Breaking down Australia’s plan to combat AI-driven phishing scams

Across Australia, cybercrime continues to be a major challenge impacting businesses, critical infrastructure and consumers alike. The use of AI by bad actors across the spectrum of cybercrime is on the rise, and as a result, credential phishing scams are becoming increasingly sophisticated. AI is effectively helping to lower the cost of phishing and increase the amount of attacks with automation – all while creating more convincing scams which make them harder to detect.

Understanding that phishing threats still loom large, the Australian Government is taking action to become truly phishing-resistant as a country. The good news is that phishing resistance is a solvable challenge with the right approach and tools in place: Initial strategic cybersecurity efforts have been successful, including the Australian Government’s Cyber Security Strategy 2023-2030 and an impactful update to the Maturity Model for the Essential Eight where phishing-resistant MFA is among the eight mitigation strategies.

In response to continued rising phishing-based scams throughout the country, the government recently introduced the Scams Prevention Framework (SPF) Bill – a significant legislative step towards combating fraud and strengthening consumer protection, including penalties for non‑compliance. The bill presents many positive actions against phishing, including focusing on regulated entities within banking, telecommunications and digital platform service provider sectors – all areas where consumers are most active. However, there are some areas of improvement the bill can address to enable Australia and its citizens to become cyber resilient – including extending focus to other key industries. 

Geoff Schomburgk, APJ sales director at Yubico, recently sat down with Ticker News to discuss the Scams Prevention Framework and how the government can approach broader safeguards and protection against the rise of sophisticated phishing attacks on businesses and consumers. Check out the full interview below, and contact our team with questions about getting started with phishing-resistant YubiKeys today.

Talk to our teamTalk to our team

Share this article:


  • Works with YubiKey Spotlight: Passkeys are here – are you ready?With 2025 at its midpoint, enterprises worldwide are grappling with how to protect their users and data against emerging challenges around user security. Since 2022, generative AI has fueled a 4,000% surge in phishing – exploiting human vulnerability in 68% of breaches. It’s no longer a question – the world has a password problem that […]Read morepartnerspasskeysWorks with YubiKeywwyk
  • Yubico LogoYubico liefert PIN-Verbesserungen mit dem neuen YubiKey 5 – Verbesserte PIN-SchlüsselUm sich auf die sich ständig weiterentwickelnden Cyber-Bedrohungen vorzubereiten, passen Regierungen weltweit die Authentifizierungsanforderungen für Online-Dienste an und aktualisieren sie, was direkte Auswirkungen auf viele Unternehmen und deren Mitarbeiter hat. Zwar gibt es derzeit keine universelle Regelung für eine robustere Multi-Faktor-Authentifizierung (MFA), doch wird deren Notwendigkeit in einer Reihe von Anforderungen hervorgehoben, darunter PSD2, DSGVO […]Read moreYubiKey
  • Yubico delivers PIN advancements with new YubiKey 5 – Enhanced PIN keysTo prepare for continuously evolving cyber threats, governments around the world are adapting and updating authentication requirements for online services which directly impact thousands of organizations and their employees. While there’s currently no universal regulation for more robust multi-factor authentication (MFA), the need is highlighted across a range of requirements including PSD2, GDPR, and the […]Read moreCompany NewsProduct NewsYubiKeyYubiKey 5 – Enhanced PINYubiKey 5 SeriesYubiKey as a Service
  • An inside look at Yubico’s transition to passwordlessBefore “passkey” became a familiar term in our industry, Yubico had long delivered hardware-backed and phishing-resistant FIDO2 based authentication. Today, the adoption of passkey usage is accelerating. However, it’s taken quite a bit longer to integrate passwordless authentication into the everyday, enterprise-grade authentication flows that are required for today’s businesses.  As long as it’s been […]Read moreOktapasswordless