How To Combat Cyber Attacks in 2020
We’re Under Attack – Who is Protected?
Australia’s Prime Minister Scott Morrison has announced that Australia is currently under sustained cyber attack by a foreign government.
In an urgent press conference called last Friday, 19 June, in Canberra, Mr Morrison said the ongoing, “large-scale” hack was being executed by a “sophisticated, state-based cyber actor”.
“This activity is targeting Australian organisations across a range of sectors, including all levels of government, industry, political organisations, education, health, essential service providers and operators of other critical infrastructure,” Mr Morrison told reporters.
It’s enough to make any online business twitch. The question is, who is protected, and how safe is your business? Cyber attacks have become an everyday risk of operating online. The decisions you make on what IT tools and policies you integrate into your day to day procedures have a huge impact on what can happen to your business and team, and how quickly you can recover from an attack.
Eight + Fourteen = Proactive Cyber Security
Having cyber security, and the degree to which your business is protected, comes down to numbers, starting with eight (8).
‘Essential Eight’ is the baseline recommendation from the Australian Cyber Security Centre for businesses and Firms looking to protect themselves from cyber security incidents (refer ACSC’s website for ‘Essential Eight Explained’). This baseline has been the recommendation of ACSC for the past three years. Businesses who proactively adopted these steps have tight, layered levels of security protecting them and their teams from cyber-attack. If you haven’t implemented these basic steps, or are still “planning to do it”, you have left your systems completely exposed to easy attack!
Perhaps you been concerned about bridging the gap between technical language and real-world application. I’m not an IT engineer, so when I first read ACSC’s ‘Essential Eight’ recommendations I found the technical language confusing. The eight recommendations are grouped into three ‘migration strategies’ which give technical explanations of ‘what’ and ‘why’, but not how.
14-Steps to Your Essential Eight
The company I work for, itro, a Melbourne-based Managed Service Provider (MSP), has created a 14-Step Security Checklist to help you understand how you can implement ACSC strategies across your business.
If you’d like a copy of this checklist, please email us at [email protected] and one of our technical engineers can run this through with you to assess your business from an IT perspective.
Cyber Security - Vital, But Not Easy
Foreseeing and proactively managing credible cyber threats to your business requires a wide degree of technical insight and proactive management. Making your business cyber safe starts with identifying ‘gateways’ within your business procedures, systems and various work locations that open opportunities to cyber-attack.
Once you know your weaknesses, you then need to create policies to educate and engage your team in safe cyber practices, conduct ongoing monitoring of devices and have the right solutions and applications in place to protect and backup your data and systems.
Benefits of Partnering with an MSP
A simple way to get the expertise and support you need to protect your business effectively is to partner with a Managed Service Provider. The obvious benefit of outsourcing your cyber security is that you get a team of IT engineers whose whole purpose is to maximise the efficiency and security of your devices and systems. You gain support from people who actually like working with IT.
Unlike your core team, they don’t need to split their time and attention between keeping up to date with IT and running your business. A good MSP is responsible for proactively keeping your IT secure and operational, and free your team to focus on what they need to do to keep your business profitable.
If you aren’t happy with your current IT provider, or realise you need extra outsourced support to protect your systems and team, please give us a call on 1800 10 3000 to discuss how we can help you build proactive, layered cyber security measures to keep you cyber safe.
What Can We Offer You?
itro also offers a free Cyber Security Webinar to businesses and Firms that will help you and your invited employees understand how you can protect yourselves from security threats. The webinar covers:
- Cyber security in Australia,
- Cyber security in small to medium businesses
- Breached businesses in 2019
- Different threats and how to spot them
- How to stay secure in and out of the office
- Best products to use to protect your business
An outstanding benefit of the webinar is helping individual team members across your business understand how important their role is in keeping your business safe. It replaces complacency with commitment to safe online practices.
Ignorance and indifference are key factors as to why so many Australian businesses have and are being attacked. Be informed and take action to ensure your business doesn’t become another cyber-crime statistic in 2020.
Please stay safe.