The Times Australia
The Times World News

.

Are data breaches the new normal? Should we just assume our data isn’t safe?

  • Written by Sigi Goode, Professor of Information Systems, Australian National University
Are data breaches the new normal? Should we just assume our data isn’t safe?

In recent days, both Ticketek Australia[1] and Ticketmaster[2] have experienced breaches which have exposed customer details to hackers. They join a growing list of high-profile data breaches that have put the privacy of millions at risk.

For example, in 2022, Optus disclosed a breach[3] of 9.8 million records. In 2023, Latitude, the Australian financial services firm, experienced a data breach of more than 14 million records[4].

My own university, the Australian National University, experienced a data breach[5] of 200,000 records in 2018. Dan Murphy’s[6], Football Australia[7], Microsoft[8], Nissan[9], Dell[10], Roku[11], Suncorp[12] and Shell[13] have all experienced breaches so far in 2024.

Despite advancements in technology and increased awareness of cybersecurity threats, companies continue to fall victim to breach attacks.

It may feel like these breaches are becoming more frequent, and that seemingly any firm is a data breach target waiting to happen. But the situation is not quite so clear-cut.

What happens in a data breach?

A data breach is an unauthorised access or disclosure of sensitive, confidential or private information: customer identities, payment methods, account details, purchase histories and so on.

Breaches can happen when cyber criminals exploit vulnerabilities in computer systems, networks, applications or physical security to gain unauthorised access to protected data. They can also access data when it’s accidentally made available outside the organisation, perhaps by an incorrectly addressed email or a lost USB memory stick.

Australia has actually seen a fairly steady rate of notifiable data breaches since 2020 – around 450 every six months, according to the Office of the Australian Information Commissioner[14].

While these figures are higher than when the notifiable data breach program began in 2018, it’s important to understand this is partly a consequence of requiring organisations to disclose breaches: the more you look for something, the more you’re going to find it.

Even if the number of data breaches is not increasing significantly, the average cost and severity of these breaches has risen substantially. According to IBM[15], the average cost of a data breach was US$4.45 million (A$6.69 million), an increase of 15% over three years. So what’s driving these increases?

The value of your personal data is going up

Increased demand for targeted advertising and the growing importance of data-driven decision making have fuelled the need for richer customer data.

Many organisations – not just legitimate ones – want to know more about you, and at a much more granular level than before. The more comprehensive and accurate the data, the more valuable it becomes.

Increasingly stringent privacy regulations, such as the European Union’s General Data Protection Regulation[16] (GDPR) and Australia’s Privacy Act have driven organisations to improve their data management practices and security measures to protect user information and avoid costly fines.

This has made it harder, not easier, for cyber criminals to acquire user data in bulk.

Meanwhile, markets for illicit customer data are becoming more popular as anonymising networks and tools become more user friendly. Tools for selling on the dark web have also become more advanced, allowing cyber criminals to collaborate and share information about in-demand data, potential targets and new attack modes.

Once a cyber criminal has obtained some data, finding a buyer is much easier than it was even a few years ago.

However, large firms are investing more in protecting and storing data. According to consulting firm Gartner[17], 87% of chief information officers in Australia and New Zealand will be increasing their cybersecurity budgets this year.

As a result, data and cybersecurity practices are becoming more complex, increasing the skill needed for a bad actor to make a successful attack.

How do I protect my data with so many breaches happening?

While our personal data continues to have value, there will be a market for it. Make sure you practice good cybersecurity habits.

Regularly review and delete inactive accounts, and monitor your accounts for strange activity.

Enable two-factor authentication (2FA) on your accounts and devices, so that you’ll receive a prompt on your phone when someone logs into your account, or transfers money out of it. Don’t believe cold callers who want you to deactivate or give them your two-factor responses.

Read more: What is multi-factor authentication, and how should I be using it?[18]

Be very selective about the personal info you share online, particularly information such as birthdays, when and where you were born, and the names of pets and family members. This information can be used to defuse account recovery questions.

