Business advice
and accounting

Our purpose is to help you on your journey as you grow. Learn more about our history, partners and purpose.

Our purpose is to help you on your journey as you grow. Learn more about our history, partners and purpose.

Your partners for Business Service and Advisory, Taxation, Audit, Fraud and Risk.

Whatever your business, industry or family office, from local or international institutions we bring extensive expertise.

We're one team with a purpose and passion for what we do. Learn about our culture and career opportunities available to you.

Uncovering insights, trends and inspiration to help business grow in an ever-changing world.

We are always looking for ways to engage and give back to our community.

Telephone: +612 9283 1666
Email: [email protected]

Level 13, 68 York Street,
Sydney NSW 2000

Why us

Our purpose is to help you on your journey as you grow. Learn more about our history, partners and purpose.

What we do

Your partners for Business Service and Advisory, Taxation, Audit, Fraud and Risk.

Who do we help

Whatever your business, industry or family office, from local or international institutions we bring extensive expertise.

Work with us

We're one team with a purpose and passion for what we do. Learn about our culture and career opportunities available to you.

What we think

Uncovering insights, trends and inspiration to help business grow in an ever-changing world.

Working to give back

We are always looking for ways to engage and give back to our community.

Contact us

Telephone: +612 9283 1666
Email: [email protected]

Level 13, 68 York Street,
Sydney NSW 2000

8 July 2024

by Phil Aldridge

Ten Critical Cybersecurity Tips

Every day we see a new headline hitting the news cycle about a new cybersecurity threat or hack. We’ve asked one of our technology partners, Fuse Technology to share their top ten cybersecurity tips. Here are some great insights from Phil Aldridge, Director at Fuse, on how businesses can enhance their cybersecurity posture and protect against potential threats.

 

TIP 1.  Secure Your Platforms

Microsoft and Google offer highly secure platforms, thanks to their substantial investments in security. However, this security isn’t automatic for your accounts. It requires proper configuration, which demands time, effort, and expertise. Make sure your IT provider has secured your accounts properly.

 

TIP 2. Implement Multi-Factor Authentication
Cover the basics effectively. Since most hacking occurs through email, ensure your external email security is robust. Ask your IT provider to confirm that SPF, DKIM, and DMARC are set up, and that multi-factor authentication is enabled on all accounts.

 

TIP 3. Verify Your Backups
Backing up data is essential, but equally important is ensuring those backups can be restored. Regularly test your restores to confirm they work, so you’re not caught off guard in an emergency.

 

TIP 4. Restrict Legacy System Access
Prevent access from outdated computers and phones. If your systems are up-to-date with Windows 11 and the latest Android/iPhones, block legacy systems from logging in.

 

TIP 5. Separate Work and Home Devices
Maintain a clear divide between work and personal computers. Provide dedicated work computers for staff working from home to reduce hacking risks associated with shared devices. If you allow staff to use their work computer for personal usage, ensure that appropriate cybersecurity software is in place to keep your device and network secure.

 

TIP 6. Manage Mobile Email Access
If employees use work email on their phones, ensure you can manage these accounts centrally. Mobile device/application management products can be used to manage company-owned devices and software, allowing you to delete data if a phone is lost or stolen.

 

TIP 7. Educate Staff About Cyber Risks
Most cyber incidents result from human error. Regularly train staff on the latest cyber risks and, more importantly, reduce the chances of mistakes by restricting their ability to run new applications on their devices.

 

TIP 8. Restrict Login Locations
If your team usually logs in from Australia, block login attempts from other countries. Adjust settings to make exceptions for when employees are traveling.

 

TIP 9. Partner with the Experts
Don’t just assume your IT service provider is effectively handling your cybersecurity. Many times, they may overlook issues to avoid highlighting their own shortcomings. It’s crucial to have your cybersecurity posture assessed by a third-party vendor at least once a year and act on their recommendations. Ensure your business meets Essential Eight Level 1, or preferably Level 2, compliance standards.

 

TIP 10. Invest In Cyber Insurance
Cyber insurance is a must for your business. While it won’t prevent an attack, it will provide support if you get hacked. Plus, obtaining cyber insurance ensures you have the basic cybersecurity measures in place.

 

About the author