The cyber threat to Australia reaches from schools and the local fish and chip shop to large companies and now the COVID-19 vaccine supply chain.
"Malicious and dangerous cyber activity in Australia is happening all the time," Telstra chief executive Andy Penn told the National Press Club from Melbourne on Thursday.
Ransomware is the fastest growing threat, and most attacks involve malicious software being introduced into a victim's system and encrypting data, which makes it unusable until a ransom is paid.
"Ransomware gangs are also now using a 'double extortion technique', where a copy of the data is stolen, or exfiltrated, before it is encrypted," he warned.
So even if the victim can restore systems, they have the double jeopardy of crucial and sensitive information being published on the dark web if the ransom is not paid.
Australia's logistics giant Toll Group was taken offline twice last year by ransomware attacks, causing delivery delays across the country, and did not pay a ransom.
Nor does Telstra pay ransoms.
The telecommunications giant is also working with the government to monitor the country's vaccine supply chains for threats.
With more people working from home during lockdowns, workplaces have become even more vulnerable.
"Most Australians and Australian businesses are still ill-prepared for a direct cyber attack on them," Mr Penn said.
New laws before parliament will bring in a tougher cyber security reporting and risk management regime, and enable federal cyber detectives to reach into companies' systems to detect hackers and foreign adversaries.
Some MPs have called for other new laws to make ransomware payment reporting mandatory, or illegal.
Prime Minister Scott Morrison confirmed last year that Australia was being targeted by a "sophisticated state-based cyber actor", which security experts say is code for China, Russia or North Korea.
Mr Penn said Telstra detects malicious activity across their networks all of the time by cyber criminals and foreign countries.
For cyber warfare, Australia needs government agencies to be able to work alongside operators of critical infrastructure to protect the national interest, even if that disrupts electricity, water supplies or health care.
"Nobody knows better than us how to run a telecommunications network, but also we're not necessarily experts at international cyber activity from a defence and warfare perspective," Mr Penn said.
He leads the federal government's cyber security industry advisory committee, which released its first annual report on Thursday.
Cyber crime cost Australia $3.5 billion last year, and individuals continue to be at risk from identity theft and fraud.
A pilot service for government agencies, which blocks known "bad" domains or malicious actors, has handled one billion queries and blocked more than 125,000 threats.
A new cyber threat intelligence sharing network will cover the telecommunications, financial services, energy, cloud and defence industry sectors.
The Australian Signals Directorate is already running offensive operations, with offshore partners.
The foreign intelligence and cyber warfare agency has helped to take down more than 6000 websites hosting cybercriminal activity, and disabled networks of offshore criminals responsible for stealing money and data from Australians during the COVID-19 pandemic, the report said.
Cryptocurrency will be a focus for more tracking in the year ahead, as criminals rely on it for payment in most ransomware attacks.