{"id":9265,"date":"2016-04-27T09:20:40","date_gmt":"2016-04-26T23:20:40","guid":{"rendered":"http:\/\/www.macquarietelecom.com\/?p=9265"},"modified":"2023-03-01T16:38:36","modified_gmt":"2023-03-01T05:38:36","slug":"banking-hack-lessons","status":"publish","type":"post","link":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","title":{"rendered":"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk"},"content":{"rendered":"

Reports hackers have compromised the highly sophisticated international central banking security systems graphically demonstrated a lesson all businesses and governments needed to take to heart \u2013 you are only as secure as your weakest link, Macquarie Telecom said today.<\/p>\n

It has been reported overnight that $US81 million had been stolen by hackers who were able to breach the SWIFT trading systems used by banks to send orders for the transfer of money around the world.<\/p>\n

The hackers reportedly succeeded in breaking into the international network that links thousands of financial institutions by gaining access to the Bangladesh central bank, which had no firewall and a network using second hand $10 switches.<\/p>\n

\u201cThe banks and the banking system have been leaders in building cyber defences, and provide great examples for the rest of the community,\u201d Macquarie Telecom managing director of hosting and government, Aidan Tudehope said.<\/p>\n

\u201cYet this shocking breach shows that even that system is vulnerable if one nodes in the network is not up to standard, either through lack of resources or lack of knowledge and skill,\u201d he said.<\/p>\n

\u201cThe Cyber Security Strategy released by the Prime Minister last week provides a roadmap for Australian businesses and government agencies to lift their own cyber security stance.<\/p>\n

\u201cBut in the interconnected economy, the risk of backdoor entry is ever present, and all the good work done by an individual enterprise can come unstuck through one partner who has got the cyber security message.<\/p>\n

\u201cUnfortunately, that message is sometimes still not being received, and sometimes still not being acted on quickly enough, especially by medium sized businesses and Government entities.<\/p>\n

\u201cThey do not have the resources to keep up with the bad actors in the cyber security arms race alone, so must rely on partners and trusted advisers.<\/p>\n

\u201cIt remains an on-going challenge for some smaller Government agencies to implement security measures the basic Top 4 \u2018hygiene\u2019 measures urged on them by the government\u2019s own experts.<\/p>\n

\u201cIn the private sector, the situation is still more uneven among medium sized businesses.\u201d<\/p>\n

\u201cIt is crucial that the nation\u2019s managers take the time to read the strategy to understand where tey can find this help, so we can bring focus and improvement to the weakest links in the cyber security chain,\u201d Mr Tudehope said<\/p>\n

This article was first published by ZDNet here<\/a>.<\/p>\n

For further information contact David Forman on 0438121114<\/p>\n","protected":false},"excerpt":{"rendered":"

