Story image

Small business and cyber security: what you need to know

08 Mar 2016

Australian small- and medium-sized enterprises need to be aware of security breaches typically reserved for individuals, according to new information from RSM Australia.

The company says busy businesses often fall for scams that look plausible because they don’t have the time to look into them more cautiously.

According to the Cost of Data Breach Study: Global Analysis, Ponemon Institute (sponsored by IBM) last year, the cost of a security breach in Australia can run into the millions of dollars, which doesn’t take into account the reputational damage a high-profile breach can cause.  

RSM Australia says that while large enterprises can often recover from a security breach, the smaller operating margins of SMEs means that a significant breach can have severe ramifications, even hampering the business’s ability to continue operating.

Recent threats have included online banking scams where customers receive a text message asking them to login to their banking site to confirm details. The message includes a URL, which takes the customer to a fake page, set up to access their account details. The attackers can then use those details to gain full access to the business accounts, potentially wiping them out.

“These scams are successful because they look plausible, and busy business owners may not have time to carefully consider and examine the links they’re clicking on, particularly if they’re on a mobile device screen rather than a larger, easier-to-read screen,” explains Michael Shatter, Risk Advisory partner, RSM Australia.

“One way SME owners can protect themselves from these scams is to use business banking services rather than consumer services,” he says.

“They tend to offer more sophisticated security options and additional security for multiple account users.”

Fraud is another key risk area for SMEs, Shatter says.

“Some employees with access to the business’s bank accounts, for example, could potentially sums without getting caught. It is essential for business owners to be actively involved in business banking and to check the accounts regularly for any anomalies,” he adds.

Shatter says some cyber breaches are likely to happen regardless of how vigilant the business owner is.

“These cyber attacks can include hackers gaining access to systems to steal commercially-sensitive information, customer payment details, or actual money, and ransomware,” he says.

“The costs of these losses can be enormous and, if the intrusion isn’t detected straight away, the losses can mount up over time.”

Additionally, SMEs are subject to the same privacy legislation as larger companies, Shatter explains.

This means they must, by law, keep customers’ private information secure or face potentially-large fines as well as damage to their reputation.

“Customers are increasingly demanding that the companies they do business with are secure,” Shatter says.

“To compete effectively and to avoid the losses that come with security breaches, SMEs must review their security measures regularly and update them as required.”

RSM Australia has identified eight ways SMEs can protect themselves:

  • Keep software updated, since updates often include security patches
  • Educate all staff regarding the risks and how to protect themselves and the business
  • Demand strong passwords for all applications, not just key applications like banking or invoicing
  • Use up-to-date security solutions including anti-virus, firewalls, intrusion detection, and threat detection
  • Never click on links to banking sites in emails or texts. If in doubt, call the bank directly
  • Treat mobile devices the same way you would treat computers; they are equally if not more vulnerable to attack
  • Ensure your files are backed up regularly and reliably
  • Get professional, external advice to improve your security posture, and conduct a risk assessment
Aerohive launches guide to cloud-managed network access control
NAC for Dummies teaches the key aspects of network access control within enterprise IT networks and how you can secure all devices on the network.
Sungard AS named DRaaS leader by Forrester
It was noted for its disaster-recovery-as-a-service solution’s ability to “serve client needs at all stages of their need for business continuity.”
Gartner: The five priorities of privacy executives
The priorities highlight the need for strategic approaches to engage with shifting regulatory, technology, customer and third-party risk trends.
emt Distribution adds risk intelligence vendor
Flashpoint has signed emt Distribution to provide channel partners in Oceania and South East Asia a solution for illicit threat actor communities.
CrowdStrike: Improving network security with cloud computing solutions
Australian spending on public cloud services is expected to reach $6.5 billion this year according to Gartner
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
Veeam reports double-digit Q1 growth
We are now focussed on an aggressive strategy to help businesses transition to cloud with Backup and Cloud Data Management solutions.
Paving the road to self-sovereign identity using blockchain
Internet users are often required to input personal information and highly-valuable data from contact numbers to email addresses to make use of the various platforms and services available online.