Secure your business

Inside the Telstra Security Report 2018

Highlights
  • Properly managed cybersecurity is essential to creating great customer experience and enabling business transformation.
  • The Notifiable Data Breaches scheme and General Data Protection Regulation make securing your customer data more important than ever. 
  • Ransomware costs the Australian economy A$1 billion per year, according to a government estimate.

Find out what you need to know to effectively manage your organisation's risk in 2018.

Cybercrime is growing with industry sources predicting that its global damages will rise to US$6 trillion by 2021 - double its 2015 cost.

Cyber threat is diversifying and expanding, which means you need to take a proactive role in managing your attack surface to innovate, thrive and deliver an exemplary customer experience.

Woman standing in front of a cityscape

To help you better understand this rising risk - and ultimately manage it - we’ve created the Telstra Security Report 2018, which is more comprehensive than ever before. We interviewed over 1,250 security decision makers across 13 countries to build a complete understanding of the challenges facing our customers. 

These challenges are considerable, as Australian businesses were targeted with DDoS attacks and ransomware 2017 at a rate higher than their Asia-Pacific and European counterparts.

Furthermore, growing customer awareness of data privacy and new laws affecting Australian businesses, such as the Notifiable Data Breaches scheme1 and the European Union’s General Data Protection Regulation2 make it more important than ever to keep your customer data safe. 

The report found that the majority of Australian businesses are aware of these laws and operating in compliance, although only a minority routinely tested their incident response plans. 

Driven by the digitisation of the traditionally analogue parts of a business, including building operations, supply chains and surveillance systems, organisations are increasingly approaching cyber and electronic security as one logical security domain. 

As businesses continue to innovate and drive customer experience with IoT, estimates predict the number of connected IoT devices will rise to 18.1 billion by 2022, making a robust converged security policy essential to protecting your marketplace advantage. 

These factors, as well as an increasing engagement with security in the C-suite, are prompting Australian organisations to increase their security spending in the coming year, in absolute terms and as a percentage of their ICT budget. 

1On February 22nd, the Notifiable Data Breaches Scheme amendment to the Privacy Act 1988 came into effect, requiring businesses with an annual turnover of $3 million or more (among others) to notify customers when data breaches occur involving personal information that is likely to result in “serious harm” to any individual affected. 

2 The General Data Protection Regulation will come into effect on May 25th and requires organisations handling the data of EU citizens to comply with a number of security approaches, with faces of €20 million or 4 percent of global annual turnover for non-compliance.

Access the full Telstra Security Report 2018 to make informed decisions about managing your organisation's risk.

Access now

Related News

Future Ways of Working
Liberate your workforce
Liberate your workforce
Future Ways of Working

A combination of technologies and new approaches to workflow, Future Ways of Working (FWoW) are the building blocks of effective workplace collaboration and an important compon...

man working from his car
Liberate your workforce
Liberate your workforce
Working smart and mobile in 2018

To thrive and stay innovative, organisations need to embrace agile, mobile-focused ways of working. We all know that being chained to your desk and dealing with antiquated syst...

Architect at construction site
Optimise your IT
Optimise your IT
QBCC embraces the benefits of hybrid cloud

To promote organisational flexibility, the Queensland Building and Construction Commission made the switch to a hybrid cloud solution. Find out how the project was completed ah...

People pointing to a computer screen
Optimise your IT
Optimise your IT
Why your organisation needs SD-WAN

Discover why SD-WAN technology is an increasingly attractive choice for rolling out services and applications across an enterprise. With flexibility, speed and a reputation fo...