SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
5
4
3
2
1
It starts at the top
It starts and finishes with
people in management.
Get everyone on board
You need to have complicit support
from everyone in the business from
top to bottom to ensure your actions
are employed.
It’s a hands-on effort
There is no single-fix for cyber security.
You can’t solely rely on antivirus software
to keep you safe from attacks.
Know your risks and
vulnerabilities
When it comes to cyber-attacks, it’s not a
matter of if, but when. If you use the
internet, you are at risk.
Protect your business
The right approach for you depends on
your business, the people in it, and the
nature of the assets you need to protect.
For more detailed information on how to protect your business, check out our
Cyber Security Best Practice Research Report at www.asbfeo.gov.au/cybersecurity
The Small Business Cyber Security Best Practice Guide
Cyber security is a big
problem for small business
Cyberattacks
• Small business is the target of 43% of all
cybercrimes.1
• 60% of small businesses who experience a
significant cyber breach go out of business within the
following
6 months.2
• 22% of small businesses that were breached by the
2017 Ransomware attacks were so affected they could
not continue operating.3
• 33% of businesses with fewer than 100 employees
don’t take proactive measures against cyber security
breaches.4
• 87% of small businesses believe their business is
safe from cyberattacks because they use antivirus
software alone.5
• Cybercrime costs the Australian economy more than
$1bn annually.6
Malware
Ransomware
Denial
of
service
Email
phishing
Attempts to trick you by sending
hoax emails, getting you to click on
a dangerous link, or providing
personal or financial information to
an unauthorised source.
Malicious or intrusive software,
including viruses, worms, Trojans,
ransomware, spyware and
adware.
Hijacking your files and locking
you out of your system, then
ransoming access back to you.
Using a network of computers to
send requests to your system and
overload it and make it
unavailable.
This is how it affects your business…
Know what you are at risk from…
Watering
hole attack
Setting up a fake (or
compromised) website you are
known to go to, then using it to
infect visiting users.
Get cyber secure
Three quick steps to serenity
Adopt these protections within your business…
Whether it’s your accountant, your IT specialist, or us, know where to go for
more guidance on your risks, vulnerabilities, and how to enhance your
security online. Government agencies can provide more information:
Familiarise yourself with the Stay Smart Online guide
(www.staysmartonline.gov.au/protect-your-business) for simple tips for
protecting your business.
The recommended place to go for a comprehensive list of practical actions to
make your computers, networks and systems more secure is the Australian
Signals Directorate’s (ASD) Essential Eight
(asd.gov.au/infosec/mitigationstrategies.htm), which aim to prevent malware
from running, and to limit the extent of incident and recover data.
For useful statistics on how cyber security affects small business, the
Australian Cyber Security Centre (www.acsc.gov.au/publications.html)
produces and regularly reviews statistics from cyber security incidents.
Contact the Computer Emergency Response Team (CERT) Australia
(www.cert.gov.au/advice) to report suspicious activity or if you think you’ve
been attacked.
Speak to a trusted advisor
Prevention – Protect your assets
• Back-up regularly to protect against loss.
• Patch applications by installing security updates.
• Use complex passwords and use two-step authentication.
• Limit access to administrator accounts and sensitive
information.
Well-being – Do things safely
• Communicate safe practice and talk about cyber security
frequently.
• Browse safe sites and ensure your staff do too.
• Only allow applications you trust on your computers.
Response – Report and recover from an attack
• If you think an attack has happened, tell staff and tell the
authorities.
• Restore backups from before the incident.
• Consider cyber insurance.
You should put at least one person in your
business in charge of cyber security. It should
be someone trusted in management with access
to assets.
Discuss cyber security regularly. Make it a
day-to-day priority, just like locking your
doors each night.
Educate yourself, staff and customers in the
many ways to stay safe online. Encourage
staff and customers to report incidents and
anything that seems out of place.
Understand the ways your business can be
attacked. Perform regular checks and audits
of your online ‘footprint’, so you can prioritise
your risks.
Secure your Point of Sale systems, mobile
devices, networks and stored data with
recommended actions. Familiarise yourself with
more advanced techniques to become cyber
secure.
References
1 smallbiztrends.com/2016/04/cyber-attacks-target-small-business.html
2 Testimony of Dr. Jane LeClair, Chief Operating Officer, National Cybersecurity Institute at Excelsior College,
before the U.S. House of Representatives Committee on Small Business (Apr. 22, 2015), available at
docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf.
3 go.malwarebytes.com/rs/805-USG-
300/images/Second%20Annual%20State%20of%20Ransomware%20Report%20-%20Australia.pdf
4 www.telstraglobal.com/images/assets/insights/resources/Telstra_Cyber_Security_Report_
2017_-_Whitepaper.pdf https://www.myob.com/au/about/news/2017/cloud-security-the-silver-lining-for-smes
5 www.myob.com/au/about/news/2017/cloud-security-the-silver-lining-for-smes
6 acumeninsurance.com.au/2017/03/14/cybercrime-costs-the-australian-economy-over-4-5-billion-annually-and-is-
now-in-the-top-5-risks-faced-by-businesses/
The Small Business Cyber Security Best Practice Guide
Canberra
Level 2
15 Moore Street
Canberra ACT
GPO Box 1791
Canberra City ACT 2601
T 1300 650 460
E info@asbfeo.gov.au
Twitter : @ASBFEO
Facebook: @ASBFEO
LinkedIn: Australian Small Business and Family Enterprise Ombudsman
YouTube : Australian Small Business and Family Enterprise Ombudsman
Copyright notice
http://creativecommons.org/licenses/by/3.0/au/
With the exception of coats of arms, logos, emblems, images, other third-party material or devices protected by a
trademark, this content is licensed under the Creative Commons Australia Attribution 3.0 Licence.
We request attribution as © Commonwealth of Australia (Australian Small Business and Family Enterprise
Ombudsman) 2017 and 2018.
All other rights are reserved.
Some graphics in this document were used under a Creative Commons license from the Noun Project
(http://thenounproject.com)
Australian Small Business and Family Enterprise Ombudsman has undertaken reasonable enquiries to identify
material owned by third parties and secure permission for its reproduction. Permission may need to be obtained
from third parties to re-use their material.
Written enquiries may be sent to:
Manager
Communications and Marketing
Australian Small Business and Family Enterprise Ombudsman
02 6263 1500
media@asbfeo.gov.au

