FIIG Securities' $2.5M Penalty: The Board Cyber Education Wake-Up Call
How the FIIG Securities Penalty Validates What We've Been Advocating: Board Education and Practical Cyber Security The Message Every Board Should...
8 min read
Insicon Cyber
:
Updated on January 29, 2026
The recent cyber security incident affecting New Zealand's ManageMyHealth platform serves as a critical reminder that healthcare organisations across Australia and New Zealand face increasingly sophisticated cyber threats. With over 126,000 patients potentially affected, this breach highlights the urgent need for healthcare providers to strengthen their security posture.
Rather than focusing on what went wrong, this article examines the key lessons healthcare organisations can learn and provides actionable recommendations to strengthen cyber resilience across the sector.
Healthcare data remains one of the most valuable targets for cybercriminals in the Asia-Pacific region. The National Cyber Security Centre's latest Cyber Threat Report reveals that more than 40% of incidents in 2024/25 had criminal or financial motivations, representing a significant increase from previous years.
What makes healthcare particularly vulnerable? Medical records contain comprehensive personal information including identification documents, addresses, dates of birth, and sensitive health data. This information has substantial value on the dark web and can be exploited for identity theft, financial fraud, insurance fraud, and extortion.
The ManageMyHealth incident demonstrates that attackers are specifically targeting healthcare organisations with relatively modest ransom demands, suggesting they view Australian and New Zealand healthcare providers as viable, accessible targets. This trend is likely to continue and accelerate throughout 2026.
The good news is that many successful attacks exploit basic security gaps that can be addressed through systematic improvements. Healthcare organisations that prioritise fundamental security hygiene significantly reduce their attack surface.
Email remains a primary attack vector for phishing, credential harvesting, and initial access. Implementing robust email authentication protects both your organisation and your patients from sophisticated email-based attacks.
Weak access controls represent one of the most common vulnerabilities exploited in healthcare breaches. Strong authentication and access management are fundamental to protecting patient data.
Attackers actively scan for known vulnerabilities and unpatched systems. A systematic approach to vulnerability management significantly reduces your organisation's exposure to opportunistic attacks.
Beyond prevention, healthcare organisations must be prepared to respond effectively when incidents occur. Operational resilience ensures your organisation can maintain critical services and recover quickly from cyber incidents.
A comprehensive backup strategy is your last line of defence against ransomware and data loss. Recent case studies demonstrate that organisations with robust, tested backups recover significantly faster and avoid paying ransoms.
The speed and effectiveness of your initial response to a cyber incident can dramatically impact the overall damage. A well-rehearsed incident response plan ensures your team can act decisively under pressure.
Effective cyber security requires ongoing commitment from leadership and integration into organisational governance structures. Security is not a one-time project but a continuous process of assessment, improvement, and adaptation.
Board and executive leadership play a crucial role in establishing security culture and ensuring adequate resources are allocated to protect patient data.
Healthcare organisations increasingly rely on third-party vendors for critical services. The NCSC reports that supply chain attacks targeting third-party suppliers are an increasing trend across the sector.
Technical controls alone are insufficient. Healthcare staff at all levels must understand their role in protecting patient data and recognising potential threats.
Improving cyber security can feel overwhelming, particularly for resource-constrained healthcare organisations. The key is to start with high-impact, foundational controls and build systematically from there.
We recommend prioritising improvements in this order:
Healthcare organisations in Australia and New Zealand operate under specific privacy and security obligations that require prompt action when breaches occur.
Both jurisdictions are increasing scrutiny of healthcare data security practices. The recent ManageMyHealth incident resulted in immediate government review and will likely influence future regulatory expectations across the Trans-Tasman region.
The threat landscape facing healthcare organisations will continue to evolve throughout 2026 and beyond. Ransomware groups are becoming more sophisticated, attack methods are diversifying, and the value of healthcare data continues to attract criminal attention.
However, organisations that take a systematic, risk-based approach to cyber security can significantly reduce their exposure. The measures outlined in this article represent proven practices that demonstrably improve security outcomes.
Most importantly, cyber security is not solely a technology challenge. It requires commitment from leadership, engagement from staff across the organisation, and integration into core business processes. Healthcare organisations that treat security as a strategic imperative, rather than a technical burden, are best positioned to protect the patients who trust them with their most sensitive information.
