Publication date: 7 February 2019

Download the print version

Key statistics

  • 262 notifications
  • 33% human error
  • 64% malicious or criminal attacks
  • 3% system faults

About this report

This report captures notifications received by the Office of the Australian Information Commissioner (OAIC) under the Notifiable Data Breaches (NDB) scheme between 1 October 2018 and 31 December 2018 (referred to as ‘data breaches’).

The OAIC publishes quarterly statistical information about notifications received under the NDB scheme to assist entities and the public to understand the operation of the scheme.

Where data breaches affect multiple entities, the OAIC may receive multiple notifications relating to the same data breach. Notifications to the OAIC relating to the same data breach incident are counted as a single notification in this report.

The source of any given data breach is based on information provided by the reporting entity. Where more than one source has been identified or is possible, the dominant or most likely source has been selected for statistical purposes. Source of data breach categories are defined in the glossary at the end of this report.

Notifications received from all sectors

Number of breaches reported — All sectors

Chart 1.1 — Number of breaches reported under the Notifiable Data Breaches scheme by month — All sectors

Bar chart from October to December 2018. There were 91 reported breaches in October, 88 in November and 83 in December. Link to long text description follows chart.

Chart 1.1: Long text description

Table 1.A — Number of breaches reported under the Notifiable Data Breaches scheme by quarter — All sectors
Quarter Total number of notifications
January to March 2018*
* As the NDB scheme commenced on 22 February 2018, data is only available for part of the quarter
63
April to June 2018 242
July to September 2018 245
October to December 2018 262

Number of individuals affected by breaches — All sectors

Chart 1.2 — Number of individuals affected by breaches in the quarter — All sectors

Bar chart shows the number of affected individuals by number range. 13 number ranges are displayed. The top 3 are: 63 notifications affected 101 to 1000 individuals; 58 notifications affected 1 individual; and 49 notifications affected 11 to 100 individuals. Link to long text description follows chart.

Note: Where bands are not shown (for example, 500,001 – 1,000,000), there were nil reports in the period. ‘Unknown’ includes notifications by entities whose investigations were ongoing at the time of this report.

Chart 1.2: Long text description

The majority of data breaches in the period involved the personal information of 100 individuals or fewer (60 per cent of breaches).

Breaches impacting between 1 and 10 individuals comprised 41 per cent of the notifications.

Kinds of personal information involved in breaches — All sectors

Chart 1.3 — Kinds of personal information involved in breaches by number of notifications — All sectors

Bar chart shows the kind of personal information involved. There are 6 types in the chart. The top three are: Contact information with 223 notifications, Financial details with 123 notifications and Identity information with 94 notifications. Link to long text description follows chart.

Note: Data breaches may involve one or more kinds of personal information.

Chart 1.3: Long text description

Table 1.B — Kinds of personal information involved in breaches by percentage of notifications – All sectors
Kinds of personal information % of total NDBs received
Contact information 85%
Financial details 47%
Identity information 36%
Health information 27%
TFN 18%
Other sensitive information 9%

The definitions for the above kinds of personal information are contained in the Glossary.

Source of the breaches — All sectors

This chart breaks down the sources of data breaches as identified by notifying entities in all sectors in the quarter.

Chart 1.4 — Source of data breaches by percentage — All sectors

Pie chart shows source of data breaches. There are three - from most to least notifications: Malicious or criminal attack accounted for 64%, Human error for 33% and System fault for 3%. Link to long text description follows chart.

Chart 1.4: Long text description

Malicious or criminal attacks accounted for 168 data breaches this quarter, while human error accounted for 85 data breaches. System faults accounted for nine data breaches.

Malicious or criminal attacks differ from human error breaches in that they are deliberately crafted to exploit known vulnerabilities for financial or other gain. Many cyber incidents in this quarter appear to have exploited vulnerabilities involving a human factor, such as clicking on a phishing email or disclosing passwords.

Human error breaches — All sectors

This chart breaks down the kinds of breaches identified as ‘human error’ in the quarter.

Chart 1.5 — Human error breakdown — All sectors

Bar chart breaks down the human error data breaches. There are 10 types in the chart. The top 2 are: Personal information sent to the wrong recipient (email) with 23 notifications; and Unauthorised disclosure (unintended release or publication) with 15 notifications. Link to long text description follows chart.

