{"id":9193,"date":"2016-03-01T12:08:32","date_gmt":"2016-03-01T02:08:32","guid":{"rendered":"http:\/\/www.macquarietelecom.com\/?p=9193"},"modified":"2023-03-01T16:38:41","modified_gmt":"2023-03-01T05:38:41","slug":"cyber-security","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/","title":{"rendered":"When Corporate Networks Are the Cyber Security Threat"},"content":{"rendered":"

\"Cybersecurity1\"<\/p>\n

Catch a plane to the Middle East and so much as train with a terrorist organisation and you can expect to be sent to a dark place behind bars for a long time the moment you return to Australia.<\/strong><\/p>\n

The community would demand nothing less.<\/p>\n

But what if your fridge launches an attack on an airliner? Or your corporate network attempts to disrupt a military operation on behalf of a terrorist enemy?<\/p>\n

Those scenarios might be extreme, but they are by no means far-fetched.<\/p>\n

The question is not if, but when, a major security incident is launched leveraging inadequately secured corporate networks.<\/p>\n

Two years ago \u2013 well before the Internet of Things (\u2018IoT\u2019) had become a mainstream discussion \u2013 it was reported that a fridge \u2013 along with thousands of Internet-connected TVs \u2013 had been part of a Bot network that launched a distributed denial of service attack.<\/p>\n

Opportunities for connected personal and business infrastructure to be secretly \u201coccupied\u201d and used for nefarious purposes are expanding at an explosive rate as devices are added to the Internet at ever greater bandwidth.<\/p>\n

Inside a medium sized business there are likely to be hundreds of devices capable of being, and maybe a dozen in a small business \u2013 printers, TVs, modems, fridges just for a start.<\/p>\n

Further, the standard defence response to an international DDOS attack \u2013 \u201csinking\u201d the unwelcome traffic by diverting it into a series of dead-end destinations \u2013 is far less effective against an attack originating within Australia. There are simply fewer safe places to which the traffic can be diverted.<\/p>\n

But even as the risk grows day by day, there is still a tendency to see cyber security as a black art. Too many senior managers do not ask the tough, penetrating questions of their technology teams they are expected to ask of experts in other fields, like finance.<\/p>\n

If senior managers are looking for an incentive to make cyber security their business, they need only look at US retailer, Target, where the loss of credit card details for 40 million customers cost both the CEO and CIO their jobs.<\/p>\n

A limited subset of the business community are treating cyber security with the appropriate gravity \u2013 typically Australia\u2019s largest companies and Financial institutions – the picture elsewhere is much more mixed.<\/p>\n

Ignorance is not an excuse in the law, but there has to date been a reasonably generous attitude from lawmakers when it comes to cyber security.<\/p>\n

The room for ignorance will be much narrower when the Federal Government releases its new National Cyber Security Statement in coming weeks.<\/p>\n

The statement is expected to highlight the importance of a few protective measures that, properly implemented, prevent the majority of common attacks and security breaches.<\/p>\n

It is no accident that these are described as \u201chygiene\u201d measures \u2013 they really should be as basic as a food service business requiring staff to wash their hands, or for a car company meeting minimum quality and safety standards.<\/p>\n

That they are not already universally applied says something troubling about the level of cyber risk management across corporate Australia.<\/p>\n

The Government\u2019s initiatives are likely to take the form of helpful advice and guidance, and some tools to businesses to lift their security stance, rather than introducing punitive measures for poor performance. It is also expected to leverage the work that the Australian Signals Directorate (ASD) and the Australian Cyber Security Centre (ACSC) has done in helping the Government better protect itself from cyber attack.<\/p>\n

But lawmakers\u2019 tolerance of poor standards of conduct online has been gradually diminishing in recent years.<\/p>\n

For example, we have seen tighter regulation of anti-social conduct on social media by requiring more timely removal of defamatory or offensive content, and compulsory data breach notification law is proposed.<\/p>\n

These changes to the law reflect community expectations.<\/p>\n

What would be the reaction if a high profile attack on a civilian or strategic target occurred and it was found to have originated from a poorly secured corporate network? And what if it turned out that the company had not deployed even the basic hygiene measures that the Government is going to great lengths to explain and promote?<\/p>\n

In that moment, it is likely the community would not look favourably on the latitude directors and managers have been afforded when it comes to meeting the basic standards required to protect not only their businesses, but the community.<\/p>\n

Demands for legal liability for directors and senior managers might soon follow.<\/p>\n

Expect politicians then to respond quickly and firmly to force managers and directors to make cyber security their personal business or to pay the price.<\/p>\n

Businesses that treat cyber security management as an issue for their IT team and do not actively manage it at the board and executive level would be well advised to lift their game before that happens.<\/p>\n

Aidan Tudehope is Managing Director of Government & Hosting at Macquarie Telecom and was a member of the PM\u2019s Cyber Security Business Roundtable process.<\/em><\/p>\n

