ACSC Annual Cyber Threat Report July 2021 - June 2022 – The Findings
The Australian Cyber Security Centre (ACSC) Annual Cyber Threat Report is a product of insights from across the Commonwealth, including contributions from the Australian Federal Police and Australian Intelligence Organisation. The aim is to deliver key insights to individuals and businesses alike about the threat of cyberattacks and how to protect themselves.
The third Annual Cyber Threat Report focuses on the known and emerging cyber threats impacting different sectors of the Australian economy during the 2021-22 financial year. The report helps to inform Australian businesses of the current and emerging cyber threats impacting different sectors of the Australian economy and maps how threat actors have found innovative ways to deploy attacks. The report also contains mitigation advice that all Australian businesses can implement to decrease the likelihood of a malicious cyber incident.
Cybersecurity Threats and Trends
During the 2021-22 financial year, we have witnessed a deterioration of the global threat environment. Most notable was Russia’s invasion of Ukraine, in which destructive malware resulted in damage within Ukraine and across European networks. In Australia, the volume of attacks also rose significantly. Moreover, the sophistication of attacks made extortion and espionage possible at a greater scale than ever before.
The ACSC received almost 80,000 cybercrime reports, equating to one every seven minutes, a 13 per cent increase on the previous year. From those reports, the ACSC highlighted the following key trends:
- Cyberwarfare is on the rise - Russia’s use of malware to destroy data and prevent day-to-day operations in Ukraine was just one case of the cyber landscape being used as a battleground. Amongst other examples, the Australian Government attributed the exploitation of Microsoft’s Exchange Vulnerabilities to China’s Ministry of State Security.
- Ransomware continues to reign - ransomware remained the most destructive type of cybercrime in 2021-2022.The extortion tactics had huge costs, not just in terms of ransom payments themselves but lost productivity and reputational damage.
- Critical infrastructure networks are being targeted - critical infrastructure has become an attractive target to both state actors and cybercriminals. Fortunately, in 2021-22, potential disruptions to essential Australian services were stopped by defences such as network segregation and incident response.
- Critical vulnerabilities were exploited - malicious actors persistently scanned networks with unpatched systems with a view to using them as entry points to higher-value targets. Most of the significant incidents the ACSC responded to were due to inadequate patching.
ACSC Recommendations
The ACSC report provides recommendations to prepare for, protect against and respond to cyber incidents, which include:
- Reviewing the security posture of remote workers - consider how they use communication, collaborations, and productivity software.
- Patching vulnerabilities quickly - ensure you, your cloud service provider or your managed service provider can patch all vulnerabilities within 48 hours.
- Using reputable providers - cloud service providers and managed service providers should implement appropriate cyber security measures.
- Testing your security plans - detection, incident response, business continuity and disaster recovery plans should be regularly and robustly tested.
- Reporting all cybersecurity incidents - by reporting all cybercrime and cyber incidents, the ACSC can build further intelligence and prevent others from falling victim.
Improving Your Security Posture
While over the last financial year, there has been a heightened level of malicious cyber activity, there has also been a rise in collaboration across industry, small business, and government. The Australian Government considers cyber security and reinforcing cyber resilience to be a national priority and by working together, the digital opportunities for individuals and businesses alike remain bright.
The Annual Cyber Threat Report is a great tool to help educate you about the threats your business is facing and advise you on how to improve your security posture. To receive more insights and advice, you can read the full report or sign up to become an ACSC partner. You can also get in contact with InfoTrust to discuss how to strengthen your security strategy today.
see our
Related resources
Mimecast recently released its State of Email Security Report for 2021. The fifth edition of its annual report used interviews with over twelve hundred of information technology and cybersecurity professionals across the globe to gather vital cybersecurity insights. The report offers an insight into the latest email threats along with advice on how to build cyber resilience and mitigate the risks of email-borne attacks.
Cyber attacks and data breaches have been commonplace in the news headlines for some time now. Although a warning from the media is certainly helpful, there is so much more that can be done when it comes to threat intelligence sharing. Threat intelligence sharing is an important part of the global cybersecurity community effort to tackle cybercrime and should form a part of every organisation’s cybersecurity strategy. Sharing cyber threat intelligence enables organisations to make informed decisions about their cybersecurity, building more effective and robust cyber defences.
One of my favourite annual reports to read is the Verizon Data Breach Investigations Report. It’s packed full of insights about the threat landscape and security leaders, in my opinion, should read this report to get a pulse on what’s happening in cyber-scape.
After all, as cyber leaders, we are here to stop breaches – so the insights gained from real cyber incidents and breaches is gold in learning how to tighten up our defences.
All businesses, large and small, are under increasing pressure to demonstrate that they are managing the risk of cyberattacks. This means having the right processes and controls in place to identify risks and vulnerabilities, protect information, as well as detect, respond, and recover in the event of cybersecurity incidents. As such, many businesses are turning to certification authorities and security frameworks to demonstrate privacy and security best practice and achieve compliance with regulatory bodies. System and Organisation Controls (SOC 2) is one such compliance framework that can help organisations to create a structured approach to cybersecurity.
Frost & Sullivan has recently released its 2021 Frost Radar: Email Security report, where its findings provide a benchmarking framework to help businesses protect their email from cyber threats.
As we operate in an increasingly digital world, every business collect, store, and share more and more data. And, amongst that data is personal information. With the OAIC marking this year’s Privacy Awareness Week (PAW) from Monday 3 May to Sunday 9 May 2021, it’s time for us all to review how we protect our customers’ personal information.
We're Here To Help