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya RansomwareSiemplify
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessAnkitaKale12
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat ResponseVivek Jindaniya
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsWynyard Group
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-managementMark Gibson
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine LearningSiemplify
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of CybersecurityBenoit Callebaut
 

Was ist angesagt? (20)

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
The Cyber Attack Risk
The Cyber Attack RiskThe Cyber Attack Risk
The Cyber Attack Risk
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
Proven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your businessProven cybersecurity tips to protect your business
Proven cybersecurity tips to protect your business
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Threat Modelling And Threat Response
Threat Modelling And Threat ResponseThreat Modelling And Threat Response
Threat Modelling And Threat Response
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Icit analysis-identity-access-management
Icit analysis-identity-access-managementIcit analysis-identity-access-management
Icit analysis-identity-access-management
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
The importance of Cybersecurity
The importance of CybersecurityThe importance of Cybersecurity
The importance of Cybersecurity
 

Ähnlich wie The Small Business Cyber Security Best Practice Guide

Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsInvoZone
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistancePaul-Charife Allen
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businessesntoscano50
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayPC Doctors NET
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 

Ähnlich wie The Small Business Cyber Security Best Practice Guide (20)

Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Simple Safe Steps to Cyber Security
Simple Safe Steps to Cyber SecuritySimple Safe Steps to Cyber Security
Simple Safe Steps to Cyber Security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
A Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For StartupsA Beginner's Guide To Cybersecurity For Startups
A Beginner's Guide To Cybersecurity For Startups
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Cyber security do your part be the resistance
Cyber security do your part be the resistanceCyber security do your part be the resistance
Cyber security do your part be the resistance
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Cyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small BusinessesCyber Risks & Liabilities - Cyber Security for Small Businesses
Cyber Risks & Liabilities - Cyber Security for Small Businesses
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
The Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses TodayThe Top Cybersecurity Threats Frightening Small Businesses Today
The Top Cybersecurity Threats Frightening Small Businesses Today
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdfCyber Security Threats For Small Business- Detox Technologies.pdf
Cyber Security Threats For Small Business- Detox Technologies.pdf
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 

Mehr von Inspiring Women

How to get your website to deliver more profit
How to get your website to deliver more profitHow to get your website to deliver more profit
How to get your website to deliver more profitInspiring Women
 
