Cybersecurity – Is this business’ current greatest threat?
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from digital attack. In a computing context, security comprises cybersecurity and physical security – both are used by enterprises to protect against unauthorized access to data centres, computerized systems, and computing devices over the internet of things (IoT).
The most common cyber security incidents experienced are:
- Ransomeware or Scareware– extortion through malware locking computers until payment is made.
- Malware – malicious software created to be contracted so harm can be caused to data, software or hardware and includes:
- Viruses which attach themselves to clean files and infect other clean files
- Trojans which disguise themselves as legitimate software
- Spyware which hides in the background spying and gathering notes on what you do
- Worms which infect entire networks of devices either locally or across IoT
- Adware which is aggressive advertising software (really annoying)
- Theft or breach of confidential information – theft of confidential information
- Email phishing – attempts to trick you by sending hoax emails, getting you to click on dangerous links, or providing personal or financial information to an unauthorised source
- During 2017 claims 516,380 Australian small businesses fell victim to cybercrime.
- 25 hours was the average downtime when attacked.
- $4,677 was the average ransomware demand for SME’s
- $1.9 m was the average cost to medium to large business.
- ONE – the number of staff members that hackers need to dupe in order to gain access to your business’ data!
In order to minimize the prospect of a cyber incident, you can:
- Put one person in your business who is in management and has access to your data and assets in charge of cyber security – a Cyber Officer.
- Get everyone in your business on board from bottom up.
- Implement and maintain the latest anti-virus software.
- Consult with an expert in cyber security in addition to your IT Officer or external IT provider.
- Report, report, report – share each and every experience across everyone in your business, and with your customers.
- Regularly audit your online footprint so you can identify and prioritise your risks.
- Secure your systems, networks, (back ups, scans, sweeps etc)
- Use complex passwords.
- Consider cyber insurance.
For further advice on this topic please contact our team.
The Fair Work Regulations 2009 (Cth) were amended on 18 December 2018 with the aim of preventing this ‘double dipping’ by allowing employers to offset certain NES entitlements by paying casual employees a casual loading. ... read on
With Christmas only weeks away, it’s common for businesses to celebrate the end of the year through work functions and Christmas parties. Because the celebrations occur outside the usual work environment, it can be difficult to find the balance between setting the standard of what’s expected of employees and allowing everyone to have fun.... read on
Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from digital attack. In a computing context, security comprises cybersecurity and physical security – both are used by enterprises to protect against unauthorized access to data centres, computerized systems, and computing devices over the internet of things (IoT).... read on