Security Market Segment LS
Wednesday, 07 March 2018 11:41

Cyberattack risks mounting for Aussie SMBs: report Featured

Cyberattack risks mounting for Aussie SMBs: report Image courtesy of Stuart Miles at

It’s only a matter of time before Australian small businesses are hit hard by a cybersecurity attack but there are things they can do to protect themselves, according to a newly published security report.

According to Sydney-based security firm Aleron, a successful cyberattack can be devastating for small businesses, especially if their resources are limited because the fallout of the attack can range from financial losses to reputational damage.

“Companies often think they’re too small or insignificant to be a target for cybercriminals but every business is a potential target,” notes Kerry Tang, Security Consultant, Aleron

“By sending or receiving payments online, using email, or storing customer records electronically, businesses create a digital footprint that can lead attackers right to their door.

“Cybercriminals can use the information they gain to steal identities, sabotage operations, sell commercial information, or lock up the company’s data until it pays a ransom,” Tang warns.

“To securely operate in an online world, businesses need a robust cybersecurity framework. The risks are getting higher as cybercriminals get more sophisticated and businesses must keep up or face the consequences. Working with the right partner can help small businesses develop a pragmatic, affordable plan to keep the business secure.”

Aleron has issued a list of six basic steps that it says small businesses can take to help themselves, as well as partnering with an IT security company:

1.    Share information sparingly

The company’s social media pages can provide a great deal of information that cybercriminals can use to attack the business, such as details of a new deal, new product, or company restructure. It therefore makes sense to think twice about the information shared via social media.

2. Patch everything

Most apps have bugs or vulnerabilities that hackers can use to gain access to a company network. Patches are pieces of code that fix those vulnerabilities. They’re released regularly by software developers so businesses should subscribe to the mailing lists for all the company’s operating systems, infrastructure, and applications, then apply patches as soon as they’re released.

3. Don’t neglect anti-virus
Anti-virus tools can detect and defend against many so-called zero-day attacks, which don’t yet have patches available. So it’s essential to keep anti-virus software up to date.

4. Reconsider plugging in and clicking on

USB sticks can harbour nasty malware infections, so unless the company absolutely relies on external drives, they should be disabled. Similarly, employees should be educated not to click on attachments or links in emails, in case they lead to malicious sites.

5. Protect information

Often, malicious actors get information because staff members have either accidentally or deliberately shared it. Staff should be educated regarding what’s safe to share and what should be kept in confidence. All data should be backed up regularly to protect it in case of a disaster. Then, if a hacker tries to deploy ransomware, the business can simply revert to a backed-up copy of the data and operate as normal.

6. Use strong passwords

Passwords can be all that stands between a cybercriminal and an organisation’s entire network. It’s important for employees to use strong passwords, two-factor authentication, and different passwords for different systems. All it takes is for a cybercriminal to crack one password and the entire network could be vulnerable.


Recently iTWire remodelled and relaunched how we approach "Sponsored Content" and this is now referred to as "Promotional News and Content”.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.



Some of the most important records are paper-based documents that are slow to issue, easy to fake and expensive to verify.

Digital licenses and certificates, identity documents and private citizen immunity passports can help you deliver security and mobility for citizens’ information.

Join our webinar: Thursday 4th June 12 midday East Australian time


Peter Dinham

Peter Dinham - retired and is a "volunteer" writer for iTWire. He is a veteran journalist and corporate communications consultant. He has worked as a journalist in all forms of media – newspapers/magazines, radio, television, press agency and now, online – including with the Canberra Times, The Examiner (Tasmania), the ABC and AAP-Reuters. As a freelance journalist he also had articles published in Australian and overseas magazines. He worked in the corporate communications/public relations sector, in-house with an airline, and as a senior executive in Australia of the world’s largest communications consultancy, Burson-Marsteller. He also ran his own communications consultancy and was a co-founder in Australia of the global photographic agency, the Image Bank (now Getty Images).



Recent Comments