Matthew Miller, Author at Techbest - Top Tech Reviews In Australia - Page 30 of 30

NSW Government’s $300 Million Regional Mobile Initiative Fails to Deliver, Reaching Less Than 2% of Target


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

NSW Government’s $300 Million Regional Mobile Initiative Falls Short, Achieves Less Than 2% of Goal

NSW gov's $300m regional mobile program delivered less than two percent of target

Quick Read

  • The NSW Government’s $300 million investment seeks to enhance mobile coverage.
  • The program achieved only 700 square kilometers of coverage, falling short of the intended target of 36,000 square kilometers.
  • The audit uncovers inadequate management and irregular project business cases.
  • Notable project delays and excessive costs were discovered.
  • Updated goals established for December 2024 and December 2028.

Introduction

The New South Wales (NSW) Government’s bold $300 million Regional Digital Connectivity program (RDCP), designed to improve mobile network coverage, has significantly missed its targets. Initially set to enhance mobile connectivity over an area of 36,000 square kilometres by June 2023, the project successfully covered just 700 square kilometres, as revealed by a recent audit.

Program Overview

Introduced in 2019, the RDCP also encompasses the $100-million Gig State program aimed at enhancing internet connectivity in regional areas. Nevertheless, the initiative has encountered significant criticism for its mismanagement and underestimated cost forecasts. An audit by NSW revealed that the overall goals of the RDCP are still not clearly defined, and inconsistent business cases have further complicated the implementation of the program.

Deficiencies and Delays

The RDCP aimed to offer grants to commercial telecommunications companies for mobile and internet initiatives. Nonetheless, every RDCP project missed its deadline. The audit office was unable to find any proof showing how the department tracked project advancement, resulting in considerable hold-ups. Certain projects were extended by more than a year past their intended completion dates.

The report indicated that inadequacies in project and risk management have led to delays in the program’s implementation. Although some delays were outside the government’s influence, others might have been better handled with proactive risk management tactics.

Significantly Higher Costs

Auditors highlighted one particular project: the construction of a fiber network in the Wamboin, Bywong, and Sutton regions. Despite initial higher cost estimates, the Department of Regional NSW proceeded with a budget of $5 million. Ultimately, costs escalated to over $12 million, necessitating additional funding to finish the project.

“The auditor noted that the budget was inadequate, leading to a more complicated and lengthy process, and stressed that following earlier advice could have made operations more efficient.”

Revised Targets

Following the audit results, the NSW government has established new objectives. They now plan to provide 12,279 square kilometers of additional mobile coverage by December 2024, with an expansion to 60,000 square kilometers by December 2028. These updated targets aim to address previous deficiencies and improve mobile connectivity throughout regional NSW.

Summary

The $300 million Regional Digital Connectivity program by the NSW Government has encountered considerable challenges in meeting its ambitious objectives. As of June 2023, merely 700 square kilometres have been covered out of the intended 36,000 square kilometres. The endeavor has suffered from ineffective management, fluctuating business cases, and notable cost overruns. New targets have been established for December 2024 and December 2028 to tackle these problems and enhance mobile connectivity in regional regions.

What was the original objective of the RDCP?

A:

The primary objective was to enhance mobile coverage over an area of 36,000 square kilometres in New South Wales by June 2023.

How extensive was the actual mobile coverage?

A:

By the specified deadline, only 700 square kilometers of mobile coverage had been attained.

What were the primary concerns discovered during the audit?

A:

The audit uncovered key issues such as inadequate management, inconsistent project business cases, major delays, and budget overruns.

Q: What updated goals has the NSW Government established?

A:

The updated goals are set to achieve 12,279 square kilometres of new mobile coverage by December 2024 and increase this to 60,000 square kilometres by December 2028.

Which particular project experienced notable cost overruns?

A:

The installation of a fiber network in the Wamboin, Bywong, and Sutton areas faced substantial cost overruns, rising from an original budget of $5 million to more than $12 million.

How did shortcomings in management lead to delays?

A:

Shortcomings in project and risk management resulted in considerable delays in finishing projects, with several being postponed by more than a year past their intended deadlines.

What does the Gig State initiative entail?

A:

The Gig State project is a $100-million endeavor as part of the RDCP, focused on enhancing regional internet connectivity in New South Wales.