Chart 1.5: Long text description

The second largest source of data breaches was human error, with examples including sending personal information to the wrong recipient via email (27 per cent) or mail (12 per cent) as well as unintended release or publication of personal information (18 per cent).

Certain kinds of breaches can affect larger numbers of people. For example, in this quarter data breaches involving human error resulting in the unintended release or publication of personal information impacted the largest numbers of people (an average of 17,746 affected individuals per breach). Failure to securely dispose of records of personal information impacted an average of 300 affected individuals per breach.

Table 1.C — Human error breakdown by average number of affected individuals — All sectors
Kinds of personal information No. of NDBs received Average no. of affected individuals
Unauthorised disclosure (unintended release or publication) 15 17,746
Insecure disposal 2 300
Failure to use BCC when sending email 9 234
PI sent to wrong recipient (other) 3 75
Loss of paperwork/data storage device 12 28
PI sent to wrong recipient (mail) 10 6
PI sent to wrong recipient (email) 23 3
Unauthorised disclosure (failure to redact) 8 2
Unauthorised disclosure (verbal) 1 1
PI sent to wrong recipient (fax) 2 1

Malicious or criminal attack breaches — All sectors

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack’ in the quarter.

Chart 1.6 — Malicious or criminal attacks breakdown — All sectors

Bar chart breaks down the malicious or criminal attack data breaches. There are 4 in the chart. From most to least: Cyber incidents with 114 notifications; Theft of paper or data storage devices with 25; Rogue employee/insider threat with 20; and social engineering/impersonation with 9. Link to long text description follows chart.

Chart 1.6: Long text description

Malicious or criminal attacks were the largest source of data breaches this quarter, accounting for 64 per cent of all data breaches. Of these 168 data breaches, 68 per cent involved cyber incidents such as phishing, malware or ransomware, brute-force attacks, compromised or stolen credentials, and social engineering or impersonation.

Many cyber incidents in this quarter appear to have exploited vulnerabilities involving a human factor, such as clicking on an attachment to a phishing email.

Theft of paperwork or data storage devices was also a significant source of malicious or criminal attacks (15 per cent). Other sources included actions taken by a rogue employee or insider threat (12 per cent), as well as social engineering or impersonation (5 per cent).

Cyber incident breaches — All sectors

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack - cyber incident’ in the quarter.

Chart 1.7 — Cyber incident breakdown — All sectors

Pie chart breaks down the cyber incident data breaches. There are 6 types in the chart. The top 3 are Phishing with 43%; Compromised or stolen credentials through method unknown, with 24%; and Ransomware with 10%. Link to long text description follows chart.

Chart 1.7: Long text description

The majority of cyber incidents were linked to the compromise of credentials through phishing (49 notifications), by unknown methods (28 notifications), or by brute force attack (9 notifications).

System fault breaches — All sectors

This chart breaks down the kinds of breaches identified as ‘system fault’ in the quarter.

Chart 1.8 — System fault breakdown — All sectors

Bar chart breaks down the system fault data breaches. There are two: unintended release or publication of personal information with 8 notifications and unintended access with 1 notification. Link to long text description follows chart.

Chart 1.8: Long text description

System faults accounted for 3 per cent of data breaches this quarter. The majority involved a system fault resulting in the unintended release or publication of personal information. This may include the disclosure of personal information on a website due to a bug in the web code, or a machine fault that results in a document containing personal information being sent to the wrong person.

Comparison of top five sectors that reported breaches in the quarter

This section compares notifications made under the Notifiable Data Breaches scheme by the five sectors that made the most notifications in the quarter (top five sectors).

Top five sectors

Table 2.A — Top five sectors by notifications in the quarter
Top five sectors NDBs received
Health service providers [1] 54
Finance (incl. superannuation) [2] 40
Legal, accounting and management services 23
Education [3] 21
Mining and manufacturing 12

The NDB scheme applies to agencies and organisations that the Privacy Act requires to take reasonable steps to secure personal information. This includes Australian Government agencies, businesses and not-for-profit organisations with an annual turnover of $3 million or more, credit reporting bodies, health service providers, and TFN recipients, among others.

