![Data is at the heart of today’s government services. This is reflected in the federal government’s Data and Digital Government Strategy (the Strategy), which highlights its goal to use data, analytics, and technology to deliver simple, accessible services for people and businesses by 2030. As noted in the strategy, Australians expect personalised, integrated, and easy-to-use services from government entities they engage with. Such personalisation, especially across digital channels, is heavily dependent on data. Delivering such services becomes more effective when the data is more accurate and up-to-date. This is where real-time data comes into play. Why? Real-time data is more accurate because it is always up-to-date. This, in turn, improves the customer experience by enabling services to be more dynamic and interactive. However, because batch processing still accounts for the majority of data processing in government ranks, even the most recent data may become outdated when used to deliver government services. Engage with data in motion Batch processing is when the processing and analysis happen on a set of data that has already been stored for a period of time. This may be days, weeks, or even months, which just doesn't cut it for delivering dynamic and interactive citizen services. In recent years, data streaming has emerged as the technology that allows organizations to tap into their data in real-time in order to improve citizen engagement and experience. Event streaming, another name for data streaming, describes the continuous flow of data as it occurs. This enables true real-time processing and analysis for immediate insights. Streaming data distinguishes itself from batch processing by delivering the most up-to-date information when required. Apache Kafka, one of the most successful open source projects, is used by over 70% of Fortune 500 companies today and is well recognised as the de facto standard for data streaming. The open-source nature of Kafka lowered the entry barrier for working with streaming data, allowing companies to easily build use cases and solutions. However, as with all open-source software, there are limitations. Companies often end up spending more to efficiently manage, scale, secure, and evolve the streaming infrastructure. Why are we still using batch processing if data streaming is the future? Batch processing is still simpler to implement than stream processing, and successfully moving from batch to streaming requires a significant change to a team’s habits and processes, as well as a meaningful upfront investment. That is why Confluent has rearchitected Kafka to create a complete platform that provides a fully managed, cloud-native data streaming solution with the ability to turn data events into outcomes, enable real-time apps, and empower teams and systems to act on data instantly. Personalised for the people Confluent’s ability to utilise data as a continually updating stream of events rather than discrete snapshots means that public sector organisations can leverage data streaming to improve citizen engagement by offering personalised, data-driven services and insights. Confluent’s data streaming platform also enables real-time monitoring and analysis of government services and infrastructure, allowing public sector entities to quickly respond to critical events such as natural disasters or public health emergencies. At a more mundane level, Confluent supports data sharing and collaboration among government agencies, facilitating the seamless exchange of information to serve the public better and optimise resource allocation. And, importantly for government organisations, Confluent’s data streaming capabilities can enhance cyber security by detecting and mitigating threats in real time and safeguarding sensitive government data—a critical element in maintaining our national security. Indeed, 53% of Australian businesses surveyed in a recent Confluent study cited security and compliance awareness as the most applicable use cases for data streaming. It should come as little surprise, then, that industry analyst firm Forrester views Confluent as “an excellent fit for organisations that need to support a high-performance, scalable, multi-cloud data pipeline with extreme resilience.” Streamlining service improvement Data streaming is driving greater efficiency in more than three of four companies across Asia Pacific, according to Confluent research. Meanwhile, 65% of IT leaders polled see significant or emerging product and service benefits from data streaming. With this in mind, the potential for the government to do more with its data is clear, and personalisation is top of mind. Personalising citizen service experiences requires knowing who a customer is at any given moment. This is made possible by accessing data in motion, especially across multiple touchpoints. At the very least, this can help citizens avoid having to provide the same information over and over again as they interact with government agencies. And now, with Confluent assessed under the Australian Information Security Registered Assessors Programme (IRAP), government agencies with an Information Security Manual PROTECTED level requirement can use Confluent Cloud across Amazon Web Services (AWS), Google Cloud, and Microsoft Azure. Australian government agencies will then be able to gather and share data across departments, offices, and agencies securely and at scale. This means even more government agencies will be able to tap data in motion to integrate information across their applications and systems in real time and reinvent employee and citizen experiences for the better.](https://publicspectrum.co/wp-content/uploads/2024/05/Confluent-Advertorial.png)
Recent data breaches have highlighted the importance of strong cybersecurity measures for Australian businesses, emphasising the increased risks and challenges they face in safeguarding sensitive information. As cyber threats rise, it becomes increasingly clear that strict safeguards are necessary. The importance of these breaches stems from their ability to potentially expose sensitive information, which can put business operations and customer trust at risk.
There has been a significant increase in data breaches in Australia, with a particular focus on the financial and healthcare sectors. In the year 2020, there has been a notable increase in data breaches, with a total of 2,784 incidents reported by the Office of the Australian Information Commissioner (OAIC). These breaches have infiltrated different sectors, revealing weaknesses across industries and underscoring the widespread presence of cyber threats in the Australian business landscape.
In the second half of 2022, the Office of the Australian Information Commissioner (OAIC) reported a significant increase in breaches. These breaches have had a widespread impact, affecting the personal information of millions of Australians. Criminal attacks and human error have contributed to the increase in breaches.
