Have Your Say on Australia’s 2020 Cyber Security Strategy

In early September 2019, the Australian Government released a public discussion paper seeking views about priorities for the Australian 2020 Cyber Security Strategy.

The Department of Home Affairs wants to seek as many views as possible about the way to best protect Australian families, businesses and critical infrastructure from cyber threats.

What is Cyber Security?

According to Wikipedia, computer security, cyber security or information technology security is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Cost of Cybercrime in Australia

It is estimated that cybercrime cost the Australian economy $1 billion in 2018.

According to Accenture’s latest Cost of Cybercrime study, data loss and business disruption were the biggest expense resulting from attacks, making up three-quarters of the overall cost to Australian companies.

How to Contribute to the Australian 2020 Cyber Security Strategy

Strengthening Australia’s cyber security has never been more important to our economic prosperity and national security, and there are a number of ways you can contribute, including:

1. Contribute to the Discussion Paper

You can contribute your views by submitting a response to the questions posed in the Australia’s 2020 Cyber Security Strategy Discussion Paper.

2. Attend the Open Forum

The Department of Home Affairs and the Australian Signals Directorate’s Australian Cyber Security Centre are holding a series of open forums, including one in Brisbane on Friday 18 October 2019 to support the development of Australia’s 2020 Cyber Security Strategy.

Find out more and register for the forum.

How to Protect Your SME Business from Cyber Crime

The Australian Cyber Security Centre (ACSC) has developed prioritised mitigation strategies to help organisations mitigate cyber security incidents caused by various cyber threats. The most effective of these mitigation strategies are known as the Essential Eight, created by the ACSC.

Surety IT recommends all SME businesses confirm to the Essential Eight. Contact Us today to discuss how we can help you confirm the Essential Eight to protect your business from cyber crime.

Contact Us

This field is for validation purposes and should be left unchanged.

Find out how we can help with your IT challenges.

About the author:

Picture of Ash Klemm

Ash Klemm

Ash has over 20 years of experience in sales and marketing. His journey from a casual salesperson at Chandlers to State Manager at a national IT distribution company, while battling health issues, including a double lung transplant in 2015, gave him the experience, know-how, tenacity, and marketing insight, to find solutions and help businesses grow. After spending several years in the ivory tower of state management, Ash missed the genuine connection of face to face meetings and helping make a difference to businesses in need. His authentic, conversational, and easy-going nature helps our customers feel at ease and shows them we are a brand to trust. Ash spends his days advocating for our customers to ensure they receive the best possible service in a timely fashion. Ash is also the in house chair builder. His curiosity and natural problem-solving ability make him the perfect first call for all our new customers to help determine what is wrong, how Surety IT can help and what the best solutions are moving forward.
Scroll to Top