From October to December 2018, the top sector to report notifiable data breaches was the private health service provider sector (health sector) (21 per cent). The second largest source was the finance sector (15 per cent). This was followed by the legal, accounting and management services sector (9 per cent), the private education sector (education) (8 per cent), and the mining and manufacturing sector (5 per cent).

Notifications made under the My Health Records Act 2012 are not included in this report, as they are subject to specific notification requirements set out in that Act.

Source of breaches — Top five sectors

This chart breaks down the sources of data breaches as identified by notifying entities in the top five sectors in the quarter.

Chart 2.1 — Source of data breaches — Top five sectors

Bar chart breaks down source of data breaches in the top five sectors. The 3 sources are system fault, malicious or criminal attack, and human error. Link to long text description follows chart.

Chart 2.1: Long text description

The highest reporting sector this quarter was the health sector (54 notifications). Of those notifications, 54 per cent of reportable data breaches resulted from human error. In contrast, notifications from the second highest reporting sector, finance, indicated that 70 per cent of its data breaches resulted from malicious or criminal attacks.

The legal, accounting and management services sector and the mining and manufacturing sector also reported the majority of breaches resulted from malicious or criminal attacks.

Of the top five sectors, only the finance and education sectors notified a data breach resulting from a system fault.

Human error breaches — Top five sectors

This chart breaks down the kinds of breaches identified as ‘human error’ by the top five sectors in the quarter.

Chart 2.2 — Human error breakdown — Top five sectors

Bar chart breaks down the human error data breaches in the top five sectors. There are 9 types of human error shown. Link to long text description follows chart.

Chart 2.2: Long text description

Malicious or criminal attack breaches — Top five sectors

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack’ by the top five sectors in the quarter.

Chart 2.3 — Malicious or criminal attacks breakdown — Top five sectors

Bar chart breaks down malicious or criminal attacks in the top five sectors. There are 4 types shown - the most common type for all industries is Cyber incident. Link to long text description follows chart.

Chart 2.3: Long text description

Cyber incident breaches — Top five sectors

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack - cyber incident’ by the top five sectors in the quarter.

Chart 2.4 — Cyber incident breakdown — Top five sectors

Bar chart breaks down the cyber incidents across the top five sectors. There are 5 types of cyber incident in the chart. Link to long text description follows chart.

Chart 2.4: Long text description

In line with the overall trend, the majority of cyber incidents reported by the top five sectors were linked to the compromise of credentials through phishing, brute force attacks, or by unknown methods.

System fault breaches — Top five sectors

This chart breaks down the kinds of breaches identified as ‘system fault’ by the top five sectors in the quarter.

Chart 2.5 — System fault breakdown — Top five sectors

Bar chart breaks down system fault data breaches in the top five sectors. Finance had one unintended access breach, and Education had one unintended release or publication breach. Link to long text description follows chart.

Chart 2.5: Long text description

The health sector, the legal, accounting and management services sector and the mining and manufacturing sector did not report any data breaches resulting from a system fault.

Finance (including superannuation) sector report

This section captures notifications made under the NDB scheme by entities in the finance sector, such as banks, wealth managers, financial advisors, superannuation funds, and consumer credit providers (regardless of annual turnover).

Summary — Finance sector

  • 40 notifications
  • 27% human error
  • 70% malicious or criminal attacks
  • 3% system faults

Number of breaches reported under the Notifiable Data Breaches Scheme — Finance sector

Table 3.A — Number of breaches reported under the Notifiable Data Breaches scheme by the finance sector by quarter
Quarter Total number of notifications
January to March 2018*
* As the NDB scheme commenced on 22 February 2018, data is only available for part of the quarter
8
April to June 2018 36
July to September 2018 35
October to December 2018 40

Number of individuals affected by breaches — Finance sector

Chart 3.1 — Number of individuals affected by breaches in the quarter — Finance sector

Bar chart shows the number of affected individuals by number range in the finance sector. 6 number ranges are displayed. The top 3 are: 11 notifications affected 1 individual; 10 notifications affected 2 to 10 individuals; and 9 notifications affected 101 to 1000 individuals. Link to long text description follows chart.

Note: Where bands are not shown, there were nil reports in the period.

Chart 3.1: Long text description

Most finance sector notifications in the period involved the personal information of 100 individuals or fewer (70 per cent of breaches). Breaches affecting between one and ten individuals comprised 53 per cent of the notifications.

