If - like most small businesses - yours doesn’t have an internal cyber expert, you’ll probably be forced to call someone in when an attack happens. The problem with that is, with the number of attacks being reported growing, experts are having trouble keeping up.
Read MoreA recent Home Affairs paper is considering the idea of introducing expiry dates for your tech - much like the milk🥛 in your smart fridge. Whenever a device is unable to update, it will have an expiry date to illustrate when it’s gone bad. Though our technologies don’t have any expiry dates today, you should still regularly check if your devices are up to date and patched.
Read MoreSeveral big businesses are currently looking beyond the pandemic and making plans for what lies ahead. The zero trust security model is becoming increasingly popular as large companies are sending their employees home. It is a more effective way of administering who is accessing a company’s systems - a very crucial thing to check, now more than ever.
Read MoreWhen we are stressed, we have a tendency to be at edge and are more prone to risk than if we were calm and relaxed. We are more likely to do things faster and impatiently than well-thought-out. And that is the weak point that cyber criminals will try to attack.
Read MoreAs much as you should think twice before entering your own data somewhere, as a business owner you should reflect on what you actually need from your clients. Is it really necessary for you to know their address when you provide an online webinar on Zoom? Would it be enough for you to have their name and email address? Do you need to keep their contact details in your database or is it enough to view them and delete them when finished?
Read MoreWe prefer to think of security compliance as a benefit of Cyber Fitness. However, increasingly we find compliance is a key outcome for many of our small business members.
Learn more about commonly requested cyber security certifications to help you understand what's involved in adopting them as a small business.
How many of your passwords would someone need before they could figure out how to log into pretty much everything your business relies on? One insecure password in the wrong place could leave the doors to your business wide open.
There are simple steps you can start taking today to better manage the passwords securing your small business.
Read MoreOne large payment to the wrong account can quickly put a company out of business.
Learn about how business email compromise via fake email scams work, why your business might be a target and how to protect yourself from these devastating cyber attacks.
What would you do if the data your business depends on was held to ransom?
Read MoreBefore rushing back to the office, take a few minutes to reflect on the last few months and review some of the security implications associated to the choices made along the way. These next few minutes could help you anticipate nasty surprises associated with returning to the office.
Read MoreHow confident are you that you know all the sensitive information lurking around in the recesses of your business?
Before you start to worry about the privacy, protection and security of your confidential information, you need to understand the information you have, where it’s stored and who has access to it.
Read MorePhishing (ie. fishing 🎣) is a form of attack cybercriminals use in different ways to trick you into giving them personal or financial details. Phishing emails are everywhere nowadays, so it’s important to know how to spot them. At first glance, some phishing messages can look genuine and will use a legitimate company’s logo or font. Others are very easy to spot.
Read More