Australians are losing trust after a data breach – and it’s not hard to see why. Our joint report with Porter Novelli reveals a growing gap between what Australians expect after a cyber incident – and how businesses are responding. It’s a wake-up call for leaders: trust is fragile, and compliance alone isn’t enough. What do people want? Fast answers, honest communication and real empathy. Explore what’s driving the disconnect and what it means for how you plan, respond and communicate.
Australians lose trust after data breach, report finds.
More Relevant Posts
-
We call the time between knowing there's been a breach and telling those affected as the "Databreach Dead-Zone". If you want to avoid the Dead-Zone, your databreach crisis response needs to be on point and ready to enact immediately and concurrent with your cyber response. The expectations and impacts are laid clear in this great report by Hall & Wilcox and Porter Novelli.
Australians are losing trust after a data breach – and it’s not hard to see why. Our joint report with Porter Novelli reveals a growing gap between what Australians expect after a cyber incident – and how businesses are responding. It’s a wake-up call for leaders: trust is fragile, and compliance alone isn’t enough. What do people want? Fast answers, honest communication and real empathy. Explore what’s driving the disconnect and what it means for how you plan, respond and communicate.
To view or add a comment, sign in
-
When words shape accountability in a cyber crisis. Two weeks after the cyber attack, Asahi released a statement saying: “We have identified the possibility that personal information may have been the subject of unauthorised data transfer.” It’s a familiar formula — legally precise, but emotionally distant. For those whose data is that “possibility,” uncertainty becomes its own form of harm. This raises deeper questions for boards and crisis leaders: • How do we balance legal prudence with moral responsibility? • At what point does cautious language erode public trust? • And are we underestimating the psychological impact on victims when we communicate like this? In my latest short read, I explore the hidden trauma of data breaches — and why transparent, human-centred crisis communication must be part of every cyber resilience plan. 🔗 Read the article here #CyberResilience #CrisisLeadership #DataBreach #ReputationManagement #Trust #CognitasGlobal
To view or add a comment, sign in
-
🚨 The trust revolution is here: cybersecurity is no longer just about putting up walls. It’s about building honest relationships. More and more clients, partners, and regulators want to know: - How are you handling their data? - Who has access? - Will you OWN UP if something goes wrong? Protection is the bare minimum. True security now demands ethics, full transparency, and a culture of accountability. In 2025, trust is your greatest asset: and your biggest vulnerability if neglected! ✅ Here’s how businesses are adapting: • Publishing transparent security policies • Rapid incident disclosure (no more hiding breaches!) • Prioritizing client consent and data clarity • Proactively sharing threat intelligence Don’t wait for a crisis to prove your trustworthiness. Modern customers expect answers, not excuses. At B&R Computers, we go beyond defenses. We help our clients build security cultures rooted in integrity and trust: because openness keeps you safer. Want to review your company’s cyber-ethics? Book a FREE 15-minute consult today! #Cybersecurity #TrustRevolution #DataTransparency #EthicalIT #BandRComputers #RiskManagement #CyberEthics #BusinessSecurity
To view or add a comment, sign in
-
-
“Do you want to be a cop, or do you want to appear to be a cop?” Sgt Dignam (Mark Wahlburg) said this to William Costigan Jr (Leonardo DiCaprio) in The Departed, as Costigan was interviewing to be a cop. This thought process comes into play in the wizarding world of cybersecurity as well. You guessed it: I'm talking about compliance. We often see companies talk about taking cybersecurity seriously, but really, they're taking surface-level steps for compliance purposes. When this happens, we usually see some fallout: - Cyber risk in unexpected places. - Policies that don't match the security controls that are in place. - Tools that are implemented, but rarely monitored. Here's a better approach when thinking about cybersecurity: - Truly get to know the business in question. - Assess the actual cyber risks and compliance gaps to that business. - Prioritize these findings, then knock them as time and budget allow. Then, the business can focus on other priorities with added confidence. If you need someone to guide you through this, feel free to send me a DM. PS: The Departed is my second favorite movie. What do you think of it?
To view or add a comment, sign in
-
-
Every growing business is focused on one thing: Winning The Next Client. You spend months building relationships and proving your value. But what if the biggest threat to your pipeline isn't your competition? Imagine you're at the final stage of a deal and your system goes down from a preventable attack. Or worse, you have to tell a prospect that their data was involved in a data breach. The trust you've built evaporates instantly. Cybersecurity isn't an IT problem in the back office, it's a sales and reputation issue on the front line. It's the foundation of the trust you need to grow. Ignoring cybersecurity because you're "too busy" is like casting an anchor made of broken links. You think you’re secure, but you’re not. Our latest article discusses how to build that foundation of trust the right way. How do you demonstrate trustworthiness to new clients?