Since the publication of this article, significant new developments have emerged regarding the ManageMyHealth breach that warrant attention from healthcare organisations across Australia and New Zealand.
ManageMyHealth confirmed on 6 January 2026 that all patients whose documents may have been accessed in the incident have now been identified, with the final count at approximately 120,000 affected individuals. The organisation is currently working through the Privacy Act notification process for each affected person in conjunction with Health NZ and the Office of the Privacy Commissioner.
The company has obtained interim injunction orders from the New Zealand High Court, legally preventing any third party from accessing or sharing the stolen data. This represents an important legal safeguard, though it does not eliminate the risk of unauthorised disclosure.
New information has emerged about the threat actor behind this breach that adds complexity to the incident. The individual or group operating under the alias "Kazu" has made political statements suggesting potential ideological motivations beyond pure financial gain.
On 6 January 2026, the Kazu-affiliated messaging channel posted "Free Nicolás Maduro!!!!" following the capture of Venezuelan President Nicolás Maduro by United States forces on 3 January. The threat actor has previously claimed to be based in Cuba and has allegedly targeted organisations across multiple countries including Nepal, United States, Argentina, Bolivia, Costa Rica, Iran, Mauritania, Mexico, Sri Lanka, Thailand, and Venezuela.
What does this mean for the threat landscape? This development suggests that some cyber attacks on healthcare organisations may have mixed motivations combining financial gain with potential state-sponsored or ideologically driven objectives. However, the fundamental vulnerability exploited in this case, a broken access control flaw, remains a basic security failure that sophisticated defensive measures could have prevented.
The New Zealand Department of the Prime Minister and Cabinet has issued strong warnings discouraging any organisation from paying ransoms to cyber criminals. Key points from this guidance include:
This guidance reinforces why robust backup and recovery capabilities are so critical. Organisations with tested, immutable backups can recover from ransomware attacks without facing the impossible choice of whether to pay criminals.
These developments underscore several critical points for healthcare providers across Australia and New Zealand:
1. The threat landscape is complex and evolving. Healthcare organisations may face attacks from purely financial criminals, ideologically motivated actors, or state-sponsored groups. Regardless of attacker motivation, strong security fundamentals remain your best defence.
2. Legal and regulatory consequences are real. Beyond the immediate damage of a breach, organisations now face potential legal liability if they make ransom payments to sanctioned entities. This makes preventive security measures even more critical from a risk management perspective.
3. Basic security hygiene still matters most. Despite the geopolitical complexity surrounding this particular threat actor, the vulnerability exploited was a fundamental access control flaw. The security measures outlined in this article, particularly strong authentication, access controls, and regular vulnerability assessments, would have prevented this breach regardless of who was behind it.
4. Backup and recovery is insurance. With ransom payments potentially illegal and certainly ineffective, having reliable, tested backup and recovery processes is no longer optional. It's the difference between a manageable incident and an existential crisis.
The geopolitical dimension of this breach may be new, but it doesn't change the fundamental security principles that protect healthcare organisations. The practical roadmap outlined in this article, from immediate 0-30 day priorities through to long-term security maturity, remains the most effective approach to protecting patient data.
If anything, these developments make the case for systematic security improvements even more urgent. Healthcare organisations cannot predict whether the next attack will come from opportunistic criminals or more sophisticated actors, but they can ensure that basic security controls are in place to defend against both.
Sources:
At Insicon Cyber, we are experienced in helping healthcare organisations across Australia and New Zealand strengthen their cyber security posture. Our team understands the unique challenges facing the healthcare sector, from legacy systems to regulatory compliance, and we deliver practical, risk-based solutions that work in real-world healthcare environments.
Don't wait for a breach to take action. Contact Insicon Cyber today to discuss how we can help your organisation build a stronger, more resilient security posture.
How the FIIG Securities Penalty Validates What We've Been Advocating: Board Education and Practical Cyber Security The Message Every Board Should...
Residential Proxies: The Growing Cybercrime Threat When we think about cybersecurity threats, we often picture sophisticated malware or...
28 January 2026
As Cyber Security Awareness Month in Australia and Cyber Smart Week in New Zealand draw to a close, organisations across both nations face a critical...
Residential Proxies: The Growing Cybercrime Threat When we think about cybersecurity threats, we often picture sophisticated malware or...
The Strategic Imperative for Australia and New Zealand Boards Every six minutes, a cybercrime is reported to the Australian Signals Directorate....