{"id":11553,"date":"2017-06-28T12:23:21","date_gmt":"2017-06-28T02:23:21","guid":{"rendered":"https:\/\/macquarietechnologygroup.com\/?p=11553"},"modified":"2024-07-29T14:40:59","modified_gmt":"2024-07-29T04:40:59","slug":"australia-must-act-petya-cyber-attack","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/australia-must-act-petya-cyber-attack\/","title":{"rendered":"Australia must act: latest Petya Cyber Attack shows strategies not working"},"content":{"rendered":"
The latest \u2018Petya\u2019 ransonware attack striking across the globe so soon after the WannaCry attack<\/a> showed the national defence strategies were not working, bet365 live casino games director Aidan Tudehope said.<\/p>\n bet365 live casino games believes that only a wholesale restructuring of the national ICT infrastructure may be enough to address escalating and damaging cyber attacks.<\/p>\n “The basic problem is the thousands and thousands of legacy computing and communications systems in businesses and homes.<\/p>\n “Too many of these systems are not being kept up to date with latest software releases so will never be secured.<\/p>\n “There is no silver bullet. One necessary change has to be to try to get those old systems out of the national ICT network.\u00a0\u00a0Computing capacity should be\u00a0managed by specialists.\u00a0 This means a rapid transition to the cloud.<\/p>\n “The recent events are frightening because they show how exposed democratic nations are to not only criminals but potentially to an economic warfare attack.<\/p>\n “We need to begin a conversation about making a fundamental shift in the national cyber defence strategy,” he said.<\/p>\n First<\/span><\/strong>, ensure you have patched all your servers and workstations to ensure they are using the latest version of software. Once the malware has entered through an infected email, it spreads from computer to computer through Microsoft networking software.<\/p>\n Microsoft has released patches to close the vulnerability in various versions of its server software Windows operating system, guidance to who is affected, and advice as to immediate action you can take if the Petya cyber attack<\/a> affects you. Some organisations install patches on a longer cycle \u2013 say, bimonthly \u2013 and might have missed patches released over the weekend.<\/p>\n Your second<\/span><\/strong> line of defence is to try to prevent the malware getting into your system in the first place. Thirdly<\/span><\/strong>, users should be extra vigilant in opening suspicious email, especially when they log on for the first time after the weekend.<\/p>\n Finally<\/span><\/strong>, ensure that you have effective and up to date back-ups. That way, if all else fails, you can recover your lost data.<\/p>\n If you have been impacted by this malware, you should report it to the National Computer Emergency Response Team (CERT Australia).<\/p>\n info@cert.gov.au<\/a> or the Australian Cyber Security Centre<\/p>\n 1300 292 371New cyber strategy required.<\/h3>\n
Old systems can’t cope.<\/h3>\n
Cloud specialists need to review legacy systems.<\/h3>\n
National cyber defence strategy.<\/h3>\n
What can you do?<\/h3>\n
\nThe malware enters through an infected email. Emails carrying the infection can be stopped at your Internet Gateway (for those who use a Gateway) by ensuring your email filtering and firewall software is up to date with all the latest signatures.<\/p>\nWho can you call?<\/h3>\n
\n+61 2 6141 2999
\nHotline: 1300 172 499<\/p>\n
\nACSC<\/a><\/p>\n