This article was first published in\u00a0the Australian Financial Review<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Catch a plane to the Middle East and so much as train with a terrorist organisation and you can expect to be sent to a dark place behind bars for a long time the moment you return to Australia. The community would demand nothing less. But what if your fridge launches an attack on an […]<\/p>\n","protected":false},"author":7,"featured_media":7133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[13,12],"tags":[261,75,76,46,77,321,270,71,322,78,79,80,81],"class_list":["post-9193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-migrate","tag-aidan-tudehope","tag-asd-certified-cloud","tag-certified-cloud-services","tag-cloud-hosting","tag-cloud-solutions-for-government","tag-corporate-networks","tag-cyber","tag-cyber-security","tag-cyber-security-threat","tag-data-center-as-a-service","tag-government-cloud","tag-govzone","tag-irap-assessed"],"acf":[],"yoast_head":"\nWhen Corporate Networks Are the Cybersecurity Threat<\/title>\n<meta name=\"description\" content=\"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"When Corporate Networks Are the Cybersecurity Threat\" \/>\n<meta property=\"og:description\" content=\"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"bet365 live casino games\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-01T02:08:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T05:38:41+00:00\" \/>\n<meta name=\"author\" content=\"Aidan Tudehope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Tudehope1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aidan Tudehope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\"},\"author\":{\"name\":\"Aidan Tudehope\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\"},\"headline\":\"When Corporate Networks Are the Cyber Security Threat\",\"datePublished\":\"2016-03-01T02:08:32+00:00\",\"dateModified\":\"2023-03-01T05:38:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\"},\"wordCount\":842,\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Aidan Tudehope\",\"ASD certified cloud\",\"Certified cloud services\",\"cloud hosting\",\"cloud solutions for government\",\"corporate networks\",\"cyber\",\"Cyber Security\",\"cyber security threat\",\"data center as a service\",\"government cloud\",\"GovZone\",\"IRAP assessed\"],\"articleSection\":[\"Articles\",\"Migrate\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\",\"name\":\"When Corporate Networks Are the Cybersecurity Threat\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2016-03-01T02:08:32+00:00\",\"dateModified\":\"2023-03-01T05:38:41+00:00\",\"description\":\"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more\",\"breadcrumb\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/macquarietechnologygroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"When Corporate Networks Are the Cyber Security Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"name\":\"bet365 live casino games\",\"description\":\"bet365 live casino games\",\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\",\"name\":\"bet365 live casino games\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"contentUrl\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"width\":1911,\"height\":1069,\"caption\":\"bet365 live casino games\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/macquarie-telecom\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\",\"name\":\"Aidan Tudehope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"caption\":\"Aidan Tudehope\"},\"description\":\"Aidan is co-founder of bet365 live casino games and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.\",\"sameAs\":[\"https:\/\/x.com\/Tudehope1\"]}]}<\/script>\n","yoast_head_json":{"title":"When Corporate Networks Are the Cybersecurity Threat","description":"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"When Corporate Networks Are the Cybersecurity Threat","og_description":"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more","og_url":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/","og_site_name":"bet365 live casino games","article_published_time":"2016-03-01T02:08:32+00:00","article_modified_time":"2023-03-01T05:38:41+00:00","author":"Aidan Tudehope","twitter_card":"summary_large_image","twitter_creator":"@Tudehope1","twitter_misc":{"Written by":"Aidan Tudehope","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#article","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/"},"author":{"name":"Aidan Tudehope","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929"},"headline":"When Corporate Networks Are the Cyber Security Threat","datePublished":"2016-03-01T02:08:32+00:00","dateModified":"2023-03-01T05:38:41+00:00","mainEntityOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/"},"wordCount":842,"publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage"},"thumbnailUrl":"","keywords":["Aidan Tudehope","ASD certified cloud","Certified cloud services","cloud hosting","cloud solutions for government","corporate networks","cyber","Cyber Security","cyber security threat","data center as a service","government cloud","GovZone","IRAP assessed"],"articleSection":["Articles","Migrate"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/","url":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/","name":"When Corporate Networks Are the Cybersecurity Threat","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-03-01T02:08:32+00:00","dateModified":"2023-03-01T05:38:41+00:00","description":"Take a look at why understanding Cyber Security should be a priority for your business. Click here to learn more","breadcrumb":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/macquarietechnologygroup.com\/news\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/macquarietechnologygroup.com\/"},{"@type":"ListItem","position":2,"name":"When Corporate Networks Are the Cyber Security Threat"}]},{"@type":"WebSite","@id":"https:\/\/macquarietechnologygroup.com\/#website","url":"https:\/\/macquarietechnologygroup.com\/","name":"bet365 live casino games","description":"bet365 live casino games","publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/macquarietechnologygroup.com\/#organization","name":"bet365 live casino games","url":"https:\/\/macquarietechnologygroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","contentUrl":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","width":1911,"height":1069,"caption":"bet365 live casino games"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/macquarie-telecom\/"]},{"@type":"Person","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929","name":"Aidan Tudehope","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","caption":"Aidan Tudehope"},"description":"Aidan is co-founder of bet365 live casino games and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.","sameAs":["https:\/\/x.com\/Tudehope1"]}]}},"_links":{"self":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9193"}],"collection":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/comments?post=9193"}],"version-history":[{"count":2,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9193\/revisions"}],"predecessor-version":[{"id":14247,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9193\/revisions\/14247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/media?parent=9193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/categories?post=9193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/tags?post=9193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}