Source of the breaches — Finance sector

Chart 3.2 — Source of data breaches by percentage — Finance sector

Pie chart shows source of data breaches in the Finance sector. There are three - from most to least notifications: Malicious or criminal attack accounted for 70%; Human error accounted for 27%; and System fault for 3%. Link to long text description follows chart.

Chart 3.2: Long text description

Malicious or criminal attacks was the source of most notifications from the finance sector this quarter (28 notifications). This may involve a cyber incident, such as a phishing email or malware attack, as well as the theft of paperwork or a data storage device.

Human error was the source of 11 notifications from the finance sector, such as communications sent to the wrong recipient, insecure disposal of personal information, or a failure to properly redact personal information.

Human error breaches — Finance sector

This chart breaks down the kinds of breaches identified as ‘human error’ by the finance sector in the quarter.

Chart 3.3 — Human error breakdown — Finance sector

Bar chart breaks down the human error data breaches in the Finance sector. There are 6 types in the chart. The top 2 are: Personal information sent to the wrong recipient (mail) with 4 notifications; and Personal information sent to the wrong recipient (email) with 2 notifications. Link to long text description follows chart.

Chart 3.3: Long text description

Human error was the second largest source of data breaches from the finance sector. Examples include sending correspondence containing personal information to the wrong recipient by mail (10 per cent of human error notification) or email (5 per cent), and loss of paperwork or data storage device (5 per cent).

Malicious or criminal attack breaches — Finance sector

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack’ by the finance sector in the quarter.

Chart 3.4 — Malicious or criminal attacks breakdown — Finance sector

Bar chart breaks down the Malicious or criminal attack data breaches in the Finance sector. There are 4 types; the top 2 are Cyber incidents with 16 notifications; and Rogue employee/insider threat with 7 notifications. Link to long text description follows chart.

Chart 3.4: Long text description

Malicious and criminal attacks was the leading source of data breaches notified by the finance sector (70 per cent). Of these, cyber incidents were the most common type of attack (57 per cent), followed by rogue employees or insider threats (25 per cent), social engineering/impersonation (11 per cent) and theft of paperwork or data storage device (7 per cent).

Cyber incident breaches — Finance sector

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack — cyber incident’ by the finance sector in the quarter.

Chart 3.5 — Cyber incident breakdown — Finance sector

Pie chart breaks down the cyber incident data breaches in the Finance sector. There are 4 types in the chart. The top 2 are Phishing (compromised credentials) 62%; and Hacking 13%. Link to long text description follows chart.

Chart 3.5: Long text description

The majority of cyber incidents reported by the finance sector were related to compromised or stolen credentials, through phishing (10 notifications), brute-force attacks (2 notifications), and by unknown methods (2 notifications). Hacked websites or systems was the source for 2 notifications.

System fault breaches — Finance sector

One notification in the quarter identified the source of the data breach as a system fault leading to unauthorised access.

Health sector report

This section captures notifications made under the Notifiable Data Breaches scheme by entities in the health sector.

Summary — Health sector

  • 54 notifications
  • 54% human error
  • 46% malicious or criminal attacks
  • 0% system faults

Number of breaches reported under the Notifiable Data Breaches scheme — Health sector

Table 4.A — Number of breaches reported under the Notifiable Data Breaches scheme by the health sector by quarter
Quarter Total number of notifications
January to March 2018*
* As the NDB scheme commenced on 22 February 2018, data is only available for part of the quarter
15
April to June 2018 49
July to September 2018 45
October to December 2018 54

Number of individuals affected by breaches — Health sector

Chart 4.1 — Number of individuals affected by breaches in the quarter — Health sector

Bar chart shows the number of affected individuals by number range within the Health sector. 6 number ranges are displayed. The top 3 are: 16 notifications affected 1 individual; 14 notifications affected 101 to 1000 individuals; and 10 notifications affected 11 to 100 individuals. Link to long text description follows chart.

Note: Where bands are not shown, there were nil reports in the period.

Chart 4.1: Long text description

Most health sector notifications in the period involved the personal information of 100 individuals or fewer (59 per cent of breaches). Breaches affecting between one and ten individuals comprised 41 per cent of the notifications.