To view or add a comment, sign in
-
-
Homework: Debbie Reynolds Podcast with guest: ♛ Gina King ♛ 王ギナ Your assignment is to listen to what we get wrong about #DataPrivacy, and what we misunderstand about #Risk Watch for it tomorrow. I will share the link to those who like this post. 🔐 IAM isn’t just about who logs in. It’s about who we believe we are when we do. Every exploit doesn’t start in code — it starts in identity. Attackers don’t just target access. → They target assumptions. → They exploit titles over truth. → They weaponize ego disguised as expertise. IAM failures aren’t only system flaws. They’re reflections of how we define ourselves inside the system. If you’re unclear about your own role, you’ve already given up more privilege than you realize. In cyber, the most dangerous escalation isn’t admin rights — it’s self-deception. Reassess your access. Rethink your identity. Reclaim your discipline. #MeanStreak | #CyberSecurity | #IAM | #Leadership | #Identity | #NoTradeOffs
To view or add a comment, sign in
-
For senior leaders and board members, responding effectively to a cyber incident is a matter of business resilience, not just technology. The OODA loop (observe, orient, decide, act) is a decision-making model that helps organizations avoid "analysis paralysis" and act decisively when it matters most. Read the full article to learn how to prepare your organization for decisive action: https://lnkd.in/eXV2CK9g
To view or add a comment, sign in
-
The power of occasionally turning a blind eye to privacy can surprise even the most vigilant among us. 🎯 How can less vigilance be a good thing? Well, imagine being a basketball coach. You don’t overwhelm your players with all tactics at once. You pick the essentials. Focus on strengths. In cybersecurity, it's similar. Not every area demands the same level of scrutiny. 📘 Storytime: A colleague managed a startup’s security. He didn’t sweat the small stuff—like minor data logs. Instead, he protected business secrets and core digital assets. 🌟 What was the result? Efficient and stress-free cybersecurity management. Here’s how you can apply this strategy: 1️⃣ Critical Focus: - Identify what truly matters in protection, like focusing on strategy over minor tactics. 2️⃣ Smart Delegation: - Have varied security protocols based on asset importance. 💡 Tips for action: ✏️ Prioritize Systems Wisely 🤝 Encourage Open Discourse - Chat with peers about what really needs safeguarding. 🔎 Review Regularly - Keep adapting focus as new threats emerge. Change the lens. See privacy in light of strategic importance rather than all-or-nothing. Your thoughts on this perspective? How might you re-evaluate your privacy approach? #StrategicSecurity #TechInsights #DigitalAwareness #PrioritizeWisely #SecurityManagement
To view or add a comment, sign in
-
Do you own or lead an SME? Here’s the hard truth: the biggest cyber threat facing your business isn’t sophisticated hackers or complex malware. It’s your own people. One misplaced click. One reused password. One rushed decision. That’s all it takes: Hence the reason why 95% of breaches boil down to human error. For SMEs, the consequences ripple across every area: disrupting financial stability, stalling operations and eroding the reputation you have worked years to build. Even the best tools on the market can’t protect you if your team isn’t cyber-aware. That’s why leadership matters. Directors and owners, like you, need to build secure cultures where awareness and resilience thrive as a business non-negotiable. Because one careless moment should never be the reason your business is left exposed. 📞 03300 563 900 📧 info@evolvetechnologies.co.uk
To view or add a comment, sign in
-
⚠️ You can outsource IT. But not your accountability. Many leaders think: “We’re too small to be a target.” Wrong. Attackers now go after your partners, the weakest link in your chain: 💥 Almost 1 in 3 cyber incidents in finance come from external providers. 💥 Legal responsibility stays with the board ; you cannot outsource accountability. 💥 Over-reliance on big tech vendors creates risks that can hit entire industries at once. This is not an IT problem. It’s a boardroom challenge. ✅ Know where your data really is. ✅ Demand full transparency from providers. ✅ Test exit strategies before you need them. If you don’t control your outsourced risks, they will control you. 👉 Swipe through the carousel to see why outsourcing is one of today’s most underestimated security risks. How is your board addressing third-party cyber risks today? Let's discuss & connect! hashtag #CyberSecurity #RiskManagement #BoardLeadership #DigitalTransformation #FamilyOffice
To view or add a comment, sign in
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development
Read the full report: https://hallandwilcox.com.au/news/new-report-reveals-what-consumers-want-after-a-data-breach-and-what-theyre-not-getting/