The Marketing Touchpoints of one business during one year.
The Marketing Touchpoints of one business during one year.The Marketing Touchpoints of one business during one year.
The Marketing Touchpoints of one business during one year.Inspiring Women
 
Imposter Syndrome & Why it affects Women
Imposter Syndrome & Why it affects WomenImposter Syndrome & Why it affects Women
Imposter Syndrome & Why it affects WomenInspiring Women
 
Doing Business with Council August 2014 workshop
Doing Business with Council August 2014 workshopDoing Business with Council August 2014 workshop
Doing Business with Council August 2014 workshopInspiring Women
 
Local Business Statistics for Warringah Aug 2014
Local Business Statistics for Warringah Aug 2014Local Business Statistics for Warringah Aug 2014
Local Business Statistics for Warringah Aug 2014Inspiring Women
 
Seniors Program Warringah Council 2014 - 15 March - 16 April
Seniors Program Warringah Council  2014 - 15 March - 16 AprilSeniors Program Warringah Council  2014 - 15 March - 16 April
Seniors Program Warringah Council 2014 - 15 March - 16 AprilInspiring Women
 
Journey speech for Inspiring Women & Warringah Council: International Womens ...
Journey speech for Inspiring Women & Warringah Council: International Womens ...Journey speech for Inspiring Women & Warringah Council: International Womens ...
Journey speech for Inspiring Women & Warringah Council: International Womens ...Inspiring Women
 
International Women's Day - Women and Change by Professor Marian Baird
International Women's Day - Women and Change by Professor Marian BairdInternational Women's Day - Women and Change by Professor Marian Baird
International Women's Day - Women and Change by Professor Marian BairdInspiring Women
 
Australian Local Government Womens Association Dec13/Jan14 Newsletter
Australian Local Government Womens Association Dec13/Jan14 NewsletterAustralian Local Government Womens Association Dec13/Jan14 Newsletter
Australian Local Government Womens Association Dec13/Jan14 NewsletterInspiring Women
 
Networking for Sydney Designers
Networking for Sydney DesignersNetworking for Sydney Designers
Networking for Sydney DesignersInspiring Women
 
Board reporting template
Board reporting templateBoard reporting template
Board reporting templateInspiring Women
 
Local business forum - Doing Business with Council
Local business forum - Doing Business with CouncilLocal business forum - Doing Business with Council
Local business forum - Doing Business with CouncilInspiring Women
 
Relationship domestic violence Flyer
Relationship domestic violence FlyerRelationship domestic violence Flyer
Relationship domestic violence FlyerInspiring Women
 
Couse & Community Centre Activities for Warringah Centres in 2013
Couse & Community Centre Activities for Warringah Centres in 2013Couse & Community Centre Activities for Warringah Centres in 2013
Couse & Community Centre Activities for Warringah Centres in 2013Inspiring Women
 
Www.rdasydney.org.au rda plan_2012_web_l2
Www.rdasydney.org.au rda plan_2012_web_l2Www.rdasydney.org.au rda plan_2012_web_l2
Www.rdasydney.org.au rda plan_2012_web_l2Inspiring Women
 
Accumulating poverty? Women’s experiences of inequality over the lifecycle
Accumulating poverty?  Women’s experiences  of inequality over the  lifecycleAccumulating poverty?  Women’s experiences  of inequality over the  lifecycle
Accumulating poverty? Women’s experiences of inequality over the lifecycleInspiring Women
 
Fair tradingnswexcellentreferencemarch2012running a_business
Fair tradingnswexcellentreferencemarch2012running a_businessFair tradingnswexcellentreferencemarch2012running a_business
Fair tradingnswexcellentreferencemarch2012running a_businessInspiring Women
 

Mehr von Inspiring Women (20)

How to get your website to deliver more profit
How to get your website to deliver more profitHow to get your website to deliver more profit
How to get your website to deliver more profit
 
The Marketing Touchpoints of one business during one year.
The Marketing Touchpoints of one business during one year.The Marketing Touchpoints of one business during one year.
The Marketing Touchpoints of one business during one year.
 
