Over the 2020–21 financial year, over 67,500 cybercrime incidents were reported to the Australia Centre for Cyber Security (ACSC). This is an increase of nearly 13 per cent from the previous financial year, and equates to one cyber attack every 8 minutes compared to one every 10 minutes last financial year. Cyber-attacks are an extremely lucrative form of criminal activity, which is fueling a dramatic increase in the number of attacks on Australian businesses of all sizes.
Prevention is the best form of defence. Below we cover 10 risk management tips to protect your business and limit the collateral damage of a cyber-attack.
When formulating your cyber security strategy, it’s essential to start with an IT risk assessment. Assessing the risk involves collating a list of all potential threats that could impact your business e.g. malware, scams, human error. You will also need to evaluate how well your IT networks withstand real-world threats with a penetration test.
After assessing your risks, you will be in a position to:
This can be a complex process. Engaging an IT specialist to assist can be highly valuable. (Source: EmpowerIT Solutions)
There are several basic security steps to help reduce the risk of your IT network being compromised, and business operations disrupted.
Software updates
Make sure your operating systems and security software update automatically. This will help ensure important security upgrades for recent viruses and attacks are protecting your systems. Updates often fix major security failings.
Security Software
Prevent security compromises by installing security software on business IT networks and all connected devices. Make sure the software includes anti-virus, anti-spyware and anti-spam filters.
Firewalls
Set up a firewall to shield internal networks from invasion in a cyber-attack. A firewall acts as a gatekeeper between your IT infrastructure and the internet. It must be installed on all portable company devices to be effective.
Spam-filters
Ensure you have a strong spam filter to minimise the number of ‘phishing’ emails your business receives. Phishing emails come from unknown sources and often contain links or files that when clicked, give the sender unauthorised access into your IT network. A spam-filter can reduce the number of malicious emails that come through, along with the risk of you or an employee opening them.
Passwords
a) Set a company protocol for strong passwords
Make sure strong passwords of letters, numbers and special characters are used to protect all devices that hold or provide access to important business assets.
Tip:
– Make it long – nothing shorter than 15 characters if possible
– Use a mix of characters – uppercase and lowercase letters, symbols
– Change passwords periodically
For more password tips click here: https://www.business.gov.au/Risk-management/Cyber-security/Make-sure-your-passwords-are-secure
b) Use Two-factor authentication (2FA)
2FA is a two-step verification process users need to pass before accessing network accounts. Examples include entering a password, as well as a unique code sent to your mobile phone, or your fingerprint. 2FA adds an additional layer of security over a single password.
c) Admin account privileges
Administrative privileges allow specific individuals to carry out more sensitive tasks than a ‘normal’ system user. Admin account holders can install new programs, create new accounts or change network settings. Cyber criminals will often seek admin privileges to gain high level network access and elicit control over your business.
Reduce the risk by:
Learn more: https://www.cyber.gov.au/acsc/view-all-content/publications/restricting-administrative-privileges
Monitor use of computer equipment and systems
Keep an inventory of all devices, IT equipment and software your business uses, and who is using them. Ensure they are all secure with appropriate upgrades, password settings, 2FA etc.
If equipment is no longer required, it’s important to wipe any sensitive information before disposing.
Tip:
Make sure access is removed for any past employees – this is a common security hole.
Working from different locations
With COVID-19 causing long-term changes to the way we work, it is essential to ensure security measures apply whether you and your employees are working from the office, home, or any other remote location.
Make sure your website, business records and essential data are backed up in case they become compromised in a cyber-attack. This can help place your business recover quickly and with minimal impact to operations following an attack.
Make sure backups are performed regularly and using multiple backup methods should one or more of your data storage systems be compromised. A quality backup system can include:
Tips:
Make sure your ‘network encryption’ settings are switched on. This helps ensure important data is encrypted into a secret code when stored or sent online, minimising the risk of data theft, destruction and tampering.
Part of cyber risk management is creating a company culture that promotes good cyber security practices. A structured Cyber Security Policy can go a long way to ingrain this as company culture, and protect your organisation from online threat actors.
A Cyber security policy should outline:
A Cyber Security Policy is particularly important if you employ staff. It can help communicate the role each employee has in protecting technology and data assets. A cyber policy should set out the following to guide your team:
For more information on developing a Cyber Security Policy for your business visit: https://www.business.gov.au/risk-management/cyber-security/how-to-create-a-cyber-security-policy
Unfortunately no IT system is 100% impenetrable. This is demonstrated by the number of reputable companies like Yahoo, Toll, BlueScope as well as various government agencies that have recently experienced cyber-attacks and data breaches. Therefore, no matter how well-protected your systems are, it is vital to have a well thought out Cyber-Attack Response Plan.
Tips:
It is essential to protect your customer’s personal information. This is for their wellbeing, as well as for your company reputation and compliance with Australian legal obligations.
Tips:
For more information click here: https://www.business.gov.au/Risk-management/Cyber-security/How-to-protect-your-customers-information
Several reports by the Office of the Australian Information Commissioner have revealed that human error and phishing attacks are one of the leading causes of data breaches. Based on this, it is essential to educate and train your staff on:
Well trained staff can be your first line of defence.
Cyber-attacks can cause serious financial losses to businesses who are impacted. This is where Cyber Insurance comes in.
Cyber Insurance is designed to help protect your business from the financial impact of a computer hacking or a data breach. This risk exposure is not covered by a traditional business insurance policy. Cyber Insurance assists in coordinating a cyber-attack incident response and recovery, engaging specialists to help your business return to normal as soon as possible.
Cover generally includes protection for:
First party losses
Third party losses
Additional expenses
The cyber security environment is continually evolving. In order to stay on top of new cyber threats and ensure your business is poised with strategies to protect itself, make you are monitoring the trends.
Tip:
Subscribe to the Australian Cyber Security Centre’s Alert Service for up-to-date information on cyber security issues and how to manage them: https://www.cyber.gov.au/acsc/register/small-and-medium-businesses