Source of the breaches — Health sector

Chart 4.2 — Source of data breaches by percentage — Health sector

Pie chart shows source of data breaches in the health sector. There are 2: Malicious or criminal attack accounted for 46% and Human error for 54%. Link to long text description follows chart.

Chart 4.2: Long text description

Human error was the leading source of notifications in the health sector (29 notifications). This includes incidents involving communications sent to the wrong recipient, insecure disposal of personal information, or loss of paperwork or a data storage device.

Malicious or criminal attacks was the source of the remaining 25 health sector data breaches.

Human error breaches — Health sector

This chart breaks down the kinds of breaches identified as ‘human error’ by the health sector in the quarter.

Chart 4.3 — Human error breakdown — Health sector

Bar chart breaks down the human error data breaches in the Health sector. There are 7 types in the chart. Link to long text description follows chart.

Chart 4.3: Long text description

The largest source of data breaches from the health sector was human error (54 per cent), with examples including sending personal information to the wrong recipient by email (28 per cent of human error data breaches), failure to use the blind carbon copy (BCC) function when sending group emails (24 per cent), and unintended release or publication of personal information (17 per cent).

Malicious or criminal attack breaches — Health sector

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack’ by the health sector in the quarter.

Chart 4.4 — Malicious or criminal attacks breakdown — Health sector

Bar chart breaks down the malicious or criminal attack data breaches in the Health sector. There are 4 in the chart. From most to least: Cyber incidents with 11 notifications; Theft of paper or data storage devices with 8; Rogue employee/insider threat with 5; and Social engineering/impersonation with 1. Link to long text description follows chart.

Chart 4.4: Long text description

Malicious and criminal attacks was the second largest source of data breaches from the health sector. Cyber incidents were the most common type of attack, accounting for 44 per cent, while theft of paperwork or data storage device was the second most common type of attack (32 per cent).

Cyber incident breaches — Health sector

This chart breaks down the kinds of breaches identified as ‘malicious or criminal attack — cyber incident’ by the health sector in the quarter.

Chart 4.5 — Cyber incident breakdown — Health sector

Pie chart breaks down the cyber incident data breaches in the Health sector. There are 4 types in the chart. Compromised or stolen credentials (method unknown) had 46%, Ransomware had 36%, and Phishing and Brute-force attack had 9% each.

Chart 4.5: Long text description

The health sector reported that 5 data breaches caused by cyber incidents were the result of compromised credentials through unknown methods. Ransomware (4 notifications), phishing (1 notification) and a brute-force attack (1 notification) account for the remaining cyber incidents.

System fault breaches — Health sector

In the quarter, system fault was not identified as the source of any breaches notified by the health sector.

Glossary

Breach categories

TermDefinition
Human error An unintended action by an individual directly resulting in a data breach, for example inadvertent disclosure caused by sending a document containing personal information to the incorrect recipient.
PI sent to wrong recipient (email) Personal information sent to the wrong recipient via email, for example, as a result of misaddressed email or incorrect address on file.
PI sent to wrong recipient (fax) Personal information sent to the wrong recipient via facsimile machine, for example, as a result of fax number incorrectly entered or wrong fax number on file.
PI sent to wrong recipient (mail) Personal information sent to the wrong recipient via postal mail, for example, as a result of transcribing error or wrong address on files.
PI sent to wrong recipient (other) Personal information sent to the wrong recipient via channels other than email, fax or mail, for example, delivery by hand or uploading to web portal.
Failure to use BCC when sending email Sending an email to a group by including all recipient emails addresses in the ‘To’ or ‘CC’ field, thereby disclosing all recipient email address to all recipients.
Insecure disposal Disposing of personal information in a manner that could lead to its unauthorised disclosure, for example, using a public rubbish bin to dispose of customer records instead of a secure document disposal bin.
Loss of paperwork/data storage device Loss of a physical asset(s) containing personal information, for example, leaving a folder or a laptop on a bus.
Unauthorised disclosure (failure to redact) Failure to effectively remove or de-identify personal information from a record before disclosing it.
Unauthorised disclosure (verbal) Disclosing personal information without authorisation, verbally, for example, calling it out in a waiting room.
Unauthorised disclosure (unintended release or publication) Unauthorised disclosure of personal information in a written format, including paper documents or online.
Malicious or criminal attack A malicious or criminal attack deliberately crafted to exploit known vulnerabilities for financial or other gain.
Theft of paperwork or data storage device Theft of paperwork or data storage device
Social engineering/impersonation An attack that relies heavily on human interaction to manipulate people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations.
Rogue employee/insider threat An attack by an employee or insider acting against the interests of their employer or other entity.
Cyber incident A cyber incident targets computer information systems, infrastructures, computer networks, or personal computer devices.
Malware Software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
Ransomware A type of malicious software designed to block access to data or a computer system until a sum of money is paid or other conditions are met.
Phishing (compromised credentials) An attack in which the target is contacted by email or text message by someone posing as a legitimate institution to lure individuals into providing personal information, sensitive information or passwords.
Brute-force attack (compromised credentials) Automated software is used to generate a large number of consecutive guesses as to the value of the desired data, for example passwords.
Compromised or stolen credentials (method unknown) Credentials are compromised or stolen by methods unknown.
Hacking (other means) Exploiting a software or security weakness to gain access to a system or network, other than by way of phishing, brute-force attack or malware.
System fault A business or technology process error not caused by direct human error.

