{"id":43280,"date":"2023-03-24T14:44:18","date_gmt":"2023-03-24T04:44:18","guid":{"rendered":"https:\/\/www.geeks2u.com.au\/?p=43280"},"modified":"2023-10-25T10:46:29","modified_gmt":"2023-10-25T00:46:29","slug":"data-breaches-what-to-do-if-your-business-suffers-a-data-leak","status":"publish","type":"post","link":"https:\/\/www.geeks2u.com.au\/geekspeak\/data-breaches-what-to-do-if-your-business-suffers-a-data-leak\/","title":{"rendered":"Data Breaches: What to do if your business suffers a data leak\u00a0"},"content":{"rendered":"\n<p>Data breaches have been in the news a lot lately, with large-profile breaches hitting <a href=\"https:\/\/www.acma.gov.au\/optus-data-breach\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/www.acma.gov.au\/optus-data-breach\">Optus <\/a>and <a href=\"https:\/\/www.medibank.com.au\/health-insurance\/info\/cyber-security\/customer-notice\/\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/www.medibank.com.au\/health-insurance\/info\/cyber-security\/customer-notice\/\">Medibank <\/a>of particular concern to many Australian consumers.&nbsp;<\/p>\n\n\n\n<p><strong>But are they just a concern for really big enterprises on the scale of an Optus or a Medibank?&nbsp;<br>The simple answer is no.<\/strong><br><br>The value of the data in those breaches was large because of their scale, but they could have occurred to any business that has to collect data.&nbsp;If you have customer addresses (email or real world) or banking details on file, you\u2019re collecting data \u2013 and that means nearly every business will have a risk of some sort.&nbsp;<\/p>\n\n\n\n<p>The reality is that personal data has value, and if you need to collect that data for any reason, you need to be aware of the potential for a data breach from your business, and what you should do if the worst happens.&nbsp;<\/p>\n\n\n\n<div class=\"image-text image-text--grey \">\n  <div class=\"image-text__inner image-text__inner--right\">\n    <div class=\"image-text__img\">\n      <img decoding=\"async\" src=\"https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2023\/03\/small-business-shutterstock_1503786101-e1618260246766.jpg\" alt=\"What is a data breach?\u00a0\" title=\"What is a data breach?\u00a0\"\/>\n    <\/div>\n    <div class=\"image-text__content\">\n      <h2 class=\"image-text__title\">What is a data breach?\u00a0<\/h2>\n      <div class=\"image-text__txt\">\n        <p>In the online context, a data breach occurs when any data that\u2019s meant to be inherently private, and especially data that can be used to identify individuals is accessed by anyone who doesn\u2019t have the right to access or distribute that information.\u00a0 That could include your business financial records, customer databases, or any other information that could be used for identity theft, blackmail or other illegal purposes.\u00a0<\/p>\n      <\/div>\n      <br \/>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How do data breaches happen?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Typically they\u2019re the result of a weak link in your business security. That could be the use of unpatched or insecure software that connects online in some way, or social engineering tricking you or your employees into giving access to cyber criminals.&nbsp;<\/p>\n\n\n\n<p>These attacks can come in a variety of forms, from fake emails informing employees that their email or financial access is about to be withdrawn unless they log in, leading to fake websites that grab their login information, or software that probes at the security layers around your business to try to exploit known or emerging software weaknesses.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are my obligations if a data breach happens?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>There\u2019s a line here between your legal obligations, and what you really ought to do.&nbsp;&nbsp;<\/p>\n\n\n\n<p>I should preface this by saying that I\u2019m not a lawyer and this does not constitute legal advice; the issues here are complex and if you\u2019re concerned it\u2019s well worth seeking out the advice of a legal professional for your particular circumstances.&nbsp;<\/p>\n\n\n\n<p>In broad terms, however, under the current <a href=\"https:\/\/www.legislation.gov.au\/Details\/C2021C00139\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/www.legislation.gov.au\/Details\/C2021C00139\">Australian Privacy Act<\/a>, which dates from 1988, if your business turnover is under $3 million per year, in many cases you\u2019re classed as a small business, and your obligations are a little different to larger businesses.<\/p>\n\n\n\n<p>If your turnover does exceed $3 million however and a breach occurs, you need to work within the notifiable <a href=\"https:\/\/www.oaic.gov.au\/privacy\/notifiable-data-breaches\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/www.oaic.gov.au\/privacy\/notifiable-data-breaches\">data breaches scheme<\/a> to inform both individuals involved and the OAIC (Office of the Australian Information Commissioner) about the breach.<\/p>\n\n\n\n<p>Those obligations also currently apply to specific business sectors; if your business is in private sector health care, specific financial services (especially providing credit), if you work as a contractor for the Australian government or if you have some form of residential tenancy database, you\u2019re also covered by the current version of the privacy act.&nbsp;<\/p>\n\n\n\n<p>If you\u2019re unsure, the OAIC has a small business <a href=\"https:\/\/www.oaic.gov.au\/privacy\/privacy-for-organisations\/small-business)\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/www.oaic.gov.au\/privacy\/privacy-for-organisations\/small-business)\">checklist here <\/a>that can run you through whether your business may be currently obliged under the Privacy Act.<\/p>\n\n\n\n<p>However, it\u2019s worth noting that at the time of writing this article there are large scale <a href=\"https:\/\/ia.acs.org.au\/article\/2023\/australians-to-be-able-to-sue-for-privacy-breaches.html\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"https:\/\/ia.acs.org.au\/article\/2023\/australians-to-be-able-to-sue-for-privacy-breaches.html\">proposed reforms<\/a> to the privacy act being mooted that could see all businesses, no matter their scale become covered by the privacy act. The logical endpoint of those changes is that it\u2019s highly likely even small businesses will become obliged to report data breaches.