, data breaches can occur in even the most trivial ways. “I could start typing an email and enter the name ‘Chris’ and an address pops up and autocompletes and I send it, then 20 minutes later realise I didn’t send to Chris in Mimecast but to a friend, and therefore the wrong person. This simple thing becomes a whole lot more serious now, and potentially has a big impact.”

What’s needed, O’Hara says, is a cyber-resilient mindset. “It’s not just about bad attackers but also about leaking accidentally. It may not be anything malicious but just being silly humans.”

O’Hara sees two important ways businesses can protect themselves from breaches:

  1. Use technology to bolster data protection. “It becomes so important to not deliberately or accidentally leak information,” he says.
  2. Construct an incident management and incidence response plan. “Some organisations don’t have them but this is a critical part of protection,” he says. “If something does happen and you have to report it, it is important to have a plan. Does it fall under serious harm? What happened? Who is responsible for doing what? Who will disclose to the Office of the Australian Information Commissioner, to the media, and end users? You need a plan, and also to test and define what people should do.”

The preparedness and planning should always have been in business, O’Hara says, so mandatory data breach reporting planning “is going to put people in a better position".

“It’s hard, but it will give people best practice, security by design, and privacy by design. You will see it baked in, and not just an afterthought.”

“Information security teams will have a much louder voice because the impact to the business – not just funds, but reputation damage - will become a bigger thing.

“Ultimately as much as we talk about the business impact, it’s about end users and their data and how it is used by organisations to make money, so there is a responsibility to ensure data is stored safely and protected,” he says.


Once an attacker gets past the perimeter, it is important to be secured at the next level. “We believe you go with the best in those verticals or endpoints, and they are different things. Sometimes there is a temptation to go with the same vendor but if you mix across the Web, email, and endpoint security you see new companies coming out with really compelling offerings – a whole new set of technology and expertise,” he says.


Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service


David M Williams

joomla site stats

David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. Within two years, he returned to his alma mater, the University of Newcastle, as a UNIX systems manager. This was a crucial time for UNIX at the University with the advent of the World-Wide-Web and the decline of VMS. David moved on to a brief stint in consulting, before returning to the University as IT Manager in 1998. In 2001, he joined an international software company as Asia-Pacific troubleshooter, specialising in AIX, HP/UX, Solaris and database systems. Settling down in Newcastle, David then found niche roles delivering hard-core tech to the recruitment industry and presently is the Chief Information Officer for a national resources company where he particularly specialises in mergers and acquisitions and enterprise applications.