Figures obtained under NSW's Government Information Public Access Act (GIPA) reveal that incidents involving third-party systems have more than quadrupled in just two years. In the 2023-24 financial year, 17 incidents were logged, more than double the 8 incidents in FY 2022-23, and over four times the number in FY 2021-22, which had only 4 such incidents.
These figures reflect systems owned or managed by external vendors or service providers being compromised and impacting government operations. The sharp increase comes alongside better reporting and classification: Cyber Security NWS adopted a structured framework around 2021 that enabled more consistent identification of third party incidents.
While those third-party incidents make headlines, the overall incident count is also notable, with over 200 cyber incidents being responded to by Cyber Security NSW in FY 2023-24.
To address this, the NSW government has allocated A$87.7 million over four years to bolster Cyber Security NSW and mitigate risks across the state, including those stemming from vendor or third-party systems. That follows an investment of A$20.3 million in the previous year.
These figures aren't just numbers, they carry implications for how businesses, integrators and service providers work in Australia:
Given the scale and pace of increase, here are actions organisations should prioritise:
These developments in NSW show a clear trend: third-party cybersecurity risks are rising sharply, and they're being recognised at state level with both policy and funding. For organisations involved in contracts, integration, supply chain or government services, this is a moment to reassess risk and resilience.