ASIC is taking cybersecurity seriously—really seriously. In a rare move, it’s launched civil proceedings against FIIG Securities following a data breach that exposed 385GB of sensitive client data. This isn’t just a finance sector issue. It’s a wake-up call for every Australian business.
Follow us on our channels:
In 2023, the Australian Securities and Investments Commission (ASIC) initiated civil proceedings against FIIG Securities. It marked only the second time in ASIC’s history that such legal action was taken in response to a data breach. That’s a huge deal.
For context, FIIG is a fixed-income investment firm—hardly a household name, but a significant player in the financial services sector. According to ASIC, FIIG failed to maintain adequate cybersecurity measures over a four-year period. That alleged failure allowed attackers to remain undetected on their network for weeks, eventually stealing nearly 400GB of data and leaking it on the dark web.
The breach affected around 18,000 clients.
And ASIC didn’t mince words. They called it a “wake-up call” for not just FIIG, but every organisation, especially those entrusted with sensitive client data. And in today’s digital economy, that’s almost everyone.
So, what’s changed? Why is ASIC suddenly cracking down?
The answer lies in how cybersecurity is now being treated under Australian financial services law—and the broader legal expectations for risk management and governance in digital systems. We’re seeing a shift from cybersecurity as a best practice to cybersecurity as a legal obligation.
For Australian businesses, especially those dealing with client data, financial transactions, or cloud infrastructure, this case sets a precedent.
This includes:
Here’s the tricky part. There’s no universal checklist. No one-size-fits-all solution.
Russell, CEO of First Focus (a leading managed IT services provider in Australia and New Zealand), puts it plainly: “That’s actually one of the challenges—there’s not one answer to what ‘adequate’ looks like.”
Yes, there are frameworks—like the Essential Eight, ISO 27001, and NIST CSF. But those are guidelines, not guarantees. The key isn’t just ticking boxes. It’s whether your security strategy:
The legal action might focus on policies and procedures, but the real-world consequences are human. When FIIG’s systems were breached:
If you’ve ever had your data exposed in a breach, you know how violating it feels. For businesses, the fallout isn’t just legal—it’s emotional and financial. And in this case, avoidable.
Whether you’re a CIO, business owner, compliance officer, or just someone who occasionally opens dodgy email attachments (hey, no judgement), here’s what this case should trigger in your organisation:
Cybersecurity isn’t an IT issue. It’s a business issue. It’s about governance, strategy, and risk—not just firewalls and antivirus software. Executive leadership must be involved in the decision-making process and budgeting for security.
When was your last risk assessment? Do you have a security roadmap? Can you say with confidence where your data lives, who has access to it, and how it’s protected?
If not, now’s the time for a gap analysis.
Choose a framework that suits your business size and industry. In Australia, the Essential Eight is a great baseline. Pair it with internal audits or third-party assessments.
And don’t just leave it in a policy document. Make it part of your actual operations.
Prevention is critical, but so is detection. The attackers in the FIIG case remained undetected for weeks. That’s an eternity in cyber time.
Invest in:
People are your biggest risk—and your biggest asset. Make cyber training engaging, ongoing, and tailored to real risks (like phishing, MFA fatigue, and social engineering).
And yes, even executives need training.
No matter your internal capabilities, it’s worth having trusted partners—especially when it comes to auditing, compliance, and incident response. Whether you work with an MSP, MSSP, or cyber consultancy, having external eyes on your environment is invaluable.
ASIC’s case hinges on what FIIG did (or didn’t) do over four years. That kind of long-term view is exactly what regulators will take if you’re ever in the spotlight.
Keep a record of:
Think of it as your legal alibi.
If you think this is just a one-off, think again. ASIC’s action signals the start of a new enforcement era, not the end of it.
They’re using existing laws—not new legislation—to hold companies accountable. That means:
…you could be next.
And it’s not just regulators watching. Clients, partners, and even your cyber insurer may soon be knocking.
At First Focus, we’re already seeing more clients wanting:
And honestly? That’s the right move. You don’t want to wait until there’s a leak, a lawsuit, or a regulator on your doorstep.
The FIIG case is about more than one company’s failings. It’s a turning point for cybersecurity accountability in Australia.
It proves that “she’ll be right” no longer cuts it.
It shows that frameworks, when ignored, won’t protect you.
And it reminds us that trust—of regulators, clients, and communities—is hard to earn, and heartbreakingly easy to lose.
If you’re an Australian or New Zealand business unsure whether your cybersecurity measures are up to scratch, now’s the time to act. Book a Cybersecurity Health Check, review your data protection strategy, or have a chat with our team about where your risks might lie.
Because when it comes to cyber risk, the worst response is no response at all.