Don’t click on suspicious email links, regardless of how innocuous they might appear.

Never provide sensitive information to unknown or unverifiable sources, especially cold callers who claim you have a virus, or are due for a refund. Authentic callers will be happy for you to call them back on an official number.

The best way to think about the data breach problem is not to think about how our data can be breached, but to think about how organisations get your data in the first place. The best way to protect yourself online – whether it’s data breaches or an account compromise – is to guard your data jealously.

You only have one identity: don’t give it away easily.

References

  1. ^ Ticketek Australia (www.abc.net.au)
  2. ^ Ticketmaster (www.cnet.com)
  3. ^ Optus disclosed a breach (www.optus.com.au)
  4. ^ of more than 14 million records (ia.acs.org.au)
  5. ^ experienced a data breach (www.abc.net.au)
  6. ^ Dan Murphy’s (www.cyberdaily.au)
  7. ^ Football Australia (www.cyberdaily.au)
  8. ^ Microsoft (www.cyberdaily.au)
  9. ^ Nissan (www.itnews.com.au)
  10. ^ Dell (www.cyberdaily.au)
  11. ^ Roku (au.finance.yahoo.com)
  12. ^ Suncorp (www.afr.com)
  13. ^ Shell (www.cyberdaily.au)
  14. ^ Office of the Australian Information Commissioner (www.oaic.gov.au)
  15. ^ IBM (www.ibm.com)
  16. ^ European Union’s General Data Protection Regulation (theconversation.com)
  17. ^ Gartner (www.gartner.com)
  18. ^ What is multi-factor authentication, and how should I be using it? (theconversation.com)

Read more https://theconversation.com/are-data-breaches-the-new-normal-should-we-just-assume-our-data-isnt-safe-231396

Times Magazine

DIY Is In: How Aussie Parents Are Redefining Birthday Parties

When planning his daughter’s birthday, Rich opted for a DIY approach, inspired by her love for drawing maps and giving clues. Their weekend tradition of hiding treats at home sparked the idea, and with a pirate ship playground already chosen as t...

When Touchscreens Turn Temperamental: What to Do Before You Panic

When your touchscreen starts acting up, ignoring taps, registering phantom touches, or freezing entirely, it can feel like your entire setup is falling apart. Before you rush to replace the device, it’s worth taking a deep breath and exploring what c...

Why Social Media Marketing Matters for Businesses in Australia

Today social media is a big part of daily life. All over Australia people use Facebook, Instagram, TikTok , LinkedIn and Twitter to stay connected, share updates and find new ideas. For businesses this means a great chance to reach new customers and...

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Times Features

How to Choose a Cosmetic Clinic That Aligns With Your Aesthetic Goals

Clinics that align with your goals prioritise subtlety, safety, and client input Strong results come from experience, not trends or treatment bundles A proper consultation fe...

7 Non-Invasive Options That Can Subtly Enhance Your Features

Non-invasive treatments can refresh your appearance with minimal downtime Options range from anti-wrinkle treatments to advanced skin therapies Many results appear gradually ...

What is creatine? What does the science say about its claims to build muscle and boost brain health?

If you’ve walked down the wellness aisle at your local supermarket recently, or scrolled the latest wellness trends on social media, you’ve likely heard about creatine. Creati...

Whole House Water Filters: Essential or Optional for Australian Homes?

Access to clean, safe water is something most Australians take for granted—but the reality can be more complex. Our country’s unique climate, frequent droughts, and occasional ...

How Businesses Turn Data into Actionable Insights

In today's digital landscape, businesses are drowning in data yet thirsting for meaningful direction. The challenge isn't collecting information—it's knowing how to turn data i...

Why Mobile Allied Therapy Services Are Essential in Post-Hospital Recovery

Mobile allied health services matter more than ever under recent NDIA travel funding cuts. A quiet but critical shift is unfolding in Australia’s healthcare landscape. Mobile all...