Identifying the critical technologies in your business
It's tempting to jump in and try to reduce your cyber risk as soon as you learn about them. Before diving in, it's fundamental to stop and think about where your priorities are as a business.
Trying to solve everything at once will create a pile of problems you'll never get through. Instead, try to identify the technologies that are fundamental and focus here first.
Read More
Understanding the Cyber Risk in your business
Your business is more reliant on technology today than ever before. Every technology we adopt also carries with it risk. Left unchecked, these risks will make running your business a real pain.
Understanding technology risk - also known as cyber risk - is a key first step to securing your business.
Read More
Enhancing your cyber security posture
With the situation in Ukraine escalating, the Australian Cyber Security Centre has suggested Australian businesses “urgently adopt an enhanced cyber security posture”. While the recommendation is solid, it’s not obvious what an “enhanced cyber security posture” would look like for a small business.
Instead of boiling the ocean, let’s explore a few specific scenarios your business should be preparing for.
Read More
Small business guide to responding to Log4j / Log4Shell vulnerability
The security community exploded over the weekend on news of a devastating vulnerability in something called Log4j. Ask yourself a few quick questions to understand if Log4Shell is something your small business should be worrying about.
Read More
Keep your office Christmas party memorable for the right reasons
It’s time for your team to celebrate wins and let their hair down. Time for the office Christmas party!
We’ve all heard the stories of these sorts of things getting out of hand, and social media has only made things worse. Here are five things you or your staff could share about your office party that could be a threat to your business…
Read More
Keep your movements to yourself
The good old ‘out of office’ message is there to let your customers and partners know what’s up and assure them you’ll be back to business as soon as you return.
Sadly, these automatic messages might flag to spammers and cyber criminals you’re away, so take care not to share the wrong things with the wrong people.
Read More
Give your support partners a break, without missing a beat
Unless you work in the North Pole with a bunch of elves, you’ll probably have some sort of shutdown period coming up soon. Even if your business stays open for most of the holiday period, many of the partners you rely on might not.
Read More
Keep the Grinch out of your inbox these holidays
Email is the lifeblood of most organisations and at this time of the year they’re coming thick and fast. While you might be busy working towards a well earned break, cyber criminals see the next month as their chance to strike.
Read More
Watch out for online shopping scams and Scrooges
As Christmas draws quickly closer and the window to have the perfect gift shipped in time closes, the chances of stumbling into a fake online store is increasing. The price may be amazing, but how confident are you that the random online store you’ve found will deliver the goods?
Read More
Keep the Grinch out of your inbox these holidays 🎄
Cyber criminals are preparing to send you ‘gifts’, whether you’ve been naughty or nice. The Cyber Fitness experts at Cynch have some tips on what to look out for.
Read More
New privacy obligations on the horizon for Australian small businesses
Lockdowns and other pandemic restrictions have made running a small business even harder than usual, particularly for those that rely on a physical location. While the chaos and confusion of 2020 is largely behind us now, with QR codes on every shop front and contactless payments the norm, new obligations around checking vaccine status are likely to see many scrambling again as they rush to re-open.
Read More
Even your weakest link should be cyber fit
While you are working on your own Cyber Fitness, you should encourage your suppliers and partners to do the same. It is up to you to make sure that your suppliers apply a similar if not higher level of cyber security measures as you. Especially if they end up handling your sensitive data.
Read More