The Times Australia
The Times Australia

.
The Times Real Estate

.

The Australian government has introduced new cyber security laws. Here’s what you need to know

  • Written by David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University

The Albanese government today introduced long-awaited legislation to parliament which is set to revolutionise Australia’s cyber security preparedness.

The legislation[1], if passed, will be Australia’s first standalone cyber security act. It’s aimed at protecting businesses and consumers from the rising tide of cyber crime.

So what are the key provisions, and will it be enough?

What’s in the new laws?

The new laws have a strong focus on victims of “ransomware” – malicious software cyber criminals use to block access to crucial files or data until a ransom has been paid[2].

People who pay a ransom do not always regain lost data[3]. The payments also sustain the hacker’s business model.

Under the new law, victims of ransomware attacks who make payments must report the payment to authorities. This will help[4] the government track cyber criminal activities and understand how much money is being lost to ransomware.

The laws also involve new obligations for the National Cyber Security Coordinator[5] and Australian Signals Directorate[6]. These obligations restrict how these two bodies can use information provided to them by businesses and industry about cyber security incidents. The government hopes this will encourage organisations to more openly share information knowing it will be safeguarded.

Separately, organisations in critical infrastructure – such as energy, transport, communications, health and finance – will be required to strengthen programs used to secure individuals’ private data.

The new legislation will also upgrade the investigative powers of the Cyber Incident Review Board[7]. The board will conduct[8] “no-fault” investigations after significant cyber attacks. The board will then share insights to promote improvements in cyber security practices more generally. These insights will be anonymised to ensure the identities of victims of cyber attacks aren’t publicly revealed.

The legislation will also introduce new minimum cyber security standards for all smart devices[9], such as watches, televisions, speakers and doorbells.

These standards will establish a baseline level of security for consumers. They will include secure default settings, unique device passwords, regular security updates and encryption of sensitive data.

This is a welcome step that will ensure everyday devices meet minimum security criteria before they can be sold in Australia.

A long-overdue step

Cyber security incidents[10] have surged by 23% in the past financial year, to more than 94,000 reported cases. This is equivalent to one attack every six minutes.

This dramatic increase underscores the growing sophistication and frequency of cyber attacks targeting Australian businesses and individuals. It also highlights the urgent need for a comprehensive national response.

High-profile cyber attacks have further emphasised the need to strengthen Australia’s cyber security framework. The 2022 Optus data breach is perhaps the most prominent example. The breach compromised the personal information of more than 11 million Australians, alarming both the government and the public, not to mention Optus.

Cyber Security Minister Tony Burke says[11] the Cyber Security Act is a “long-overdue step” that reflects the government’s concern about these threats.

Prime Minister Anthony Albanese has also acknowledged recent high-profile attacks as a “wake-up call[12]” for businesses, emphasising the need for a unified approach to cyber security.

The Australian government wants[13] to establish Australia as a world leader in cyber security by 2030. This goal reflects the government’s acknowledgement that cyber security is fundamental to national security, economic prosperity and social well being.

Man with white hair wearing suit and tie standing at microphone in parliament house in front of green leather bench.
Minister for Cyber Security Tony Burke says the creation of a new cyber security act is long overdue. Mick Tsikas/AAP[14]

Broader implications

The proposed laws will enhance national security. But they could also present challenges.

For example, even though the laws place limitations on how the National Cyber Security Coordinator and Australian Signals Directorate can use information, some businesses might still be unwilling to share confidential data because they are worried about damage to their reputation.

Businesses, especially smaller ones, will also face a substantial compliance[15] burden as they adapt to new reporting requirements. They will also potentially need to invest more heavily in cyber security measures. This could lead to increased costs, which might ultimately be passed on to consumers.

The proposed legislation will require careful implementation to balance the needs of national security, business operations and individual privacy rights.

References

  1. ^ legislation (www.aph.gov.au)
  2. ^ until a ransom has been paid (theconversation.com)
  3. ^ do not always regain lost data (www.austrac.gov.au)
  4. ^ will help (cybercx.com.au)
  5. ^ National Cyber Security Coordinator (www.homeaffairs.gov.au)
  6. ^ Australian Signals Directorate (www.asd.gov.au)
  7. ^ Cyber Incident Review Board (publicspectrum.co)
  8. ^ conduct (bn.nswbar.asn.au)
  9. ^ smart devices (thenightly.com.au)
  10. ^ Cyber security incidents (www.abc.net.au)
  11. ^ says (www.abc.net.au)
  12. ^ wake-up call (iapp.org)
  13. ^ The Australian government wants (www.homeaffairs.gov.au)
  14. ^ Mick Tsikas/AAP (www.aph.gov.au)
  15. ^ compliance (cybercx.com.au)

Read more https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889

Labor breaks practice of preferencing Greens to protect Jewish MP Josh Burns

It takes a bit for Labor not to preference the Greens but on Friday it was announced that in the Melbourne sea...

The Times Features

How to Treat Hair Loss Without a Hair Transplant

Understanding Hair Loss Hair loss can significantly affect individuals, both physically and emotionally. Identifying the causes and types can help address the issue more effecti...

How to Find a Trustworthy Professional for Your Plumbing Needs

Nowra is an idyllic locality often referred to as the city of the Shoalhaven City Council in the South Coast region of New South Wales, Australia. This picturesque suburb feature...

How to Choose a Mattress for Back/Neck Pain and All Sleepers?

Waking up with a stiff neck or aching back can derail your entire day. If you're one of the millions struggling with chronic pain, a supportive mattress is more than a luxury – i...

What to Look for in a Professional Debt Collection Service

Often in life, overdue payments are accidental or caused by unusual circumstances. This can cause some temporary convenience, but everything carries on as usual. However, when th...

Be inspired by celeb home decor from across the globe

GET THE LOOK: INDULGE IN THE SAME INTERIOR AS YOUR FAVE CELEBS There is a reason that Denmark ranks the highest on the happiness scale worldwide, one word: Hygge. Hygge. Hygge is ...

Maximizing Space in Narrow Lot Homes: Smart Design Solutions

Urban housing markets continue to push homeowners toward smaller, narrower lots as land prices climb and city populations grow. These thin slices of real estate present unique de...

Times Magazine

Using Countdown Timers in Email: Do They Really Increase Conversions?

In a world that's always on, where marketers are attempting to entice a subscriber and get them to convert on the same screen with one email, the power of urgency is sometimes the essential element needed. One of the most popular ways to create urg...

Types of Software Consultants

In today's technology-driven world, businesses often seek the expertise of software consultants to navigate complex software needs. There are several types of software consultants, including solution architects, project managers, and user experienc...

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

"Eternal Nurture" by Cara Barilla: A Timeless Collection of Wisdom and Healing

Renowned Sydney-born author and educator Cara Barilla has released her latest book, Eternal Nurture, a profound collection of inspirational quotes designed to support mindfulness, emotional healing, and personal growth. With a deep commitment to ...

How AI-Driven SEO Enhancements Can Improve Headless CMS Content Visibility

Whereas SEO (search engine optimization) is critical in the digital landscape for making connections to content, much of it is still done manually keyword research, metatags, final tweaks at publication requiring a human element that takes extensiv...

Crypto Expert John Fenga Reveals How Blockchain is Revolutionising Charity

One of the most persistent challenges in the charity sector is trust. Donors often wonder whether their contributions are being used effectively or if overhead costs consume a significant portion. Traditional fundraising methods can be opaque, with...

LayBy Shopping