IT Security for Australian businesses needs to be introduced at the network design stage and flow through deployment cycle to counter the increasing risk of cyberattack.
UXC managing director, Cris Nicolli, said security needed to be introduced at the outset of network design and be included in all phases of network deployment and integration.
"It is often assumed that data networks are safe but, as the list of organisations affected by cyber-attacks continues to grow, it is clear that no company is immune," he said.
"To be protected from a data network breach, cyber-attack or innocent routing error, organisations need strong encryption solutions.
He said robust encryption of network transmitted data should be a key component of data security plans.
“In the event of a successful network breach, dedicated hardware-based encryption ensures that the data in unauthorised hands is useless.”
The call comes as organisations faced increased pressure from customers, shareholders and other key stakeholders to guarantee the security of their sensitive data.
Senetas chief executive Andrew Wilson said that data classifications were another key component to protecting sensitive information, providing greater transparency and fostering public trust.
“All companies possess and transmit data that could be considered sensitive and global research shows that businesses – big and small - are failing to acknowledge the true costs of a data breach, which stretch beyond regulatory penalties," he said.
"A national policy outlining the classification of data and data breach notification legislation would hold businesses accountable in protecting their stakeholders’ sensitive information and ensure Australia can remain competitive in international markets in which similar classifications have already been enacted.”
The Telsyte Australian Digital Workforce Study found data security was of particular importance for multi-site enterprises as well as remote and mobile workers, as these work environments created additional risks.
"The use of personal devices in the workplace is now very pervasive with nearly 45 per cent of Australian organisations with more than 20 employees allowing BYOD (Bring Your Own Device)," the report said.
"Smartphones (94 per cent) and tablets (85 per cent) are the leading types of personal devices in use for work and sales and marketing and senior management are the leading roles adopting BYOD."
Wilson said too many organisations simply take a ‘tick the box’ approach to risk management for one of their most valuable assets – information.
“The rapid growth in the use of business technology, such as Cloud and data centre services, big data and CCTV, is exposing businesses to potentially catastrophic risks including loss of trust and brand integrity as well as loss of valuable intellectual property if the right encryption and classification is not in place.”
Nicolli said: “A comprehensive, integrated network that includes data encryption will protect sensitive information and ensure there are no weak points in the network that can be infiltrated.”