<\/p>\n\n\n\n<div class=\"image-text image-text--grey \">\n  <div class=\"image-text__inner image-text__inner--left\">\n    <div class=\"image-text__img\">\n      <img decoding=\"async\" src=\"https:\/\/www.geeks2u.com.au\/wp-content\/uploads\/2023\/03\/beware.png\" alt=\"\" title=\"\"\/>\n    <\/div>\n    <div class=\"image-text__content\">\n      <h2 class=\"image-text__title\"><\/h2>\n      <div class=\"image-text__txt\">\n        <p>As it stands, the OAIC can still investigate customer complaints about privacy breaches from small businesses; it\u2019s just that the adherence to all parts of the privacy act may not apply to a smaller business. <\/p>\n<p>Frankly, while a data breach isn\u2019t something that you actively invite, it\u2019s a good preventative measure to have a data breach plan in place, as well as to generally notify affected individuals so they can prepare and protect themselves in the most suitable manner. <\/p>\n      <\/div>\n      <br \/>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What should I do if my business is hit by a data breach?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>The key thing to do is not delay, because acting promptly can save significant difficulty down the track.&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>If a data breach has occurred, the first thing you should do is try to get a scope for what data has been stolen.&nbsp;This allows you to plan for your next steps, and get as complete a picture as possible as to the implications of the breach. It\u2019s a different matter, for example, if somebody\u2019s email address leaks than if a scan of their driver\u2019s licence does, for example, even though neither are desirable. Document everything that you do and everything you discover.&nbsp;<\/li>\n\n\n\n<li>Next up, as quickly as possible, plug the data leak, whether that\u2019s a matter of upgrading systems, changing system passwords, educating staff about phishing or replacing hardware that has unfixable or un-patchable security holes.\u00a0\u00a0While the original cybercriminals may have grabbed some data, there\u2019s no telling whether others may come sniffing, so locking the digital front door of your business down tight may prevent future headaches.\u00a0<em>Not sure how to plug the leak? <a href=\"https:\/\/www.geeks2u.com.au\/contact-us\/\">Don&#8217;t hesitate and call Geeks2U<\/a> who can send an expert technician to help fix any security issues hackers are abusing.<\/em><\/li>\n\n\n\n<li>Then comes the issue of notifying the OAIC and individuals as required, as well as a more forensic investigation of what\u2019s happened and why. This becomes more complex if your business operates outside Australian jurisdictions, as other privacy obligations may come into play.&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Liability around breaches varies \u2013 and is somewhat outside the scope of this article \u2013 but the costs can be considerable. Being able to show that while a breach has occurred that you followed best practice to either lock down data or rapidly inform affected individuals may lead to more positive outcomes than if you do little or nothing around a data breach.&nbsp;<\/p>\n\n\n\n<p>If you\u2019ve not been subject to a data breach, you have time right now to consider these steps and whether there are weak links in your network security, business practices or data-keeping ways and come up with a data breach plan to cover how you\u2019d react if the worst happens.\u00a0 <\/p>\n\n\n\n<div class=\"cta-banner cta-banner--red\">\n    <div class=\"cta-banner__inner\">\n    <h2 class=\"cta-banner__title\">Geeks2U can help protect your business from cybercrime<\/h2>\n    <p class=\"cta-banner__text\">Our Digital Security Check service will help to protect your valuable data and minimize security risks now. We find your digital security flaws before the hackers do. Don&#8217;t risk your business&#8217; reputation and book today.<\/p>\n    <div class=\"cta-banner__buttons\">\n      \n              <a href=\"tel:1300759003\" class=\"button  button--black\">\n          <span>\n                          <svg viewBox=\"0 0 32 32\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" preserveAspectRatio=\"xMinYMin\">\n                <use xlink:href=\"#phone\"><\/use>\n              <\/svg>\n                        Call us          <\/span>\n        <\/a>\n      \n      \n      \n      \n      \n      \n      \n      \n              <a href=\"\" target=\"_blank\" class=\"button button--outline\">\n          <span>\n                          <svg viewBox=\"0 0 32 32\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" preserveAspectRatio=\"xMinYMin\">\n                <use xlink:href=\"#click\"><\/use>\n              <\/svg>\n                        Book online          <\/span>\n        <\/a>\n      \n      \n    <\/div>\n  <\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Data breaches have been in the news a lot lately, with large-profile breaches hitting Optus and Medibank of particular concern to many Australian consumers.&nbsp; But&#8230;<\/p>\n","protected":false},"author":5,"featured_media":43293,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-43280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/43280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/comments?post=43280"}],"version-history":[{"count":28,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/43280\/revisions"}],"predecessor-version":[{"id":44987,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/posts\/43280\/revisions\/44987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/media\/43293"}],"wp:attachment":[{"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/media?parent=43280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/categories?post=43280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.geeks2u.com.au\/wp-json\/wp\/v2\/tags?post=43280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}