To learn more about this subject and other technology updates, check out TechBest.

CMF by Nothing Buds Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

CMF by Nothing Buds Wireless Earbuds with 42dB ANC, Transparency Mode, Ultra Bass Technology 2.0, Dirac HD Audio, IP54 Dust and Water Resistance and Dual Device Connection – Orange

TeamViewer Accuses Russia-Associated Hackers of Major Cyberattack


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

TeamViewer Accuses Russia-Linked Hackers in Significant Cyberattack Claims

TeamViewer Claims Cyberattack by Hackers Linked to Russia

TeamViewer Targets Russia-Linked Hackers in Major Cyberattack Allegation

Quick Read

  • TeamViewer was targeted in a cyberattack, reportedly by the Russian group APT29.
  • APT29, also referred to as “Cozy Bear,” has connections to the Russian foreign intelligence service.
  • No customer information or product area was compromised.
  • The incident underscores the persistent cybersecurity threats facing global organizations.

TeamViewer’s Cyberattack Ordeal

German software firm TeamViewer disclosed a cyberattack earlier this week, blaming the breach on the Russian hacker group APT29, which is also referred to as “Cozy Bear” or Midnight Blizzard. This group is infamous for its connections to Russia’s foreign intelligence agency.

Who is APT29?

APT29 is an advanced cyber espionage organization thought by Western intelligence to be working on behalf of Russia’s foreign intelligence service. This group has been associated with numerous significant cyberattacks, such as the notorious SolarWinds breach.

Previous Involvements

In March, Alphabet’s Mandiant cyber unit discovered that APT29 was trying to trick significant German political figures with phishing emails. This event highlights the group’s ongoing attempts to penetrate high-value targets.

Impact on TeamViewer

TeamViewer focuses on cloud-based technologies that facilitate remote computer access and control. They reported that hackers breached their corporate IT infrastructure, but did not reach the product environment or any customer information. This containment averted potentially disastrous outcomes for the company and its users.

Implications for Cybersecurity

This attack underscores the persistent danger presented by hacking groups backed by nation-states. Organizations globally need to continually improve their cybersecurity protocols to safeguard sensitive data and uphold the integrity of their operations.

Summary

The recent cyberattack on TeamViewer, executed by the Russian-linked hacker group APT29, highlights the ongoing and evolving threats within the digital realm. Although TeamViewer managed to control the breach, the event emphasizes the critical need for strong cybersecurity strategies for organizations worldwide.

Frequently Asked Questions: Essential Inquiries Addressed

Q: Can you explain what TeamViewer is?

TeamViewer, a German software firm, offers cloud-based solutions for remote access, control, and support across multiple computing devices.

APT29, also known as Cozy Bear, is a Russian cyber espionage group affiliated with the Russian intelligence agencies, specifically the SVR (Foreign Intelligence Service) and the FSB (Federal Security Service). This group is known for its sophisticated and persistent cyber operations targeting government, military, security, and other organizations globally, with the intent to gather intelligence and conduct cyber espionage.

APT29, also known by the names “Cozy Bear” or Midnight Blizzard, is a hacker organization suspected to be connected to Russia’s foreign intelligence service and is engaged in various cyber-espionage operations.

Q: In what way did APT29 infiltrate TeamViewer?

Group members accessed TeamViewer’s corporate IT infrastructure but did not breach the product environment or jeopardize customer information.

Q: What makes this attack important?

The assault emphasizes the ongoing risk from state-backed hacking groups and underscores the necessity for strong cybersecurity protocols for organizations globally.

Q: What measures can organizations take to safeguard themselves?

Organizations ought to allocate resources toward robust cybersecurity strategies, consistent monitoring, employee education on phishing threats, and prompt updates of software and systems.

AFL and Okta Collaborate to Transform Digital Security and Identity Management


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AFL and Okta Collaborate to Transform Digital Security and Identity Management

The Australian Football League (AFL) has made considerable headway in protecting its digital identities and sensitive data. Partnering with Okta, the AFL has boosted both its security and operational effectiveness, serving as a model for other organizations in the digital realm.

Addressing Complex Security Issues

Rob Pickering, the AFL’s CTO, and Phil Goldie, Okta ANZ’s Vice-President and Managing Director, shared insights into this transformative journey during a recent podcast. Pickering discussed the intricate security issues the AFL encountered prior to adopting Okta’s solutions.