Reports hackers have compromised the highly sophisticated international central banking security systems graphically demonstrated a lesson all businesses and governments needed to take to heart \u2013 you are only as secure as your weakest link, Macquarie Telecom said today. It has been reported overnight that $US81 million had been stolen by hackers who were able […]<\/p>\n","protected":false},"author":7,"featured_media":7133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[13,12,44],"tags":[261,273,314,270,315,71,79,316,84],"class_list":["post-9265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-migrate","category-news","tag-aidan-tudehope","tag-australian-government","tag-bangladesh-banking-hack","tag-cyber","tag-cyber-hack","tag-cyber-security","tag-government-cloud","tag-hack","tag-secure-cloud"],"acf":[],"yoast_head":"\nBangladesh Banking Hack Graphic Lesson in Cyber Security<\/title>\n<meta name=\"description\" content=\"Lessons Australian Government Agencies and business can learn from the recent hack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bangladesh Banking Hack Graphic Lesson in Cyber Security\" \/>\n<meta property=\"og:description\" content=\"Lessons Australian Government Agencies and business can learn from the recent hack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\" \/>\n<meta property=\"og:site_name\" content=\"Macquarie Technology Group\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T23:20:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-01T05:38:36+00:00\" \/>\n<meta name=\"author\" content=\"Aidan Tudehope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Tudehope1\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aidan Tudehope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\"},\"author\":{\"name\":\"Aidan Tudehope\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\"},\"headline\":\"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk\",\"datePublished\":\"2016-04-26T23:20:40+00:00\",\"dateModified\":\"2023-03-01T05:38:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\"},\"wordCount\":405,\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"Aidan Tudehope\",\"Australian Government\",\"Bangladesh banking hack\",\"cyber\",\"cyber hack\",\"Cyber Security\",\"government cloud\",\"hack\",\"secure cloud\"],\"articleSection\":[\"Articles\",\"Migrate\",\"News\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\",\"name\":\"Bangladesh Banking Hack Graphic Lesson in Cyber Security\",\"isPartOf\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2016-04-26T23:20:40+00:00\",\"dateModified\":\"2023-03-01T05:38:36+00:00\",\"description\":\"Lessons Australian Government Agencies and business can learn from the recent hack.\",\"breadcrumb\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/macquarietechnologygroup.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#website\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"name\":\"Macquarie Technology Group\",\"description\":\"Macquarie Technology Group\",\"publisher\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#organization\",\"name\":\"Macquarie Technology Group\",\"url\":\"https:\/\/macquarietechnologygroup.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"contentUrl\":\"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png\",\"width\":1911,\"height\":1069,\"caption\":\"Macquarie Technology Group\"},\"image\":{\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/macquarie-telecom\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929\",\"name\":\"Aidan Tudehope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g\",\"caption\":\"Aidan Tudehope\"},\"description\":\"Aidan is co-founder of Macquarie Technology Group and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.\",\"sameAs\":[\"https:\/\/x.com\/Tudehope1\"]}]}<\/script>\n","yoast_head_json":{"title":"Bangladesh Banking Hack Graphic Lesson in Cyber Security","description":"Lessons Australian Government Agencies and business can learn from the recent hack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","og_locale":"en_US","og_type":"article","og_title":"Bangladesh Banking Hack Graphic Lesson in Cyber Security","og_description":"Lessons Australian Government Agencies and business can learn from the recent hack.","og_url":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","og_site_name":"Macquarie Technology Group","article_published_time":"2016-04-26T23:20:40+00:00","article_modified_time":"2023-03-01T05:38:36+00:00","author":"Aidan Tudehope","twitter_card":"summary_large_image","twitter_creator":"@Tudehope1","twitter_misc":{"Written by":"Aidan Tudehope","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#article","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/"},"author":{"name":"Aidan Tudehope","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929"},"headline":"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk","datePublished":"2016-04-26T23:20:40+00:00","dateModified":"2023-03-01T05:38:36+00:00","mainEntityOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/"},"wordCount":405,"publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage"},"thumbnailUrl":"","keywords":["Aidan Tudehope","Australian Government","Bangladesh banking hack","cyber","cyber hack","Cyber Security","government cloud","hack","secure cloud"],"articleSection":["Articles","Migrate","News"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","url":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/","name":"Bangladesh Banking Hack Graphic Lesson in Cyber Security","isPartOf":{"@id":"https:\/\/macquarietechnologygroup.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage"},"thumbnailUrl":"","datePublished":"2016-04-26T23:20:40+00:00","dateModified":"2023-03-01T05:38:36+00:00","description":"Lessons Australian Government Agencies and business can learn from the recent hack.","breadcrumb":{"@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/macquarietechnologygroup.com\/news\/banking-hack-lessons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/macquarietechnologygroup.com\/"},{"@type":"ListItem","position":2,"name":"Bangladesh Banking Hack Graphic Lesson in Cyber Security Weakest Link Risk"}]},{"@type":"WebSite","@id":"https:\/\/macquarietechnologygroup.com\/#website","url":"https:\/\/macquarietechnologygroup.com\/","name":"Macquarie Technology Group","description":"Macquarie Technology Group","publisher":{"@id":"https:\/\/macquarietechnologygroup.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/macquarietechnologygroup.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/macquarietechnologygroup.com\/#organization","name":"Macquarie Technology Group","url":"https:\/\/macquarietechnologygroup.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/","url":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","contentUrl":"https:\/\/macquarietechnologygroup.com\/wp-content\/uploads\/2023\/04\/macquarie-technology-group-logo.png","width":1911,"height":1069,"caption":"Macquarie Technology Group"},"image":{"@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/macquarie-telecom\/"]},{"@type":"Person","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/993f908fa254f892bd710aa8b7cc3929","name":"Aidan Tudehope","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/macquarietechnologygroup.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e592a795cad204864e576a468a72896d?s=96&d=mm&r=g","caption":"Aidan Tudehope"},"description":"Aidan is co-founder of Macquarie Technology Group and has been a director since 1992. He is the Managing Director of Macquarie Government & Hosting Group and is invested in leading the contribution from the Australian industry on all matters Cloud & Cyber policy related.","sameAs":["https:\/\/x.com\/Tudehope1"]}]}},"_links":{"self":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9265"}],"collection":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/comments?post=9265"}],"version-history":[{"count":3,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9265\/revisions"}],"predecessor-version":[{"id":14281,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/posts\/9265\/revisions\/14281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/media?parent=9265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/categories?post=9265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/macquarietechnologygroup.com\/wp-json\/wp\/v2\/tags?post=9265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}