Other terminology used in this report and in the NDB Form[4]

TermDefinition/examples
Financial details Information relating to an individual’s finances, for example, bank account or credit card numbers.
Tax File Number (TFN) An individual’s personal reference number in the tax and superannuation systems, issued by the Australian Taxation Office.
Identity information Information that is used to confirm an individual’s identity, such as a passport number, driver’s licence number or other government identifier.
Contact information Information that is used to contact an individual, for example, home address, phone number or email address.
Health information As defined in section 6FA of the Privacy Act. 
Other sensitive information Sensitive information, other than health information, as defined in section 6(1) of the Privacy Act. For example, sexual orientation, political or religious views.

Long text descriptions

Chart 1.1 — Number of breaches reported under the Notifiable Data Breaches scheme by month — All sectors

Chart 1.1 is a bar chart showing the number of data breaches reported under the Notifiable Data Breaches scheme by month, from October 2018 to December 2018.

Month of 2018 Number of notifications
October 91
November 88
December 83

Back to Chart 1.1

Chart 1.2 — Number of individuals affected by breaches in the quarter — All sectors

Chart 1.2 is a bar chart showing the number of affected individuals. Where bands are not shown (for example, 500,001 to 1,000,000), there were nil reports in the period. ‘Unknown’ includes notifications by entities whose investigations were ongoing at the time of this report.

Number of affected individuals Number of notifications
1,000,001 to 10,000,000 1
250,001 to 500,000 1
100,001 to 250,000 2
50,001 to 100,000 1
25,001 to 50,000 1
10,001 to 25,000 4
5,001 to 10,000 7
1,001 to 5,000 23
101 to 1,000 63
11 to 100 49
2 to 10 49
1 58
Unknown 3

Back to Chart 1.2

Chart 1.3 — Kinds of personal information involved in breaches by number of notifications — All sectors

Chart 1.3 is a bar chart showing the kind of personal information involved in data breaches by number of notifications. From most to least notifications:

Kind of personal information involved Number of notifications
Contact information 223
Financial details 123
Identity information 94
Health information 71
TFN 46
Other sensitive information 23

Back to Chart 1.3

Chart 1.4 — Source of data breaches by percentage — All sectors

Chart 1.4 is a pie chart showing the sources of data breaches by percentage. From most to least, they are:

  • Malicious or criminal attack: 64%
  • Human error: 33%
  • System fault: 3%

Back to Chart 1.4

Chart 1.5 — Human error breakdown — All sectors

Chart 1.5 is a bar chart that breaks down the kinds of data breaches identified as ‘human error’ in the quarter by number of notifications.

