Cyber Fitness 101
Step through the basics of Cyber Fitness so you can hit the ground running and be confident you’re doing everything possible.
Cyber Fitness Exercises
You can make a meaningful impact on the cybersecurity of your business by taking small steps in the right direct. We share some simple things you can do right now, for free and in just a couple of minutes.
It's tempting to jump in and try to reduce your cyber risk as soon as you learn about them. Before diving in, it's fundamental to stop and think about where your priorities are as a business.
Trying to solve everything at once will create a pile of problems you'll never get through. Instead, try to identify the technologies that are fundamental and focus here first.
Your business is more reliant on technology today than ever before. Every technology we adopt also carries with it risk. Left unchecked, these risks will make running your business a real pain.
Understanding technology risk - also known as cyber risk - is a key first step to securing your business.
With the situation in Ukraine escalating, the Australian Cyber Security Centre has suggested Australian businesses “urgently adopt an enhanced cyber security posture”. While the recommendation is solid, it’s not obvious what an “enhanced cyber security posture” would look like for a small business.
Instead of boiling the ocean, let’s explore a few specific scenarios your business should be preparing for.
The security community exploded over the weekend on news of a devastating vulnerability in something called Log4j. Ask yourself a few quick questions to understand if Log4Shell is something your small business should be worrying about.
What’s the latest?
Read about the latest news from Cynch including updates to our Cyber Fitness membership.
A frequently asked question we’ve been receiving from small businesses is: “How can we effectively respond to actions taken by employees that don’t meet our security standards.” This could refer to cutting corners around secure data storage, using weak passwords, or failing to identify phishing emails.
Here’s what our team have come up with as a start… what else can you think of?
We've had a number of customers contact us in the last few days seeking actions they can take in response to the Optus data breach.
While we try not to add to the noise around incidents like this, after data associated with 10,000 individuals allegedly from the breach was published yesterday, we felt it was appropriate to provide our members with some general guidance.
It’s a reasonable concern to have, especially in the face of recent huge data breaches. All that sensitive customer data you've been collecting wants to be free. If you're not treating the personal data you hold with care, it will find its way online and expose your customers (and your business) to scams, identity theft or worse.
But you can reduce the likelihood of this occurring and the potential harm by taking action today
Scams using a tactic commonly known as ‘sextortion’ is a form of online blackmail where a cyber scammer threatens to reveal intimate images of you online, often to family, friends and even customers. Typically, the scammers don’t in fact have any compromising information, and are using the tactic to trick and scare you into paying them off.
There are actions you can take to help protect your business from these kinds of scams.
Cyber Fitness Champions
Get inspired by the stories of some of our Cyber Fitness Champions. See how businesses like yours have benefited from taking steps along their cyber fitness journey.
Lawyers receive and send emails and documents constantly throughout the day. These could contain evidence for a case, invoices, meeting notes, or any number of other things. A lot of these exchanges often contain sensitive information.
Start Building the Cyber Fitness of your business
Sign-up in seconds and discover the most important things to be working on right now.