Security Breach – 10 May 2024


Security Breach – 10 May 2024

Every day, businesses everywhere strive to keep the systems and data they manage secure against a wide range of dangerous cyberthreats. With the increasing prevalence of targeted and persistent threats, businesses need to be equipped with tools, resources and intelligence that enable them to stay ahead of adversaries through proactive threat detection. A Security Operations Centre (SOC) is an invaluable asset for securing any organisation.

A SOC is a must to defend against cyberthreats. In a SOC, a centralised team of IT security professionals continually monitor and analyse an organisation’s security systems and data to uncover, detect, investigate and respond to cybersecurity incidents. It offers a multitude of cybersecurity benefits, including proactive threat detection and prevention, improved threat intelligence, reduced risk of attack, incident response coordination and increased visibility.

Recent Breaches


Australia – Monash Health – Health System

Exploit: Supply Chain Cyberattack

Risk to Business: Severe: Monash Health has disclosed that it has experienced a data breach following a data security incident at secure document management firm ZircoDATA. That company fell victim to a ransomware attack by the Black BASTA ransomware group in February 2024. Monash Health said in a statement that its investigation had revealed that the information involved relates to a selection of archived data from the family violence and sexual assault support units at Monash Medical Centre, the Queen Victoria Hospital and Southern Health, limited to the period from 1970 to 1993. Monash Health was quick to reassure the public that its own systems are secure. 

Australia – Firstmac – Mortgage Lender

Exploit: Ransomware

Risk to Business: Severe: Lender Firstmac has confirmed that it has fallen victim to a ransomware attack. The fledgling EMBARGO cybercrime group has claimed responsibility. The hackers claim to have snatched more than 500 gigabytes of data, including databases, source code and sensitive customer data. Customers were informed that they may have had data exposed including name, tax file number, date of birth and contact information.

Talk to a TCT team member today about implementing cyber security plan for your business.

Robert Brown

Related Articles:
Why You Should Consider Vulnerability Management Services
10 Tips to Help Small Businesses