Human error type Number of notifications
Unauthorised disclosure (verbal) 1
Unauthorised disclosure (failure to redact) 8
Unauthorised disclosure (unintended release or publication) 15
PI sent to wrong recipient (other) 3
PI sent to wrong recipient (fax) 2
PI sent to wrong recipient (mail) 10
PI sent to wrong recipient (email) 23
Loss of paperwork/data storage device 12
Failure to use BCC when sending email 9
Insecure disposal 2

Back to Chart 1.5

Chart 1.6 — Malicious or criminal attack breakdown — All sectors

Chart 1.6 is a bar chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack’ in the quarter by number of notifications. From least to most notifications:

Malicious or criminal attack Number of notifications
Social engineering/impersonation 9
Rogue employee/insider threat 20
Theft of paperwork or data storage device 25
Cyber incident 114

Back to Chart 1.6

Chart 1.7 — Cyber incident breakdown — All sectors

Chart 1.7 is a pie chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack — cyber incident’ in the quarter by percentage. In order displayed:

Malicious or criminal attackPercentage
Phishing (compromised credentials) 43%
Brute-force attack (compromised credentials) 8%
Compromised or stolen credentials (method unknown) 24%
Malware 7%
Ransomware 10%
Hacking (other means) 8%

Back to Chart 1.7

Chart 1.8 — System fault breakdown — All sectors

Chart 1.8 is a bar chart that breaks down the kinds of data breaches identified as ‘system fault’ in the quarter by number of notifications. They are:

  • Unintended access: 1 notification
  • Unintended release or publication: 8 notifications

Back to Chart 1.8

Chart 2.1 — Source of data breaches — Top five sectors

Chart 2.1 is a bar chart that breaks down the sources of data breaches as identified by notifying entities in the top five sectors in the quarter, by number of notifications. From least to most total notifications:

Industry sector Human error Malicious or criminal attack System fault
Mining & manufacturing 0 12 0
Education 13 7 1
Legal, accounting & management services 8 15 0
Finance 11 28 1
Health service providers 29 25 0

Back to Chart 2.1

Chart 2.2 — Human error breakdown — Top five sectors

Chart 2.2 is a bar chart that breaks down the kinds of data breaches identified as ‘human error’ by the top five sectors in the quarter, by number of notifications. From least to most total notifications:

Sector Failure to use BCC when sending email Loss of paperwork/data storage device PI sent to wrong recipient (email) PI sent to wrong recipient (fax) PI sent to wrong recipient (mail) PI Sent to wrong recipient (other) Unauthorised disclosure (failure to redact) Unauthorised disclosure (unintended release or publication) Unauthorised disclosure (verbal)
Mining & manufacturing 0 0 0 0 0 0 0 0 0
Education 1 1 3 0 2 1 0 5 0
Legal, accounting & management services 0 1 4 0 3 0 0 0 0
Finance (incl superannuation) 0 2 2 0 4 1 0 1 1
Health service providers 7 4 8 2 0 1 2 5 0

Back to Chart 2.2

Chart 2.3 — Malicious or criminal attacks breakdown — Top five sectors

Chart 2.3 is a bar chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack’ by the top five sectors in the quarter. In the order displayed:

Sector Cyber incident Rogue Employee / insider threat Social Engineering / impersonation Theft of paperwork or data storage device
Health service providers 11 5 1 8
Finance (incl superannuation) 16 7 3 2
Legal, accounting & management services 11 1 1 2
Education 4 0 0 3
Mining & manufacturing 11 0 1 0

Back to Chart 2.3

Chart 2.4 — Cyber incident breakdown — Top five sectors

Chart 2.4 is a bar chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack — cyber incident’ by the top five sectors in the quarter. In the order displayed:

Sector Phishing (compromised credentials) Compromised or stolen credentials (method unknown)RansomwareHacking Brute-force atttack (compromised credentials)
Mining & manufacturing 5 3 2 0 1
Education 1 2 1 0 0
Legal, accounting & management services 5 3 2 0 1
Finance 10 2 0 2 2
Health service providers 1 5 4 0 1

Back to Chart 2.4

Chart 2.5 — System fault breakdown — Top five sectors

Chart 2.5 is a bar chart that breaks down the kinds of data breaches identified as ‘system fault’ by the top five sectors in the quarter. The Finance and Education sectors each reported one.

Back to Chart 2.5

Chart 3.1 — Number of individuals affected by breaches in the quarter — Finance sector

Chart 3.1 is a bar chart that shows the number of individuals affected by data breaches in the quarter in the Finance sector, by number of notifications. Where bands are not shown, there were nil reports in the period.

