Prime Minister and Cabinet scolded for Gmail, Hotmail use

Weak passwords, web-based emails and unpatched software revealed by audit office

The Department of Prime Minister and Cabinet has vowed to block access to public Cloud-based email websites on work computers it administers, after the auditor-general found use of Gmail and Hotmail accounts by staff risked internal information.

An audit (PDF) of the Australian Office of Financial Management, ComSuper, Medicare Australia and the Department of the Prime Minister and Cabinet released this week found lax ICT security practices among all four agencies, including use of weak passwords and poor processes.

In particularly, the audit found staff at the Department of Prime Minister and Cabinet used unencrypted public Web-based email accounts on services like Gmail and Hotmail. Logs obtained by the Australian National Audit Office (ANAO) revealed some staff had used the accounts on a regular basis.

In its report, the audit office recommended the use of public accounts be blocked on agency ICT systems to prevent external attacks and information leaks. The department agreed it would block the services from 1 July in response to the report.

In its review of ICT security practices at other agencies, a password test applied by the office found all four agencies had weak passwords on IT administrator and service accounts.

“These accounts, which allow a high level of access across ICT systems, should use suitably complex password configurations to reduce the potential for inappropriate access,” read the audit.

The ANAO also discovered one agency lacked a documented process for reviewing Internet access logs, increasing the risk of exposing the agency to external intrusion.

Two agencies were using third party software applications with outdated patches.

“Patches should be applied accordingly, to better protect their security, especially given their known vulnerability to attack,” read the report.

Other recommendations included the use of content filtering to prevent access to inappropriate websites and using certification for internal network gateways.

“While each agency had appropriate certification for their main Gateways, two agencies were also using uncertified Gateways. The use of uncertified Gateways exposes the agencies to an increased risk of unauthorised access from outside the internal network,” read the report.

Overall, the ANAO found that the audited agencies were complying with ICT security requirements, however it recommended all agencies review the integrity of administrator account passwords.

The release of the audit follows a similar report conducted by the New South Wales auditor general ,Peter Achterstraat, in February 2010 into NSW state departments.

It found that while testing performed by experts found no major security flaws, several opportunities to improve electronic information security existed.

This included the government database access not being secured in Web applications, which would potentially leave databases open to SQL injection attacks and consequently data theft.

In addition, the failure to terminate remote access sessions, transmission of data between systems and remote applications in easily read and modifiable form, weak encryption methods, login credentials stored by the user’s Web browser, and out of date operating system software with known vulnerabilitys were also identified as areas where IT security could be improved.

Follow Hamish Barwick on Twitter: @HamishBarwick

Follow Computerworld Australia on Twitter: @ComputerworldAU

Join the CSO newsletter!

Error: Please check your email address.

Tags Australian National Audit Office (ANAO)Department of Prime Minister and Cabinet

More about Australian National Audit OfficeAustralian National Audit OfficeetworkHotmailNational Audit Office

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Hamish Barwick

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place