Imposter Syndrome & Why it affects Women
Imposter Syndrome & Why it affects WomenImposter Syndrome & Why it affects Women
Imposter Syndrome & Why it affects Women
 
Doing Business with Council August 2014 workshop
Doing Business with Council August 2014 workshopDoing Business with Council August 2014 workshop
Doing Business with Council August 2014 workshop
 
Local Business Statistics for Warringah Aug 2014
Local Business Statistics for Warringah Aug 2014Local Business Statistics for Warringah Aug 2014
Local Business Statistics for Warringah Aug 2014
 
Seniors Program Warringah Council 2014 - 15 March - 16 April
Seniors Program Warringah Council  2014 - 15 March - 16 AprilSeniors Program Warringah Council  2014 - 15 March - 16 April
Seniors Program Warringah Council 2014 - 15 March - 16 April
 
Journey speech for Inspiring Women & Warringah Council: International Womens ...
Journey speech for Inspiring Women & Warringah Council: International Womens ...Journey speech for Inspiring Women & Warringah Council: International Womens ...
Journey speech for Inspiring Women & Warringah Council: International Womens ...
 
International Women's Day - Women and Change by Professor Marian Baird
International Women's Day - Women and Change by Professor Marian BairdInternational Women's Day - Women and Change by Professor Marian Baird
International Women's Day - Women and Change by Professor Marian Baird
 
Australian Local Government Womens Association Dec13/Jan14 Newsletter
Australian Local Government Womens Association Dec13/Jan14 NewsletterAustralian Local Government Womens Association Dec13/Jan14 Newsletter
Australian Local Government Womens Association Dec13/Jan14 Newsletter
 
Networking for Sydney Designers
Networking for Sydney DesignersNetworking for Sydney Designers
Networking for Sydney Designers
 
Board reporting template
Board reporting templateBoard reporting template
Board reporting template
 
Local business forum - Doing Business with Council
Local business forum - Doing Business with CouncilLocal business forum - Doing Business with Council
Local business forum - Doing Business with Council
 
Relationship domestic violence Flyer
Relationship domestic violence FlyerRelationship domestic violence Flyer
Relationship domestic violence Flyer
 
Someone cares
Someone caresSomeone cares
Someone cares
 
Couse & Community Centre Activities for Warringah Centres in 2013
Couse & Community Centre Activities for Warringah Centres in 2013Couse & Community Centre Activities for Warringah Centres in 2013
Couse & Community Centre Activities for Warringah Centres in 2013
 
Www.rdasydney.org.au rda plan_2012_web_l2
Www.rdasydney.org.au rda plan_2012_web_l2Www.rdasydney.org.au rda plan_2012_web_l2
Www.rdasydney.org.au rda plan_2012_web_l2
 
Twochoices
TwochoicesTwochoices
Twochoices
 
Accumulating poverty? Women’s experiences of inequality over the lifecycle
Accumulating poverty?  Women’s experiences  of inequality over the  lifecycleAccumulating poverty?  Women’s experiences  of inequality over the  lifecycle
Accumulating poverty? Women’s experiences of inequality over the lifecycle
 
2012 june year end tax
2012 june year end tax 2012 june year end tax
2012 june year end tax
 
Fair tradingnswexcellentreferencemarch2012running a_business
Fair tradingnswexcellentreferencemarch2012running a_businessFair tradingnswexcellentreferencemarch2012running a_business
Fair tradingnswexcellentreferencemarch2012running a_business
 

Kürzlich hochgeladen

Viet Nam Inclusive Business Accreditation System
Viet Nam Inclusive Business Accreditation SystemViet Nam Inclusive Business Accreditation System
Viet Nam Inclusive Business Accreditation SystemTri Dung, Tran
 
About Entrepreneur ELON MUSK .pptx...
About  Entrepreneur  ELON  MUSK .pptx...About  Entrepreneur  ELON  MUSK .pptx...
About Entrepreneur ELON MUSK .pptx...lahiruherath654
 
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证0622mpom
 
Role of social media marketing in digital marketing.pdf
Role of social media marketing in digital marketing.pdfRole of social media marketing in digital marketing.pdf
Role of social media marketing in digital marketing.pdftopsearchexperts
 
Entrepreneur street first Edition is now out
Entrepreneur street first Edition is now outEntrepreneur street first Edition is now out
Entrepreneur street first Edition is now outentrepreneur street
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan
 
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOCATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOTMTerraplanagem
 
NEON LIGHT CITY pitch deck for AR PC GAME
NEON LIGHT CITY pitch deck for AR PC GAMENEON LIGHT CITY pitch deck for AR PC GAME
NEON LIGHT CITY pitch deck for AR PC GAMEtess51
 
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCRsoniya singh
 
blank inception deck powerpoint template
blank inception deck powerpoint templateblank inception deck powerpoint template
blank inception deck powerpoint templatericardojunco4
 
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...LHelferty
 

Kürzlich hochgeladen (14)

Viet Nam Inclusive Business Accreditation System
Viet Nam Inclusive Business Accreditation SystemViet Nam Inclusive Business Accreditation System
Viet Nam Inclusive Business Accreditation System
 
About Entrepreneur ELON MUSK .pptx...
About  Entrepreneur  ELON  MUSK .pptx...About  Entrepreneur  ELON  MUSK .pptx...
About Entrepreneur ELON MUSK .pptx...
 
