cyber security Archives - 麻豆原创 Australia & New Zealand News Center News & Information About 麻豆原创 Fri, 07 Mar 2025 08:23:31 +0000 en-AU hourly 1 https://wordpress.org/?v=6.9.4 The Impact of Cyber Attacks on the Utilities Sector in Australia /australia/2022/06/20/the-impact-of-cyber-attacks-on-the-utilities-sector-in-australia/ Mon, 20 Jun 2022 03:00:25 +0000 /australia/?p=5443 Cyber Security risk is becoming increasingly difficult for Australian utilities and critical infrastructure operators to manage.

The post The Impact of Cyber Attacks on the Utilities Sector in Australia appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>
Increase in cyber attacks in the last 12 months

I鈥檓 sure for many of us out there, the increase in online scams, phishing attacks, and just straight out shonks taking advantage of the non-technically literate is a real concern.

It turns out that this is just the tip of the digital iceberg. Entire nations can be the target of this growing industry.

has found itself severely compromised of late with hackers launching an unprecedented attack that affected 29 public institutions, including the ministries of finance, social security, meteorology, electricity, sciences, innovation, technology and telecommunications.

published earlier this year titled: 鈥淐yber Attacks Increased 50% Year over Year鈥 revealed in late 2021 there was an all time peak in weekly cyber attacks, averaging over 900 attacks per organisation. Just let that number sink in for a moment. Over 900 per week.

In the study, it revealed that Education and Research were the most attacked sector (average attacks per week 1605 鈥 up by 75% from the previous year) with Utilities companies not far behind with a staggering 736 attacks per week 鈥 up 46% from the previous year.

Local Impact for on Utilities Sector

How does this impact Utilities organisations here in Australia? And more importantly how do they respond to these threats, particularly as many have infrastructure that falls squarely under the auspices of the

This is not a simple question to answer.

risk is becoming increasingly difficult for Australian utilities and critical infrastructure operators to manage. Digital transformation is accelerating with, IT and OT landscapes expanding as these new security threats are surging whilst the demand for IT and cyber skills in Australia is at an all time high. Maintaining in-house talent, process governance and eliminating human error is more challenging than ever before.

One significant step 麻豆原创 has taken is to establish the 麻豆原创 Critical Data Cloud a fully managed service capable of powering the operations of government and regulated industries across both Australia and New Zealand. This is designed to help protect the core business applications of governments and highly regulated industries including financial services, healthcare and utilities. The platform is designed to meet the Australian Government鈥檚 Official: Sensitive and Protected information standards.

Opportunity for Utilities Organisations

麻豆原创 Critical Data Cloud is a significant investment recognising the increased focus on improving whole-of-economy cybersecurity.

Leveraging its work with 麻豆原创 National Security Services (NS2), 麻豆原创 Critical Data Cloud is tailored for Australian and New Zealand legislative requirements. It empowers public and private customers to rapidly and safely digitise customer, citizen and employee services, while remaining current with legislation and policy.

Utilities organisations will be able to wrap an increased layer of security around their customer data, asset and employee information to help protect against the style of attack seen in places like Costa Rica.

Learn more about 麻豆原创 Critical Data Cloud visit our and download the report on

 

The post The Impact of Cyber Attacks on the Utilities Sector in Australia appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>
麻豆原创 Critical Data Cloud to launch in Australia and New Zealand /australia/2021/04/28/sap-critical-data-cloud-to-launch-in-australia-and-new-zealand-2/ Wed, 28 Apr 2021 08:46:40 +0000 /australia/?p=4829 Hardened platform to deliver local cloud services designed for听government and regulated industries Canberra, Australia听鈥斕槎乖 SE听(NYSE: 麻豆原创) today announced听麻豆原创 Critical Data Cloud, a fully managed service...

The post 麻豆原创 Critical Data Cloud to launch in Australia and New Zealand appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>

Hardened platform to deliver local cloud services designed for听government and regulated industries

Canberra, Australia听鈥斕听(NYSE: 麻豆原创) today announced听麻豆原创 Critical Data Cloud, a fully managed service capable of powering the operations of government and regulated industries across both Australia and New Zealand

This is designed to help protect the core business applications of governments and highly regulated industries including financial services, healthcare and utilities. Planned to be operational in the second half of 2021, the platform is intended to support the Australian Government鈥檚听Official: Sensitive听and听Protected听information, enabling customers to make faster, more informed decisions and with greater peace of mind.

麻豆原创 Critical Data Cloud is a significant investment recognising the increased focus on improving whole-of-economy cybersecurity. The hardened platform provides customers the full functionality of 麻豆原创鈥檚 multi-tenanted cloud applications. 听It is initially available for human resources (麻豆原创 SuccessFactors) and 麻豆原创鈥檚 full suite of finance, analytics and machine learning applications (麻豆原创 Business Technology Platform, 麻豆原创 Analytics Cloud and 麻豆原创 S/4HANA).

