Login | Support 24x7 Helpdesk Support 02 8011 0210 | 1300 660 368
Cyber Security

SA Government Employees Under Ransomware Attack

Last Month, SA government employees personal information is affected by Ransomware attack which initially started from Payroll System Software given by Frontier Software.More than 38,000 employees data is under attack.

“I have been advised that the records of at least 38,000 employees were accessed and that up to 80,000 employees might have been accessed,” stated by Treasurer Rob Lucas.

Government is now working with Frontier Software company to provide accurate estimated number of affected employees.

Treasurer Rob Lucas also mentioned that the Department of Education’s Employees data is safe and not affected by the Ransomware attack Right Now.

Personal information including names, dates of birth, tax file numbers, addresses, bank account details and pay details like remuneration, tax withheld, superannuation contributions etc are compromised.

The government has also doing it’s best to provide full support by collaborating with national identity and cyber support service IDCARE to work with affected employees.

“We are deeply disappointed that this breach occurred and are working closely with Frontier Software to investigate how this incident happened,” stated by Treasurer Lucas.

“We apologise to all SA government employees affected.”
The SA government has used Frontier Software as its external payroll software provider since 2001.

As part of the Australian Govt. Stay Smart Online partner, Computer Support Professionals can also measure the security health of your business with the latest industry best tools and application. We can help you to protect your business from the latest threat which can cause a security risk and damage your identity.

WHAT WE COVER UNDER IT SECURITY:

•Managed security services and solutions
•Design security solution as per business needs
•Cybersecurity awareness programs
•Anti-Virus and Anti-ransomware solutions
•Enterprise and SMB risk and IT compliance strategies
•Security risk assessment
•Identity and access management
•Security audit and Incident investigation

Article Courtesy:
ITnews.com

Leave a Reply