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
办昆士兰大学UQ毕业证书/成绩单GPA修改 - 留学买假毕业证
 
Role of social media marketing in digital marketing.pdf
Role of social media marketing in digital marketing.pdfRole of social media marketing in digital marketing.pdf
Role of social media marketing in digital marketing.pdf
 
Entrepreneur street first Edition is now out
Entrepreneur street first Edition is now outEntrepreneur street first Edition is now out
Entrepreneur street first Edition is now out
 
young call girls in kailash Nagar, 🔝 9953056974 🔝 escort Service
young call girls in kailash Nagar, 🔝 9953056974 🔝 escort Serviceyoung call girls in kailash Nagar, 🔝 9953056974 🔝 escort Service
young call girls in kailash Nagar, 🔝 9953056974 🔝 escort Service
 
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
Authentic No 1 Amil Baba In Pakistan Amil Baba In Faisalabad Amil Baba In Kar...
 
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAOCATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
CATALOGO MF 650 COMPLETO COM PEÇAS DE TRANSMISSAO
 
Hot Sexy call girls in Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rajouri Garden🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rajouri Garden🔝 9953056974 🔝 Delhi escort Service
 
NEON LIGHT CITY pitch deck for AR PC GAME
NEON LIGHT CITY pitch deck for AR PC GAMENEON LIGHT CITY pitch deck for AR PC GAME
NEON LIGHT CITY pitch deck for AR PC GAME
 
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Sriniwaspuri 🔝 Delhi NCR
 
blank inception deck powerpoint template
blank inception deck powerpoint templateblank inception deck powerpoint template
blank inception deck powerpoint template
 
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
Report about the AHIABGA-UnityNet UNDRIPDay / Earth-Day 2024 Gathering in Mar...
 
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptx
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptxWhy Powderless DTF Printer is T-shirt Printing Game Changer.pptx
Why Powderless DTF Printer is T-shirt Printing Game Changer.pptx
 

