It’s been a relentless year for cyber security, with millions of Australians
seeing their personal data fall into the hands of increasingly sophisticated
criminals. From healthcare providers to financial institutions and even
government agencies, no sector has been immune. The fallout isn’t just
personal – businesses are facing potentially crippling financial losses.
<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
The Rising Tide of Data Breaches
The Office of the Australian Information Commissioner (OAIC) recently
launched a
Notifiable Data Breaches (NDB) statistics dashboard
to provide transparency on the scale and nature of these incidents. Between
January and June, 532 breaches were reported, with malicious attacks
accounting for over half. And experts warn the second half of the year
shows no sign of slowing down.
But the publicly reported numbers may only be the tip of the iceberg. As ANU
cybersecurity expert Vanessa Teague points out, the most damaging breaches
often go undetected. “The most effective attacks are surreptitious… there’s
no particular reason an intrusion would be noticed. Even if it is noticed
by the service provider, the affected people may not be notified,” she
explains.
<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106120604″
data-uri=”coremedia://imageproxy/106120604″
<img
alt=”Woman with brown hair and standing outside smiles up close at the camera.”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/07d426a0c16d0f5400e6962c73f2fc39?impolicy=wcms_crop_resize&cropH=1294&cropW=1941&xPos=0&yPos=209&width=862&height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>Vanessa Teague says cyber attacks are constantly improving.
Supplied: Vanessa Teague
<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
The Future of Cybercrime: What’s on the Horizon?
The trends point to a future where cyberattacks become even more
sophisticated, targeted, and frequent. Several key developments are likely
to shape this landscape:
<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
AI-Powered Attacks
Artificial intelligence (AI) is a double-edged sword. While it can enhance
cyber defenses, it’s also being weaponized by attackers. Expect to see
AI-driven phishing campaigns that are incredibly realistic and personalized,
making them harder to detect. AI can also automate vulnerability scanning
and exploit development, accelerating the pace of attacks.
<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Ransomware Evolution
Ransomware isn’t going away. Instead, it’s evolving. We’re already seeing
“double extortion” tactics, where attackers not only encrypt data but also
threaten to release it publicly. Future ransomware attacks may target
critical infrastructure, with potentially devastating consequences. The
recent Qantas breach, where hackers threatened to release customer data if a
ransom wasn’t paid, is a stark example of this trend.
<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106161846″
data-uri=”coremedia://imageproxy/106161846″
<img
alt=”Close up of a hand typing on a keyboard in a dark room”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/c6499cd148dcf327945d6d39dc52a9d1?impolicy=wcms_crop_resize&cropH=2000&cropW=3000&xPos=0&yPos=0&width=862&height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>Vanessa Teague says companies should not pay ransoms to hackers as it
only incentivises them to steal again.
Pexels
Paying ransoms only fuels the problem, as Dr. Teague emphasizes: “Ransomware
is a highly organised market, the money they get from one attack is simply
redeployed to improve their performance for subsequent attacks.”
<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Supply Chain Attacks
Attacks targeting the software supply chain are becoming increasingly common.
By compromising a single vendor, attackers can gain access to a vast network
of customers. This makes supply chain attacks particularly dangerous and
difficult to defend against.
<h2 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
Protecting Yourself in a Risky Digital World
While the threat landscape is evolving, individuals and organizations can
take steps to mitigate their risk. Dr. Teague stresses the importance of
proactive security measures.
“It’s unfortunate that [the government doesn’t] mention encrypting data,
because that would significantly help in mitigating the damage done by a
data breach,” she says. Encryption renders data unreadable to unauthorized
parties, even if a breach occurs.
Updating the Privacy Act to hold organizations accountable for data security
is also crucial. Furthermore, minimizing data collection and retention
reduces the potential impact of a breach. As Privacy Commissioner Carly
Kind notes, “Lengthy data retention beyond what is reasonable continues to
be an aggravating factor in data breaches.”
On a personal level, adopting end-to-end encrypted communication tools
(Signal, iMessage, WhatsApp) and using privacy-focused browsers with ad
blockers can significantly enhance your digital security. Be mindful of the
data you share online and avoid providing unnecessary personal information.
<figure
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_outdentDesktopijbiK Figure_figure__xLyBy Figure_docImageDSvk4″
data-print=”inline-media”
data-component=”Figure”
id=”106120358″
data-uri=”coremedia://imageproxy/106120358″
<img
alt=”Carly Kind, a woman with brown hair smiles at camera.”
class=”Image_image__5tFYM ContentImage_image__DQ_cq”
sizes=”100vw”
src=”https://live-production.wcms.abc-cdn.net.au/a15050b8413de898854f7d8cc5781c3f?impolicy=wcms_crop_resize&cropH=1426&cropW=2139&xPos=0&yPos=217&width=862&height=575”
loading=”lazy”
data-component=”Image”
data-lazy=”true”
/>Carly Kind says data breaches continue to be prevalent in our digital
age.
Supplied: OAIC
<aside
class=”ContentAlignment_marginBottom4H_6E ContentAlignment_overflowAutoc1_IL ContentAlignment_floatRightnfR_t RelatedCard_relatedCard4Im5s interactive_focusContextyRhc_ interactive_defaultsAKxUU interactive_hoverContext__LDUDX interactive_defaults__AKxUU”
data-component=”RelatedCard”
data-uri=”coremedia://article/106157228″
<a
href=”https://www.abc.net.au/news/2025-11-12/genea-ivf-data-breach-fallout-ongoing-cyber-concerns-raised/105984716”
data-component=”FullBleedLink”
class=”RelatedCard_linkrsgR9 FullBleedLink_rootlTw_U interactive_focusContextyRhc_ interactive_defaults__AKxUU FullBleedLink_showVisitedg3Xvz”<h3
class=”Typography_basesj2RP RelatedCard_headingS_nm2 Typography_sizeMobile18eJCIB Typography_lineHeightMobile24crkfh Typography_boldFqafP Typography_serif__qU2V5 Typography_colourInheritdfnUx”
data-component=”Typography”Genea patients push for justice
<h3 class=”Typography_basesj2RP Heading_heading__VGa5B future_headingGcudw Heading_defaultZ3p_p Typography_sizeMobile20NUDn4 Typography_sizeDesktop32LR_G6 Typography_lineHeightMobile24crkfh Typography_lineHeightDesktop40BuoRf Typography_marginBottomMobileSmall__6wx7m Typography_marginBottomDesktopSmallCboX4 Typography_boldFqafP Typography_colourInherit__dfnUx Typography_normaliseu5o1s”
data-component=”Heading”>
FAQ: Staying Safe Online
**Q: What is multi-factor authentication (MFA)?**
A: MFA adds an extra layer of security by requiring a second verification
method (like a code sent to your phone) in addition to your password.
**Q: Should I use the same password for all my accounts?**
A: Absolutely not! Use strong, unique passwords for each account. A password
manager can help you generate and store them securely.
**Q: What should I do if I suspect I’ve been hacked?**
A: Immediately change your passwords, contact your bank and any affected
service providers, and report the incident to relevant authorities.
**Q: Is a VPN (Virtual Private Network) helpful?**
A: A VPN can encrypt your internet traffic and mask your IP address, adding
a layer of privacy, especially on public Wi-Fi networks.
The cyber security landscape is constantly shifting. Staying informed,
adopting proactive security measures, and demanding greater accountability
from organizations are essential steps in protecting yourself and your data in
the years to come.