“We encounter the same challenges as many organizations, with swiftly changing threats and numerous business applications that need securing,” remarked Pickering. As the AFL moved towards cloud-based applications and a more dispersed workplace, it became vital to understand who was accessing systems and when.

The transition to using Okta was driven by the need for a seamless employee experience alongside strong security measures. “Our staff need only one portal to log into,” Pickering elaborated. “This simplifies onboarding and ensures all applications are accessible with a single click, improving both security and user experience.”

A Unified Digital Identity for AFL Fans

A crucial AFL initiative is creating a single digital identity for its 11 million fans, aimed at enhancing fan interactions with the AFL’s digital resources.

“We aim for all fans to have a seamless experience when interacting with AFL’s digital assets,” Pickering emphasized. By merging multiple digital identities into a single AFL ID, the organization can provide personalized experiences and gain valuable insights into fan preferences.

“Friction hinders adoption,” added Goldie from Okta. “When implementing additional security layers, it’s essential to maintain a smooth user experience. Cloud-based identity platforms like Okta effectively balance security and usability.”

‘Adaptive MFA’ Ensures Security and Usability

The AFL now benefits from Okta’s multifactor authentication (MFA) and identity governance, which simplify user account management and enhance security. “MFA is arguably the most crucial step in protecting your environment,” Pickering stated. With MFA, even if a username and password are compromised, an additional factor is required for system access.

Adaptive MFA specifically balances security and usability, ensuring users encounter minimal friction while maintaining strong security. “Cloud-based identity platforms add intelligence to MFA, facilitating technology adoption,” said Goldie.

Gaining a Competitive Edge

Goldie also pointed out that beyond adaptive MFA, Okta’s commitment to independence and neutrality provides a competitive edge. “This has been a core principle since our inception and continues to be a central focus going forward,” he stated.

Organizations, including the AFL, appreciate the importance of clear boundaries between applications while maintaining robust security and governance. Okta emphasizes identity isolation as a standalone, neutral platform compatible with various technologies, applications, and devices.

Future Technologies

Looking ahead, both Pickering and Goldie foresee emerging technologies like biometric authentication and behavioral analytics playing pivotal roles in identity management. “Technologies like pass keys and biometrics are gaining traction, offering more secure and user-friendly authentication methods,” Goldie noted.

These advancements are expected to further enhance the security and efficiency of identity management systems, marking significant progress for organizations like the AFL.

For more insights into the AFL’s digital transformation journey, visit [TechBest](https://techbest.com.au).

Summary

The AFL and Okta partnership marks a significant leap in digital security and identity management. Through Okta’s innovative solutions, the AFL has streamlined its operations while implementing robust security measures. This collaboration not only improves the employee experience but also significantly enhances fan engagement by consolidating multiple digital identities into a single AFL ID.

Q&A Session

What are the main benefits of the AFL’s partnership with Okta?

Key benefits include enhanced digital security, streamlined operations, improved employee and fan experiences, and simplified user account management through features like multifactor authentication (MFA).

How does Okta’s multifactor authentication (MFA) enhance security?

MFA requires multiple forms of identification before accessing systems. Even if a username and password are compromised, an additional factor (e.g., a code sent to a mobile device) is needed, adding an extra security layer.

What is ‘adaptive MFA’?

Adaptive MFA adjusts the authentication process dynamically based on factors such as user behavior and location. It ensures minimal user friction while maintaining robust security measures.

Why is it important to have a single digital identity for AFL fans?

A single digital identity simplifies interactions with the AFL’s digital resources, delivering a more personalized and seamless experience. It also enables the AFL to collect valuable insights into fan preferences, enhancing engagement strategies.

What future technologies are expected to impact identity management?

Emerging technologies like biometric authentication and behavioral analytics are expected to play significant roles. These advancements offer more secure and user-friendly authentication methods, further improving the efficiency of identity management systems.

How does Okta maintain its competitive edge?

Okta’s independence and neutrality allow it to provide identity solutions compatible with various technologies, applications, and devices. This approach gives organizations robust security measures while ensuring broad compatibility.

For additional information on digital transformations like this, visit [TechBest](https://techbest.com.au).