The Small Business Cyber Security Best Practice Guide

  • 1. 5 4 3 2 1 It starts at the top It starts and finishes with people in management. Get everyone on board You need to have complicit support from everyone in the business from top to bottom to ensure your actions are employed. It’s a hands-on effort There is no single-fix for cyber security. You can’t solely rely on antivirus software to keep you safe from attacks. Know your risks and vulnerabilities When it comes to cyber-attacks, it’s not a matter of if, but when. If you use the internet, you are at risk. Protect your business The right approach for you depends on your business, the people in it, and the nature of the assets you need to protect. For more detailed information on how to protect your business, check out our Cyber Security Best Practice Research Report at www.asbfeo.gov.au/cybersecurity The Small Business Cyber Security Best Practice Guide Cyber security is a big problem for small business Cyberattacks • Small business is the target of 43% of all cybercrimes.1 • 60% of small businesses who experience a significant cyber breach go out of business within the following 6 months.2 • 22% of small businesses that were breached by the 2017 Ransomware attacks were so affected they could not continue operating.3 • 33% of businesses with fewer than 100 employees don’t take proactive measures against cyber security breaches.4 • 87% of small businesses believe their business is safe from cyberattacks because they use antivirus software alone.5 • Cybercrime costs the Australian economy more than $1bn annually.6 Malware Ransomware Denial of service Email phishing Attempts to trick you by sending hoax emails, getting you to click on a dangerous link, or providing personal or financial information to an unauthorised source. Malicious or intrusive software, including viruses, worms, Trojans, ransomware, spyware and adware. Hijacking your files and locking you out of your system, then ransoming access back to you. Using a network of computers to send requests to your system and overload it and make it unavailable. This is how it affects your business… Know what you are at risk from… Watering hole attack Setting up a fake (or compromised) website you are known to go to, then using it to infect visiting users. Get cyber secure Three quick steps to serenity Adopt these protections within your business… Whether it’s your accountant, your IT specialist, or us, know where to go for more guidance on your risks, vulnerabilities, and how to enhance your security online. Government agencies can provide more information: Familiarise yourself with the Stay Smart Online guide (www.staysmartonline.gov.au/protect-your-business) for simple tips for protecting your business. The recommended place to go for a comprehensive list of practical actions to make your computers, networks and systems more secure is the Australian Signals Directorate’s (ASD) Essential Eight (asd.gov.au/infosec/mitigationstrategies.htm), which aim to prevent malware from running, and to limit the extent of incident and recover data. For useful statistics on how cyber security affects small business, the Australian Cyber Security Centre (www.acsc.gov.au/publications.html) produces and regularly reviews statistics from cyber security incidents. Contact the Computer Emergency Response Team (CERT) Australia (www.cert.gov.au/advice) to report suspicious activity or if you think you’ve been attacked. Speak to a trusted advisor Prevention – Protect your assets • Back-up regularly to protect against loss. • Patch applications by installing security updates. • Use complex passwords and use two-step authentication. • Limit access to administrator accounts and sensitive information. Well-being – Do things safely • Communicate safe practice and talk about cyber security frequently. • Browse safe sites and ensure your staff do too. • Only allow applications you trust on your computers. Response – Report and recover from an attack • If you think an attack has happened, tell staff and tell the authorities. • Restore backups from before the incident. • Consider cyber insurance. You should put at least one person in your business in charge of cyber security. It should be someone trusted in management with access to assets. Discuss cyber security regularly. Make it a day-to-day priority, just like locking your doors each night. Educate yourself, staff and customers in the many ways to stay safe online. Encourage staff and customers to report incidents and anything that seems out of place. Understand the ways your business can be attacked. Perform regular checks and audits of your online ‘footprint’, so you can prioritise your risks. Secure your Point of Sale systems, mobile devices, networks and stored data with recommended actions. Familiarise yourself with more advanced techniques to become cyber secure.
  • 2. References 1 smallbiztrends.com/2016/04/cyber-attacks-target-small-business.html 2 Testimony of Dr. Jane LeClair, Chief Operating Officer, National Cybersecurity Institute at Excelsior College, before the U.S. House of Representatives Committee on Small Business (Apr. 22, 2015), available at docs.house.gov/meetings/SM/SM00/20150422/103276/HHRG-114-SM00-20150422-SD003-U4.pdf. 3 go.malwarebytes.com/rs/805-USG- 300/images/Second%20Annual%20State%20of%20Ransomware%20Report%20-%20Australia.pdf 4 www.telstraglobal.com/images/assets/insights/resources/Telstra_Cyber_Security_Report_ 2017_-_Whitepaper.pdf https://www.myob.com/au/about/news/2017/cloud-security-the-silver-lining-for-smes 5 www.myob.com/au/about/news/2017/cloud-security-the-silver-lining-for-smes 6 acumeninsurance.com.au/2017/03/14/cybercrime-costs-the-australian-economy-over-4-5-billion-annually-and-is- now-in-the-top-5-risks-faced-by-businesses/ The Small Business Cyber Security Best Practice Guide Canberra Level 2 15 Moore Street Canberra ACT GPO Box 1791 Canberra City ACT 2601 T 1300 650 460 E info@asbfeo.gov.au Twitter : @ASBFEO Facebook: @ASBFEO LinkedIn: Australian Small Business and Family Enterprise Ombudsman YouTube : Australian Small Business and Family Enterprise Ombudsman Copyright notice http://creativecommons.org/licenses/by/3.0/au/ With the exception of coats of arms, logos, emblems, images, other third-party material or devices protected by a trademark, this content is licensed under the Creative Commons Australia Attribution 3.0 Licence. We request attribution as © Commonwealth of Australia (Australian Small Business and Family Enterprise Ombudsman) 2017 and 2018. All other rights are reserved. Some graphics in this document were used under a Creative Commons license from the Noun Project (http://thenounproject.com) Australian Small Business and Family Enterprise Ombudsman has undertaken reasonable enquiries to identify material owned by third parties and secure permission for its reproduction. Permission may need to be obtained from third parties to re-use their material. Written enquiries may be sent to: Manager Communications and Marketing Australian Small Business and Family Enterprise Ombudsman 02 6263 1500 media@asbfeo.gov.au