Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Australia’s New Cyber Security Act: Mandatory Ransom Payment Reporting

    Australia’s New Cyber Security Act: Mandatory Ransom Payment Reporting

    November 28, 2024

    Cyber Security Act

    The Australian government has passed the new Cyber Security Act, which was recently approved by Parliament. One of the most critical provisions of this new law mandates that organizations must report ransomware payments made to hackers within 72 hours. This change is aimed at improving Australia’s cyber resilience and deterring cybercriminals while ensuring that businesses remain accountable for their actions. 

    The Australian Cyber Security Act introduces a host of new requirements for organizations, particularly those impacted by ransomware attacks. Notably, businesses must now notify the Australian Signals Directorate (ASD) within 72 hours if they make a payment in response to a ransomware attack. This move is intended to help the ASD monitor ransomware trends, assess potential threats to national security, and aid in law enforcement’s ability to track cybercriminals. 

    The Australian Cyber Security Act int and the Legal Obligations 

    While the new law emphasizes quick reporting, it does not necessarily absolve organizations from the broader legal obligations associated with paying a ransom. This legislation aims to strike a balance between addressing immediate security concerns and protecting the legal interests of businesses.  

    As part of the Australian Cyber Security Act, the law specifically notes that while payments to cyber criminals are discouraged, there may be exceptional cases where paying a ransom is justifiable. The government strongly advises against ransom payments as it seeks to reduce the financial incentive for cyber criminals and make Australia a less attractive target for cyberattacks. 

    Key Provisions of the Cyber Security Act 

    The 72-hour reporting obligation for ransom payments is one of the most interesting changes under the new Cyber Security Act. Companies—except for small businesses—must now report to the ASD if they make any ransomware payments, regardless of the amount. The law also includes provisions that preserve the company’s legal rights during these notifications, ensuring that it does not automatically waive privileges such as attorney-client communications.

    In addition to reporting ransom payments, new security standards for smart devices will also be enforced under the Act. Manufacturers of Internet of Things (IoT) devices, including televisions, speakers, watches, and doorbells, will be required to meet new security standards. These standards will include secure default settings, unique passwords for each device, and encryption of sensitive data. While the specifics of these requirements are still being finalized, the initiative is a clear effort to address the growing risks associated with the interconnectedness of modern technology. 

    Another notable addition to the Australian Cyber Security Act is the establishment of a Cyber Incident Review Board. This board will be responsible for reviewing major cyber incidents, including ransomware attacks, that impact national security or public welfare. The board will assess how organizations responded to incidents and offer recommendations to improve future responses. However, the board will not assign fault or prejudice the legal rights of the organizations involved. 

    Expanding the Scope of the Security of Critical Infrastructure Act 

    The Cyber Security Act also expands the Security of critical infrastructure Act 2018 (SOCI Act) to cover data systems associated with critical infrastructure. With the increasing dependence on digital systems in sectors such as utilities, healthcare, and finance, these systems have become prime targets for cyberattacks.

    The amendments will allow regulators to ensure better protection for data systems linked to critical infrastructure assets. This change grants authorities’ additional powers to assess and address vulnerabilities that could impact national security or public safety. 

    Organizations that manage critical infrastructure systems must now meet new obligations to protect these systems from cyber threats. This includes preparing for heightened regulatory scrutiny and ensuring their cybersecurity measures are enough to handle increasing threats in this domain. 

    Implications for Organizations and How to Prepare 

    The introduction of the Cyber Security Act will have far-reaching consequences for businesses, particularly those dealing with sensitive information or critical infrastructure. To stay compliant, organizations must strengthen their cybersecurity protocols, especially regarding the mandatory 72-hour reporting obligation for ransomware payments. This may involve refining incident response plans, revising risk management frameworks, and ensuring that employees are trained to handle cyber incidents effectively. 

    Furthermore, companies must be mindful of their broader regulatory responsibilities. In addition to the new reporting requirements under the Australian Cyber Security Act, organizations must continue to comply with existing regulations, such as the Privacy Act and the Security of Critical Infrastructure regime. These regulations are still in effect, and businesses should be aware of how they interact with the new law to ensure comprehensive compliance. 

    Directors of organizations should also take note of their general duty to act in the company’s best interests. This includes weighing the risks associated with making a ransom payment, considering whether it will truly resolve the cyber incident, or if it will only make the organization a future target. The decision to pay a ransom may also expose the company to legal risks under counter-terrorism and anti-money laundering laws. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Future of Serverless Security in 2025: From Logs to Runtime Protection
    Next Article XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-36521 – MicroDicom DICOM Viewer Out-of-Bounds Read Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Clapper Media Player Adds New Features, Official Windows Build

    Linux

    My new favorite travel gadget is an e-reader that looks like a phone (but isn’t)

    Development

    Europol Shuts Down Six DDoS-for-Hire Services Used in Global Attacks

    Development

    Highlights

    IPI_WATCHDOG_TIMEOUT BSoD 0x000001DB [Solved]

    December 7, 2024

    The IPI_WATCHDOG_TIMEOUT Windows blue screen appears when the processor is stuck in an IPI loop…

    CRIL Investigates: LNK Files, SSH Commands, and the Evolution of Cyberattack Techniques

    December 20, 2024

    3 Essential Design Trends, May 2024

    April 25, 2024

    Emergence AI Proposes Agent-E: A Web Agent Achieving 73.2% Success Rate with a 20% Improvement in Autonomous Web Navigation

    July 27, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.