DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Western Australia’s Auditor General Finds Serious Weaknesses in Government Agencies’ Handling of Information

Posted on March 25, 2010 by Dissent

In his annual report on Information System Management in state government agencies, the Auditor General
for Western Australia has identified serious weaknesses in the way many agencies manage their IT systems.

The two-part Information Systems Audit Report, tabled in Parliament, found that government agencies were often failing to implement comprehensive controls over their IT systems and that this was creating serious risks to the confidentiality and integrity of data.

The first part of the report found that potentially sensitive information stored on government laptops, USB memory sticks and other portable storage devices (PSDs) was not well protected at seven agencies. The report also found that 750 government laptops had been reported lost or stolen from government agencies over the past three years.

Acting Auditor General, Glen Clarke, said the report gives a wake up call to government agencies, particularly those that handle personal and sensitive information.

“Most agencies have an increasing number of laptops and PSDs and there is a pressing need for agencies to act on the security risk these devices pose,” Mr Clarke said.

Portable storage devices are increasingly used throughout government as they allow flexible working arrangements and easy access, storage and transfer of large amounts of data.

“While these devices have their benefits, their portability also places them at greater risk of being lost or stolen and the information stored on these devices needs to be protected.

“None of the seven agencies we examined had adequately considered or addressed these risks.

The seven agencies examined were the Curriculum Council, Department of Commerce, Department of Education, Department of Water, Royal Perth Hospital, Western Australia Police and WorkCover WA.

The report found that the Western Australia Police was the only agency that had addressed the risks associated with flash drives, ensuring that staff only use encrypted devices. None of the agencies knew exactly how many PSD’s they owned or the potential security risks of their PSD’s.

The Department of Commerce and Royal Perth Hospital did not know how many laptops they owned, increasing the risk that laptops and the information stored on them could be lost or stolen without them knowing.

“All of the agencies examined are moving to address the risks associated with their laptops and PSDs and I strongly encourage every agency across government to act on the recommendations of this report to quickly address this growing security issue,” Mr Clarke said.

The second part of the report looked at application and general computer controls.

All the computer applications reviewed support the provision of critical public services and contain hundreds of
thousands of sensitive records relating to the general public*. Four key business applications at four agencies were reviewed.

The Acting Auditor General found weaknesses in security and data processing controls that could potentially impact delivery of key services to the public.

The most common types of control weakness identified were security weaknesses (55 per cent) such as easy-to-guess passwords, unauthorized user accounts and failure to remove accounts belonging to former staff.

Data processing control issues, which can lead to wrong information being stored, made up 28 per cent of the
weaknesses identified and the remaining were operational issues, such as insufficient staff training.

“At two of the agencies we were able to guess the passwords and gain access to highly sensitive information and at three agencies we found that former staff were still able to access confidential information and databases,” Mr Clarke said.

“At one agency we found that confidential information such as client names and address details was unnecessarily attached to other data sent to contractors.

“This is unacceptable. The community needs to know that the information government agencies hold is treated with the respect and discretion it deserves.”

The general computer control audits determine whether the computer controls effectively support the
confidentiality, integrity, and availability of information systems. Fifty-two agencies were reviewed and of those, 42 were benchmarked against five categories of accepted good practice for IS management.

Fifty-one per cent of agencies failed to meet the information security benchmark and access controls in particular were weak posing the risk of unauthorised access to bank account and credit card details and staff payments.

“Access controls are the most basic and inexpensive control to implement and there is no excuse not to have them in place,” Mr Clarke said.

Other issues include the lack of a user activity log meaning that security breaches can go undetected. Anti-virus software was not in place or had not been updated at some agencies and there was a lack of security policies and practices.

“While we saw some initial signs of improvement from last year, too many agencies continue to ignore the risks from not effectively managing their information systems.

“I urge agencies to take note of the findings and act on the recommendations of this report.”

Source: Office of the Auditor General for Western Australia

The summary of the report can be found here; the full report can be found at http://www.audit.wa.gov.au/reports/pdfreports/report2010_02.pdf. A note to media indicates that the agencies and the specific applications reviewed in the second part of the Information Systems Report are not publicly reported to reduce the risk of any reported weaknesses being exploited.


Related:

  • Revealed: Afghan data breach after MoD official left laptop open on train
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • UK: FCA fines former employee of Virgin Media O2 for data protection breach
  • Former General Manager for U.S. Defense Contractor Pleads Guilty to Selling Stolen Trade Secrets to Russian Broker
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
Category: Commentaries and AnalysesGovernment SectorNon-U.S.Of Note

Post navigation

← An ACTA of insecurity
Woman gets 3 years for credit-card thefts at park →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.