When Australia’s largest airline confirmed a cyber incident affecting millions of passengers, it wasn’t a sophisticated hack that triggered alarm bells — it was a trusted third-party vendor.
Although no sensitive financial data was exposed, the incident has raised serious concerns about customer privacy and highlighted one of cybersecurity’s most persistent weak spots: human error.
In this blog, we’ll explain what happened and what every organisation can learn from it.
What Happened?
On 30 June 2025, Qantas detected unusual activity on a third-party platform used by its airline contact centre. The breach is believed to have affected up to 6 million customers.
The exposed data included:
- Names
- Contact details
- Dates of birth
- Frequent flyer numbers
While the airline confirmed that credit card details, passport information, and personal financial records were not compromised, brief unauthorised access to travel data can still cause long-term reputational damage.
Key Lessons for Businesses
This isn’t just about Qantas — it’s a warning to any organisation working with vendors, managing customer data, or relying on human processes.
1. Your Vendors Are Part of Your Security Perimeter
The breach originated from a third-party call centre. If suppliers aren’t being audited for security training, access controls, and data handling, your defences are only as strong as their weakest link.
2. People Are the Easiest Entry Point
Attackers don’t need custom malware to cause damage — they need someone to click the wrong link, answer the wrong call, or skip protocol. Human risk is not theoretical; it’s an everyday reality.
3. “Low-Sensitivity” Data Still Has High Consequences
Email addresses, loyalty numbers, and contact details can all be exploited for phishing, scams, and identity theft. Businesses that dismiss this as “low-risk” data put themselves at greater risk of cascading threats.
4. Compliance Isn’t Just Paperwork — It’s Protection
Under Australia’s Notifiable Data Breaches (NDB) scheme and the upcoming Privacy Act reforms, organisations must act fast if a breach could cause harm. A tested incident response plan and proof of due diligence can help limit regulatory fallout.
5. Cybersecurity Starts with Culture, Not Software
Technology alone can’t stop breaches. Continuous, role-specific security training — extended to vendors and third parties — creates a culture of awareness and accountability that minimises human error.
Human Risk Is Now a Board-Level Issue
The Qantas breach shows that even global brands with advanced IT infrastructure are exposed when human risk is overlooked.
As regulators around the world (including Australia) intensify scrutiny of data protection, the cost of underestimating human behaviour in cybersecurity will only increase.
The next steps for organisations are clear:
- Invest in ongoing security awareness training
- Implement robust access controls
- Foster a security-by-design culture
How usecure Helps Reduce Human Risk
usecure enables businesses to tackle human risk with:
- Automated security awareness training
- Phishing simulations
- Policy management
- Dark web monitoring
Together, these tools help you improve employee behaviour, prove compliance, and build a lasting security-first culture.
👉 Get in touch today to learn how usecure can help your organisation reduce human risk and protect sensitive customer data.
Subscribe to newsletter
Discover how professional services firms reduce human risk with usecure
See how IT teams in professional services use usecure to protect sensitive client data, maintain compliance, and safeguard reputation — without disrupting billable work.
Related posts
Lorem ipsum dolor sit amet, consectetur adipiscing elit.