In addition to providing customers with the constantly evolving benefits of contemporary business cloud applications, 麻豆原创 Critical Data Cloud enables customers to extend functionality within the same certified framework. Importantly it also supports secure integration to other systems, for example public cloud, bespoke applications.

麻豆原创 Critical Data Cloud services and applications are continuously reviewed and hardened to ensure they stay current and are projected to meet evolving government security policy requirements. Customers are offered transparent assurance that data remains supported by appropriately cleared personnel.

鈥淭he legislative environment and cyber considerations in both Australia and New Zealand require organisations of different sizes to think hard about moving to cloud,鈥 Damien Bueno, President and Managing Director, 麻豆原创 Australia and New Zealand said.

鈥淚n support of those pursuing a cloud agenda, 麻豆原创 is providing a service that puts all its software and service assets in an environment that exhibits the cloud and security characteristics needed to meet the legislative and security requirements of government.

鈥淎s a global enterprise provider and supporter to some of the world鈥檚 largest organisations, we鈥檝e looked at how to drive efficiencies and provide customers with the capacity to deliver the sovereignty, security and confidence they need from a trusted platform. This follows the launch of听, providing customers with everything they need to transform their organisation in a way that works best for them.鈥

Richard Bergman, Lead Partner for EY鈥檚 Oceania Cybersecurity, privacy and trusted technology practice, said, 鈥淧lanned changes to the Security of Critical Infrastructures Act and the increasing prevalence of foreign interference targeting the Australian public and private sector are driving an increasing need for sovereign cloud and security solutions and services.鈥

鈥溌槎乖粹檚 approach leveraging hardened patterns and templates is a great way of assisting Australian organisations to combat the increasing threat landscape and changing regulatory requirements,鈥 continued Mr Bergman.

Leveraging its work with听听(NS2), 麻豆原创 Critical Data Cloud is tailored for Australian and New Zealand legislative requirements. It empowers public and private customers to rapidly and safely digitise customer, citizen and employee services, while remaining current with legislation and policy. This reduces the cost and complexity of assessing and certifying multiple systems and platforms.

Visit the听麻豆原创 News Center. Follow 麻豆原创 on Twitter at听.

To find out more about the 麻豆原创 Critical Data Cloud, visit the听.

About 麻豆原创

麻豆原创鈥檚 strategy is to help every business run as an intelligent enterprise. As a market leader in enterprise application software, we help companies of all sizes and in all industries run at their best: 77% of the world鈥檚 transaction revenue touches an 麻豆原创庐 system. Our machine learning, Internet of Things (IoT), and advanced analytics technologies help turn customers鈥 businesses into intelligent enterprises. 麻豆原创 helps give people and organizations deep business insight and fosters collaboration that helps them stay ahead of their competition. We simplify technology for companies so they can consume our software the way they want 鈥 without disruption. Our end-to-end suite of applications and services enables business and public customers across 25 industries globally to operate profitably, adapt continuously, and make a difference. With a global network of customers, partners, employees, and thought leaders, 麻豆原创 helps the world run better and improve people鈥檚 lives. For more information, visit听

About 麻豆原创 NS2

At 麻豆原创 NS2, we support the mission of national security by providing innovative computing, analytics, and cloud solutions. From custom development to secure cloud, and virtually everything in between, 麻豆原创 NS2 powers the secure intelligent enterprise. Learn more at听.

The post 麻豆原创 Critical Data Cloud to launch in Australia and New Zealand appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>
Security versus agility: how do we achieve the best of both worlds? /australia/2021/03/24/security-versus-agility-how-do-we-achieve-the-best-of-both-worlds/ Wed, 24 Mar 2021 00:26:39 +0000 /australia/?p=4738 If 2020 taught us anything, it鈥檚 that the weakest link often defines the strength of a chain. This is likely what a NSW government-sponsored taskforce...

The post Security versus agility: how do we achieve the best of both worlds? appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>
If 2020 taught us anything, it鈥檚 that the weakest link often defines the strength of a chain. This is likely what a NSW government-sponsored taskforce of industry leaders had in mind when they called on federal, state and local governments across Australia last month to .

The taskforce also urged governments to more favourably evaluate proposals or tender bids from companies that adopt cyber security and other risk standards for telecommunications and the internet of things (IoT). Again, they know that without security being front of mind throughout the supply chain, vulnerabilities can creep in.

The taskforce鈥檚 recommendations for federal, state and local government agencies follows in the wake of the government moving to expand the label of 鈥渃ritical infrastructure鈥 and create new security obligations and mandatory reporting for various public and private organisations via the draft legislation on Protecting Critical Infrastructure and Systems of National Significance.