Number of affected individuals Number of notifications
10,001 to 25,000 1
1,001 to 5,000 2
101 to 1,000 9
11 to 100 7
2 to 10 10
1 11

Back to Chart 3.1

Chart 3.2 — Source of data breaches by percentage — Finance sector

Chart 3.2 is a pie chart showing the source of data breaches by percentage in the Finance sector. From most to least, they are:

  • Malicious or criminal attack: 70%
  • Human error: 27%
  • System fault: 3%

Back to Chart 3.2

Chart 3.3 — Human error breakdown — Finance sector

Chart 3.3 is a bar chart that breaks down the kinds of data breaches identified as ‘human error’ in the Finance sector in the quarter, by number of notifications. In order of display:

Human error Number of notifications
Unauthorised disclosure (verbal) 1
Unauthorised disclosure (unintended release or publication) 1
PI sent to wrong recipient (other) 1
PI sent to wrong recipient (mail) 4
PI sent to wrong recipient (email) 2
Loss of paperwork/data storage device 2

Back to Chart 3.3

Chart 3.4 — Malicious or criminal attacks breakdown — Finance sector

Chart 3.4 is a bar chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack’ by the finance sector in the quarter. In order of display:

Malicious or criminal attack Number of notifications
Social Engineering/impersonation 3
Rogue Employee/insider threat 7
Theft of paperwork or data storage device 2
Cyber incident 16

Back to Chart 3.4

Chart 3.5 — Cyber incident breakdown — Finance sector

Chart 3.5 is a pie chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack — cyber incident’ by the finance sector in the quarter. In order of display:

  • Phishing (compromised credentials): 62%
  • Brute-force attack (compromised credentials): 12%
  • Compromised or stolen credentials (method unknown): 13%
  • Hacking: 13%

Back to Chart 3.5

Chart 4.1 — Number of individuals affected by breaches in the quarter — Health sector

Chart 4.1 is a bar chart that shows the number of individuals affected by breaches in the health sector, by number of notifications. Where bands are not shown, there were nil reports in the period.

Number of affected individuals Number of notifications
5,001 to 10,000 1
1,001 to 5,000 7
101 to 1,000 14
11 to 100 10
2 to 10 6
1 16

Back to Chart 4.1

Chart 4.2 — Source of data breaches by percentage — Health sector

Chart 4.2 is a pie chart that shows the source of data breaches in the health sector. In order of display:

  • Human error: 54%
  • Malicious or criminal attack: 46%

Back to Chart 4.2

Chart 4.3 — Human error breakdown — Health sector

Chart 4.3 is a bar chart that breaks down the kinds of data breaches identified as ‘human error’ by the health sector in the quarter. In order of display:

Human error Number of notifications
Unauthorised disclosure (failure to redact) 2
Unauthorised disclosure (unintended release or publication) 5
PI sent to wrong recipient (other) 1
PI sent to wrong recipient (fax) 2
PI sent to wrong recipient (email) 8
Loss of paperwork/data storage device 4
Failure to use BCC when sending email 7

Back to Chart 4.3

Chart 4.4 — Malicious or criminal attacks breakdown — Health sector

Chart 4.4 is a bar chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack’ by the health sector in the quarter. In order of display:

Malicious or criminal attack Number of notifications
Social Engineering/impersonation 1
Rogue Employee/insider threat 5
Theft of paperwork or data storage device 8
Cyber incident 11

Back to Chart 4.4

Chart 4.5 — Cyber incident breakdown — Health sector

Chart 4.5 is a pie chart that breaks down the kinds of data breaches identified as ‘malicious or criminal attack — cyber incident’ by the health sector in the quarter. In order of display:

  • Phishing (compromised credentials): 9%
  • Brute-force attack (compromised credentials): 9%
  • Compromised or stolen credentials (method unknown): 46%
  • Ransomware: 36%

Back to Chart 4.5

Footnotes

[1] A health service provider includes any entity that provides a health service within the meaning of s 6FB of the Privacy Act, regardless of annual turnover.

[2] This sector includes banks, wealth managers, financial advisors, superannuation funds and consumer credit providers (regardless of annual turnover).

[3] This sector includes private education providers only, as APP entities, and the Australian National University. Public sector education providers are bound by State and Territory privacy laws, as applicable.

[4] OAIC’s Notifiable Data Breach Form.