Powered by MOMENTUM MEDIA
Powered by MOMENTUM MEDIA

Website Notifications

Get notifications in real-time for staying up to date with content that matters to you.

Ministers respond to Chinese cyber-enabled IP theft

cyber security capabilities

Home Affairs Minister Peter Dutton and Minister for Foreign Affairs Marise Payne responded to concerns about a global campaign of cyber-enabled commercial intellectual property theft by a group known as APT10, acting on behalf of the Chinese Ministry of State Security.

Home Affairs Minister Peter Dutton and Minister for Foreign Affairs Marise Payne responded to concerns about a global campaign of cyber-enabled commercial intellectual property theft by a group known as APT10, acting on behalf of the Chinese Ministry of State Security.

The sustained cyber intrusions by APT10 were significant and focused on large scale managed service providers (MSPs) – specialist companies that manage IT services and infrastructure for many medium to large businesses and organisations, both in Australia and globally.

Advertisement
Advertisement

When it is in the nation's interests to do so, Australia publicly attributes cyber incidents, especially those with the potential to undermine global economic growth, national security and international stability.

In the statement, the ministers called on all countries – including China – to uphold commitments to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining a competitive advantage. These commitments were agreed by G20 Leaders in 2015. Australia and China reaffirmed them bilaterally in 2017.

The worldwide cyber security compromise serves as a reminder that all organisations must remain vigilant about security and that organisations such as MSPs must be responsible and accountable to those they serve.

SPONSORED CONTENT

 

The Australian Cyber Security Centre (ACSC) has issued advice on concrete steps that MSPs and their clients can take to limit their exposure and protect their information.

This ACSC recommends eight key strategies, including:

  • Application whitelisting – to control the execution of unauthorised software;
  • Patching applications – to remediate known security vulnerabilities;
  • Configuring Microsoft Office macro settings – to block untrusted macros;
  • Application hardening – to protect against vulnerable functionality;
  • Restricting administrative privileges – to limit powerful access to systems;
  • Patching operating systems – to remediate known security vulnerabilities;
  • Multi-factor authentication – to protect against risky activities; and
  • Daily back ups – to maintain the availability of critical data.

The full ACSC Australian government Information Security Manual and additional resources to enhance your organisation's cyber security resilience are available here

Ministers respond to Chinese cyber-enabled IP theft
Cyber-Security-Capabilities.jpg
lawyersweekly logo

more from defence connect

May 26 2020
Secretary Pompeo’s warnings shouldn’t fall on deaf ears
Over the weekend, US Secretary of State Mike Pompeo levelled a stark and foreboding warning to Austr...
May 26 2020
EOI sought for next-gen maritime electronic warfare capabilities
Defence is seeking expressions of interest to support the research and development of next-generatio...
May 26 2020
USAF Indo-Pacific bombers demonstrate prompt strike capacity
Despite growing concerns about the continued presence of US strategic bombers at Guam, a flight of t...
FROM THE WEB
Recommended by Spike Native Network