
Purpose of this information
Cyber threats pose a real risk of digital environments all over the world. Australians are targeted by bad actors every day using ever changing and new innovative methods. Instances can range from simple identity thief to capital loss in the millions. Don’t let your business or identity become a victim of crime.
The good news is increasing your cyber security doesn’t have to be a headache. An set of measures need to be implemented to reduce risk and protect your business, staff and clients.
Your obligations
These measures provide best practice and references Australia Cyber Security Centre (ACSC), the Corporate Act, Commonwealth Privacy Act and the ASIC Cyber Resilience REP 429 . We believe it is essential that Australian business and individuals have cyber resilience in preparing for, responding to and recovery from cyber attacks.
Key areas of risk
- Malicious Software (Malware)
- Scam Email (Phishing)
- Randsomware
- External Networks
- Portable devices (USB Sticks)
- Internal Employee Risks
Solution
All business should adhere to a basic cyber policy. A set of mandatory requirements in line with the Australian standard framework which provide a list of prioritised mitigation strategies to protect against cyber security incidents. A cyber policy should be a evolving documented that builds on a foundation of best practice and is updated regularly.
As a company that is dedicated to helping small business stay resilient. We can offer services that support your business, employees and clients to a cyber hygiene. We are a fully insured business with Cyber and liability insurance for this purpose. We are also qualified IT professionals with 25 years experience in IT Support. We stay ahead of emerging technology and security developments to bring you a wealth of experience of real world issues.
We will create a roadmap to an essential strategy, a self assessment risk analysis that identifies and implements some key areas of action.
A basic strategy includes:
- Software updates, patching
- Automated backup strategies
- Multi Factor Authentication
- Access Controls
- Password Control
- Employee Training