In the latter half of 2023, the OAIC documented 38 data breaches that had a significant impact on government agencies. This marks a notable shift as government agencies have returned to the ‘top five’ sectors in terms of breach numbers, a position they haven’t held in nearly three years. The scale and frequency of these breaches indicate the urgent need for strong cybersecurity measures and proactive risk management strategies within Australian businesses.
There has been a notable increase in data breaches in Australia, with two major incidents recently affecting businesses. In May 2019, Canva, an Australian tech company, experienced a significant data breach that impacted 137 million users. The security breach resulted in the exposure of highly sensitive information, such as usernames, real names, and email addresses. In March 2023, Latitude, a financial service provider, faced a major breach of privacy that affected more than 14 million individuals in Australia and New Zealand.
An extensive data breach has resulted in the exposure of highly sensitive information, encompassing individuals’ complete names, residential addresses, contact numbers, dates of birth, driver’s licence details, and passport numbers. In addition to these well-known cases, there have been significant security breaches that have made an impact on the Australian business scene, indicating the need for strong cybersecurity measures.
An example of a cyberattack. This attack had an extensive effect on a large number of customers, as it compromised their sensitive information and undermined their confidence in the security of digital transactions. In addition, the Blackbaud data breach has had major consequences for numerous organisations, indicating the extensive repercussions of cyber attacks and the urgent need for increased vigilance.
The Australian government is taking proactive measures to address the increasing cybersecurity threats by undertaking a thorough review of its frameworks and policies. By 2030, the government aims to establish itself as a global powerhouse in the field of cybersecurity. To achieve this, the government has developed a roadmap known as the 2023–2030 Australian Cyber Security Strategy. Six crucial areas, known as “cyber shields,” centre the strategy.
These variables include strong businesses and individuals, secure technology, effective sharing and prevention of threats, protected critical infrastructure, national capabilities, resilient regions, and international prominence. Every shield enhances the level of protection against cyber threats and prioritises the well-being of Australian citizens and businesses. To ensure the safety of the nation, the government is taking a comprehensive approach to cybersecurity, prioritising support for civilians and industry.
Its primary goal is to address and take concrete steps towards resolving the cybersecurity concerns that are of utmost importance to Australian communities and businesses. Nevertheless, these government initiatives merely elevate the standard level of security. It is key for every business to uphold and enhance their data breach prevention controls. This approach illustrates the significance of collaborations between the public and private sectors in strengthening Australia’s cybersecurity resilience.
Supply chains present notable cybersecurity risks due to their interconnected nature. The risks arise from the intricate and interconnected system that involves the design, manufacturing, distribution, deployment, use, maintenance, and management of products and services on a global scale. There are several potential risks that businesses need to be aware of.
These threats can include the presence of counterfeit products, unauthorised production, tampering, theft, and the introduction of malicious software and hardware. Inadequate manufacturing and development practices in the cybersecurity-related aspects of the supply chain further exacerbate these risks. Due to the numerous sources of components and software typically used in a final product, the global supply chain exposes companies and consumers to cybersecurity threats.
An international collaboration may have been involved in the creation of a device, with different components sourced from various locations across the globe. Different companies may have assembled these components. In order to effectively address these risks, organisations must prioritise the maintenance of the supply chain’s integrity, security, quality, and resilience. One important aspect is to analyse, evaluate, and minimise the potential risks that arise from the widespread and interconnected nature of ICT/OT product and service supply chains.
Data breaches heavily impact businesses and their financial burden. Over the past five years, the cost of a data breach has increased significantly by 12%, reaching an average of $3.92 million. Small and midsize businesses bear a significant burden when it comes to this expense, as those with fewer than 500 employees experience losses exceeding $2.5 million. The expenses incurred extend beyond the immediate aftermath of a security breach. The majority of data breach costs, approximately 67%, accumulate within the first year following a breach.
Another 22% of costs accrue in the second year, with an additional 11% occurring more than two years after the breach. Long-term costs may arise, such as a potential loss of competitive advantage, a decrease in credit rating, and higher cyber insurance premiums. The financial sector is at high risk, as data breaches can be extremely costly, with an average cost of $5.72 million in 20213. These costs underscore the importance of businesses investing in cybersecurity and resilience-building initiatives.
Businesses in Australia should not overlook the significant financial impact that data breaches have. The increasing costs associated with data breaches, along with the potential for legal consequences, regulatory penalties, and damage to one’s reputation, underscore the importance of implementing strong preventive measures. In addition, failure to comply with data protection regulations can result in significant penalties, placing an additional financial burden on affected organisations.
Australian businesses face a multitude of new challenges in the ever-changing world of cybersecurity threats. In order to overcome these obstacles, businesses need to stay alert and adjust their cybersecurity strategies accordingly. Staying up-to-date on emerging threats and investing in the latest technologies and best practices can help businesses reduce the risks of data breaches and protect their financial stability and reputation in today’s digital landscape.
Justin Lavadia is a content producer and editor at Public Spectrum with a diverse writing background spanning various niches and formats. With a wealth of experience, he brings clarity and concise communication to digital content. His expertise lies in crafting engaging content and delivering impactful narratives that resonate with readers.