New Zealand Business Has Increased Cybersecurity Spending, Not Expertise

State-sponsored cyber-attacks have risen 10 per cent in the last financial year, and a survey of New Zealand's most significant organisations has returned a mixed picture when it comes to resilience against such threats. All the while, total recorded cyber incidents had dropped; a statistic that had piqued the interest of the spy agencies.

As the NZ National Cyber Security Centre (NCSC) progressed the rollout of its new "Malware Free Network" capability, or the affectionately-named "son of Cortex", it was advising organisations to be aware of a "shift in the cyber threat landscape".

Director of the NCSC Lisa Fong said the rise of state-sponsored activity, cyber-attacks known to have originated within a foreign government, was "notable, certainly".

The NCSC is a branch of the external spy agency the NZ Government Communications Security Bureau (GCSB), which works directly with New Zealand's "organisations of national significance" to protect against cyber threats. It recently carried out a high-level survey of 250 nationally significant organisations, which revealed a marked increase in security spending on tools, but less so on expertise.

Only 19 per cent of those organisations had a dedicated chief information security officer and 39 per cent did not provide any cyber security reporting to senior management. A further 33 per cent had fully identified their "critical information assets".

"If an organisation is unclear about what its most critical assets are, it is difficult to be confident they are protected," the survey said.

But 73 per cent of all organisations had increased their cyber security spending in the last year. It was encouraging in terms of the awareness of risk, but the NCSC would like to see a bigger spend on personnel and training.

"There has been an increase in spending, but largely that's gone on tools. Where we see the need is investment alongside those tools, because they won't be able to analyse their systems for instance, that won't produce effective reporting to your board," said Fong.

While the NCSC would not comment on what agencies were deemed "nationally significant", it included a range of critical Government departments as well as private companies that provided national services, were economically significant, or had access to nationally sensitive information.

Fong would not be drawn on which states had been responsible for the rise in cyber-attacks in this country.

"We don't talk about specific actors unless we're prepared to publicly attribute. Part of the reason for that is that we can hold our hand to make sure we can keep detecting and remediating."

In December 2018 the GCSB took the rare step of joining its Five Eyes allies - the United States, Canada, the United Kingdom and Australia - in naming China as being behind a major global attack.

Most went unattributed, however.

"The decision to publicly attribute isn't a decision we make alone. It's a multi-agency process and of course, ministers and the Prime Minister will make that choice," said Fong.

Cyber-attacks on New Zealand companies were primarily focused on financial crime or espionage, but recent state-sponsored campaigns like Russia's disinformation attack during the US presidential election also had authorities here paying attention.

Malware Free Networks took it a step further.

"What we're trying to do is take our understanding of what we are learning through those accesses or those relationships, and make sure we can push those out to as many different nationally significant organisations as possible.

"So what we're hoping to do is work with Internet service providers - and we're mid-project - to develop a capability that will allow us to proactively detect potential incidents before they occur," Fong said.

Outsourcing of supplies, and the "Internet of Things" were two emerging areas of weakness as technology progressed.

The "Internet of Things" referred to increasing connectivity between devices that powered homes, buildings or entire networks, they effectively created a wider "surface area" for potential attacks.

The development of a 5G network also fell under that category.

"What that presents is both opportunity - you get your driverless cars, you get your medical devices, because you can rely on the quality of the internet.

"It also represents potential vulnerability."

The Government and the GCSB were working through an application from telco Spark, which wants Chinese telecommunications company Huawei to build its new 5G network in New Zealand. The application was initially rejected by the bureau, which has the power under New Zealand law to exert such vetoes when it comes to nationally-sensitive infrastructure.

Huawei's relationship with the Chinese Government, paired with a law change last year, that many western countries perceive to mean that Government could compel Chinese companies to spy, is understood to be a major driver in the GCSB's decision. Similar decisions had either already been taken, or were being considered, by other Five Eyes countries.

Stuff

You Might Also Read:

In New Zealand, Hacking Is A Serious Business:

« Could An AI Arms Race Lead To Accidental War?
Apple ‘Subscription Confirmation’ Phishing Scam »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Cyber Security Raad (CSR) - Netherlands

Cyber Security Raad (CSR) - Netherlands

The Cyber Security Council (CSR) is a national, independent advisory body of the Dutch government undertaking efforts at strategic level to bolster cyber security in the Netherlands.

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

Office of the Government Chief Information Officer (OGCIO) - Hong Kong

OGCIO supports the development of community-wide information technology infrastructure and setting of technical and professional standards to strengthen Hong Kong’s position as a world digital city.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

BlackRidge Technology

BlackRidge Technology

BlackRidge Technology develops, markets and supports a family of products that provide a next generation cyber security solution for protecting enterprise networks and cloud services.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Intracom Telecom

Intracom Telecom

Intracom Telecom is a global telecommunication systems & solutions vendor offering a complete range of professional services and solutions including Information Security.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.