These organisations could face steep penalties if they 诲辞苍鈥檛 answer the call to become deeper partners with Australia鈥檚 government in all aspects of security, particularly cyber.

The government is clearly taking a more holistic approach to cyber security 鈥 and so are enterprises. But this gets tricky once you factor in cloud solutions (Public and Private), whose agility and scalability are increasingly necessary for organisations to capitalise on the value of rich data, streamline distributed operations, realise cost efficiencies and make better use of contemporary and emerging tech.

However, platforms like 麻豆原创 HANA have evolved over a decade to help reconcile some of these tensions. Let鈥檚 take a look at how.

Can cloud solutions complicate security?

Regardless of architecture, security teams have to think carefully about who has access to data and how they鈥檙e accessing it.

Most recently, with on-premise architecture, it was a little more like a traditional building with an entrance and an exit. It鈥檚 a lot simpler to control security when you鈥檙e managing limited entry points. While many or even most cloud providers have robust security measures in place, cloud solutions do come with more entry points.

However, the security of those entry points differs based on public versus private cloud, as well as a wide variety of factors. For instance, within public cloud, there鈥檚 simply a greater number of side doors that require the same level of security. With private cloud, you control who has a door and what you let in and out.

That doesn鈥檛 mean organisations should sacrifice the benefits of all public cloud solutions 鈥 in fact, that might do more harm than good. It just means that security considerations need to govern any decision to bring new cloud extensions or providers into your environment. But ensuring scalable, enterprise-wide solutions is where things can get trickier.

Solutions that marry security with flexibility

In many organisations, elements of information are taken out of core systems and put into other data lakes, repositories or spreadsheets. The same piece of information is not only repeated in multiple areas but also with varying degrees of security applied to each of those different locations. If the weakest link determines the strength of the chain, then this approach means there are far more links whose strength is even harder to control or test.

Solutions like 麻豆原创 HANA, whose 10-year evolution has always been anchored in protecting information and assets, can go a long way to resolving this sort of issue. As an enterprise-scale in-memory database designed to allow end users to have a conversation with their data, HANA caters to large volumes of data and diverse use across a broad user community. The way this can be leveraged for better security is simple: the more information you have in a secure, controlled, unified container, the easier it is to protect that information with centralised security measures.

HANA also enables real-time anonymisation of data displayed in SQL views. This means companies can analyse even the most sensitive and regulated of records 鈥 such as those in healthcare 鈥 while still protecting data and supporting compliance with privacy standards like the European Union鈥檚 General Data Protection Regulation (GDPR).

Solutions like Data Warehouse Cloud are the next evolution in further resolving tensions between innovation and security. It allows organisations to extend secure data environments to secure cloud solutions, combining features of HANA with the rigorous security frameworks provided by a range of hyper-scalers. So, even in complex multi-cloud systems, you can achieve a consistent enterprise-wide data management framework and connectivity to other systems, whether that be public, private, on-premise systems or ubiquitous data sources like IoT devices.

Changing how we think about cyber security

Various types of platforms and architectures can help achieve robust, enterprise-wide security frameworks without sacrificing the benefits of cloud. But strengthening your security posture will also depend on shifting mindsets and educating stakeholders about cyber security and management of risk. There are plenty of business imperatives for this already, but 2021 will see additional regulatory control and incentives as the federal government takes a bigger role in cyber security.

Two big mindset shifts need to happen across all of industry and critical infrastructure sectors. First, when it comes to IT systems and reporting environments, we too often test them based on how we expect them to perform. Particularly from a security perspective, we need an extra level of testing that focuses on what malicious actors want to do and what they鈥檙e going to try. It鈥檚 important to test systems based on how we want them to be used but also how we 诲辞苍鈥檛 want them to be used.

Secondly, we often talk about how to collect data, store data and extend data. Cyber security compels us to ask: what are we going to do with this data? How will people use it? This is particularly crucial now that workers are less tethered to offices or corporate networks. It鈥檚 more important than ever to think about the potential usage of data and truly consider its security risk, ensuring that the device and solution set you鈥檙e using to present or extract that data is genuinely secure.

Major crises and national challenges in 2020 have reinforced the importance of collective success 鈥 when even one element struggles, so does the larger group. It鈥檚 an especially important principle in cyber security, where the tiniest vulnerability can open entire ecosystems to potential harm.

Yet the choice between security and innovation is a false one. Still, the topic is undeniably complex and demands ongoing discussion and thought.

So, what are you doing to protect your organisation while still pushing it forward?

This first appeared on

To find out how 麻豆原创鈥檚 Business Technology Platform can help meet your security needs, visit the .

The post Security versus agility: how do we achieve the best of both worlds? appeared first on 麻豆原创 Australia & New Zealand News Center.

]]>