The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Australia Plans Cybersecurity Reform Following Major Breaches

Australia Plans Cybersecurity Reform Following Major Breaches
Author Image Husain Parvez
Husain Parvez First published on March 02, 2023 Cybersecurity Researcher

On February 27th, Australian government officials conducted a “Cyber Security Roundtable” meeting, chaired by Prime Minister Anthony Albanese, in a bid to counter the growing threat of cyberattacks. Within the meeting, the continued development of a new “National Cyber Security Strategy” was discussed.

In his opening remarks, PM Albanese stated, "Cyber security is national security, it is business security, but it is also personal security for 25 million Australians”.

Highlighting the “rapidly evolving threat” of cyberattacks, the Australian Prime Minister spoke with leaders in the public service and intelligence agencies, as well as independent experts. The goal was to build a cybersecurity strategy that could be scaled for “every level of Government, for every branch of the public service, for every agency and institution, for business, large and small, and for people.”

The meeting resulted from the alarming rise in major cyberattacks across Australia last year, which included telecom giant Optus and health insurance company Medibank Private Ltd. According to the Guardian, around one-third of “Australians had their information held to ransom in the Optus data breach”.The Medibank hack was even more severe, as the 200 GB of breached data included sensitive medical records.

Australia’s Minister of Home Affairs and Cyber Security, Clare O’Neil, has been spearheading this reform in the country’s cybersecurity laws since December 2022 with the “2023-2030 Australian Cyber Security Strategy”. O’Neil said that Australian citizens have suffered “two of the worst data breaches in our nation’s history” and “we must work together to counter these threats, build partnerships and set ourselves up for success.”

O’Neil has announced an “Expert Advisory Board”, to be chaired by “three Expert Leads with extensive industry and government experience”. As a part of the future-proof cybersecurity strategy for Australia, the Federal Government will also appoint a “Coordinator for Cyber Security”, who will work within the Department of Home Affairs.

About the Author

  • Author Image Husain Parvez
  • Husain Parvez Cybersecurity Researcher

Husain Parvez is a Cybersecurity Researcher and News Writer at The How To Guide, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the The How To Guide Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address