Create a free account, or log in

Five easy ways to bolster cyber security for your business

Startups and small businesses are among the most vulnerable to cyber attacks. Here’s five steps to improve your cyber security.

Cyber attacks like the one that affected PageUp in June can heighten businessโ€™s senses around their virtual vulnerabilities.

Even though a recent report suggested small business could be at a significant risk of cyber attacks, thereโ€™s an ongoing perception that itโ€™s the big banks, global corporates and high-profile tech companies that are at the greatest risk.

Paul Byrne, co-founder and chief executive of Amplify Intelligence, a startup providing tools for small businesses to protect themselves against cyber attacks, says thereโ€™s a knowledge gap among small businesses, and too few cyber security experts, who are are snapped up by big banks and corporates.

However, itโ€™s the smaller businesses, without the big budgets, that are more vulnerable.

โ€œCriminals have realised that actually itโ€™s really hard to steal money from a big enterprise,โ€ says Byrne.

Corporates have sophisticated defences in place, while โ€œsmall businesses are still at anti-virus and firewallsโ€, he says, which meansย โ€œtheyโ€™re trying to use 10-year-old tech against new attacksโ€.

Startups are at risk as well. Being tech savvy doesnโ€™t necessarily mean being security savvy, Byrne says.

As a startup founder himself, Byrne knows first hand that security might not be at the forefront of entrepreneurโ€™s minds. If nothing else, you have to be โ€œblindly optimisticโ€ to launch a startup in the first place, he says.

โ€œWeโ€™re so focused on building the vision of what we want to build, itโ€™s about what’s most important. Security might not come up if we donโ€™t have an awareness,โ€ says Byrne.

However, tech startups are some of the most vulnerable to these kinds of risks.

โ€œThe more and more weโ€™re leveraging data, and our business models are based on that,โ€ the more susceptible they are, Byrne says. And “they’re much higher value” to hackers.

It can be easy to become overwhelmed with the amount of โ€˜little fixesโ€™ around cybersecurity, such as enabling HTTPS protocol, which simply prevents tampering in communications between a website and its users, and is just โ€œturning on encryption with communicationsโ€ and is โ€œone of thousands of settings you should use to protect yourselfโ€, says Bryne.

However, under the mandatory data breach reporting amendments to the Privacy Act, which have been in place since February, businesses need to maintain basic cyber hygiene more than ever before. And thatโ€™s not as difficult as it may first appear.

We asked Byrne andย Jason Murrell, who runs Defend Wise, a business helping small businesses bolster their cyber resilience, to share five relatively easy ways startups and small businesses can get their security on track.

1. Know whatโ€™s valuable

Thereโ€™s a common misconception that small businesses would not be a target for hackers because theyโ€™re too small-fry, but Byrne says no business is โ€œtoo small to get noticedโ€.

In fact, things like ransomware are hitting small businesses harder than others. And attackers are not necessarily trying to access money.

Startups and small businesses should consider โ€œwhat assets you have that can be monetised in ways you donโ€™t realiseโ€, says Byrne. For example, personal information about customers or employees can โ€œactually be really valuable to criminalsโ€, he says, even if they just sell it on.

Byrne sets out the example of a healthcare company. The business may protect its clientsโ€™ health data to a sufficient standard, but to criminals, staff data could actually be more lucrative as it can open up a door for identity fraud.

2. Train your staff

Big corporates have people entirely dedicated to cyber security. For the most part, small businesses just donโ€™t have the budget for that.

Murrell says businesses with fewer than 30 employees, particularly in the legal, financial and health space, are vulnerable to phishing attacks, whereby criminals will send a fraudulent email including a link, in a bid to get people to enter their email details. Theyโ€™re also susceptible to what Murrell calls spear phishing attacks that target one person in particular.

In one example, employees of a small law firm received an email purporting to be from Office365, saying their email inboxes were full. One employee typed her credentials into the replica Microsoft page the email linked to, and as a result, gave her details to the hackers.

After monitoring the account for a while, the hackers stopped outgoing invoices and changed the bank details, redirecting the funds. In this case, by the time the staff member followed up the invoices, the money had been transferred far away.

โ€œFrom there, you canโ€™t really go to the police,โ€ Murrell says.

โ€œItโ€™s almost like leaving your house unlocked,โ€ he adds; criminals will always take the easiest option.

The only way to avoid this kind of situation is through training, whether thatโ€™s through videos, external consultants or running simulation scams.

Either way, itโ€™s important to get staff on board and engaged, Murrell says, and that can come through making them think about their personal risks, as well.

โ€œWe want them to think not just about protecting business, but also protecting them at home,โ€ he says.

Equally, thereโ€™s no point in naming and shaming those who fall for an attack. Rather, the focus should be on celebrating those who spot them.

3. Two-factor authentication

In the case of the employee at the law firm, that breach would have been avoided entirely if the employee in question had had two-factor authorisation on changes to her Office 365 account.

Two-factor authorisation simply requires an additional piece of information that only the user would know before they can log into something, whether thatโ€™s an app, client management system or email account. Typically, before the user can log in, a code will be sent to a different deviceย โ€” usually a mobile phoneย โ€” which is required for access.

According to Murrell, if a platform has the option of two-factor authentication, โ€œitโ€™s a key thing you should be looking atโ€.

Byrne also names this as an easy way to โ€œget yourself up to the next stepโ€ of security.

4. Know where your data is

When using online storage or cloud providers, such as Dropbox or Google Docs, itโ€™s important to be aware of where that data is hosted, what that means for the business, and whether it increases the risk.

However, Byrne says he worries less about cloud-based storage options, and more about people storing critical information on their email.

He has seen small companies keeping things like contracts and client details on their email accounts, where โ€œthatโ€™s the only copy they have”.

โ€œThatโ€™s less safe than putting it on Dropbox,โ€ he says.

Emails are one of the easiest parts of a business to hack. And, if a business is compromised, the first question customers are going to ask is what is being done to protect that client information.

The reputational damage could be significant, but the measures taken to protect such data will also have a bearing on the penalties imposed.

โ€œThe governance and regulatory bodies are saying that as long as youโ€™ve taken as many measures as you can โ€ฆ that would be okay,โ€ Byrne says.

โ€œIf you havenโ€™t really done anything, theyโ€™re going to come down a lot harder.โ€

5. Be aware

Simply raising awareness of cyber risks within the business can make a big difference.

“A lot of people don’t consider cyber security to be an issue until they get a breach,” Murrell says.

โ€œItโ€™s not if, itโ€™s when. You either have [been attacked] or youโ€™re going to be,โ€ he adds.

It’s essential to having policies in place around things like responsible use of equipment, in addition to general good practices, which should also extend to contractors.

Equally, any third-party suppliers should be vetted to make sure they have good cyber hygiene themselves.

Eventually, Murrell predicts that businesses will be benchmarked for cyber safety, gaining accreditation depending on how secure their systems are. With this visible to clients and collaborators alike, the issue will quickly become more important to any business.

But that’s a means to an end, Murrell says. Ultimately, business owners should be motivated to be cyber secure for themselves.

“It’s just one less thing to worry about,” he says.

NOW READ:ย Human error (not hackers) behind most data breaches in Australia