
Some of the most interesting findings in the OAIC’s January – June 2023 Report include:
Human error is known to be a significant cause of data breaches globally each year. And of those human error-related data breaches – sending an email to the wrong recipient is by far the biggest issue.
We all know how easy it is to mis-send an email. Auto-fill is sometimes not our friend, particularly if you are tired, in a hurry or working off your phone (which sometimes makes it harder to see the full recipient details).
However, there are still lots of things organisations can do to prevent these breaches.
Training is a key tool in the prevention of human error, but organisations should also be considering how their systems could be designed to prevent human error breaches. This includes using classifications to remind people when emails might contain personal or sensitive information and warnings when emails are being sent out of the organisation (prompting you to double-check that they’re going to the right place).
Interestingly, Australia’s human error breaches largely mimic the trends we’re seeing globally. This shows that organisations can (and should) be focusing efforts and resources on preventing or reducing these types of errors:

Showing the % of breaches caused by human error
The “Blind Copy” (BCC) field is often used in emails being sent to a group (e.g. all customers) to hide individual email addresses from other recipients.
The UK’s ICO published guidance about BCC Best Practices to avoid data breaches. Their guidance noted that organisations should be conducting assessments to determine whether the BCC function is a strong enough protection to guard against the risk of a privacy breach.
“While BCC can be a useful function, it’s not enough on its own to properly protect people’s personal information. We’re asking organisations to assess the nature of the information and the potential security risks when deciding on the best method to communicate with staff or customers. If organisations are sending any sensitive personal information electronically, they should use alternatives to BCC, such as bulk email services, mail merge, or secure data transfer services.” – Mihaela Jembei, ICO Director of Regulatory Cyber.
The guidance notes that organisations should consider how sensitive the information they’re sharing is alongside any other relevant details that may allow individuals to infer information. The guidance highlights several scenarios where healthcare providers accidentally used the ‘To’ or ‘CC’ function (instead of BCC) and disclosed the email addresses of other patents. This allows others to infer sensitive information about the individuals.

Source: https://ico.org.uk/for-organisations/uk-gdpr-guidance-and-resources/security/email-and-security/
The OAIC highlighted that 26% of entities took longer than 30 days to notify it of a data breach. It noted that the delay was, in some cases, the result of an inflexible and/or sequential data breach investigation plan.
It supplied two examples of these inflexible data breach investigation methods:
In either case, these delays pose a risk to the individuals affected by the breach.
Organisations should ensure that their data breach response plan is sufficiently flexible that it allows for timely notifications to be made.
Alternatively, if you rely on a sequential or fixed-method data breach response plan, your employees should receive training about data breach notifications. It is critical that they know to notify the OAIC and affected individuals at the earliest possible stage. (The plan should include reminders about this too.)
Given the large number of large-scale data breaches Australia has experienced in the past year, it is likely that the information about individuals will be combined to create a more complete picture. This massively increases the risk of social engineering and impersonation attacks.
Organisations that use personal information to identify and/or authenticate their customers’ identities should be aware of this and should implement increased protections. Some methods that may offer increased protection include customer callbacks, multi-step verification, and multi-factor authentication.
Compromised credentials cause a significant proportion of data breaches in Australia (and globally). If you consider that many ransomware attacks are preceded by the successful compromise of credentials, the total impact increases further.
We published an article about passkeys and how they may help organisations overcome the issues caused by passwords. We suggest reading it to learn more about how passkeys can help reduce the risk posed by compromised credentials.
The OAIC noted that the sources of data breaches in Australia have stayed relatively constant since the OAIC’s last notifiable data breach report for July – December 2022:
Again, organisations can use these trends to highlight or confirm their strategic priorities and resource deployment in their privacy departments over the coming months and years.
Our data breach management services include:
For help managing and securing your organisation’s data, reach out. Our privacy team would love to assist.
"*" indicates required fields
"*" indicates required fields
Privacy 108 collects your name and email to send you our newsletter. If you do not provide this information, we will be unable to send it to you. We may use third-party service providers (such as email marketing platforms) to distribute our communications. Some providers may store information overseas, including in the United States. For more information about how we handle your personal information, including how to access or correct it or make a complaint, please see our Privacy Policy or contact us at hello@privacy108.com.au. You can unsubscribe at any time using the link in our emails or by contacting hello@privacy108.com.au.