2021 is the year where the smart choice for Australian SME’s is to protect against the growth of criminal activity by implementing an outsourced Security Service. Small to medium businesses do not have the technical resources and knowledge to stay abreast of the evolving security challenges.
Ransomware, Phishing attacks are growing as one of the biggest risks to SME businesses. Barracuda (a world leader in IT security) recently reported that 71% of all phishing attacks include malicious URL’s. The Phishing category of attacks covers emails that attempt the following: Brand impersonation, Forms, Attachments, and spear phishing aims to steal sensitive information such as login credentials or financial details.
Other categories of threats include Business Email Compromise (BEC) also identified as whaling attacks. In this category Hackers are impersonating an employee, a vendor or other trusted individual for financial gain. They look to induce a transfer to an illegal account, compromise payroll runs by requesting an account change, hijack a conversation by impersonation of a vendor/supplier resulting in a request for payment. The last type is by impersonating a domain through typo squatting.
Barracuda recently reported that in 2020 BEC attacks were the fastest growing and now represent around 12% of all spear phishing attacks.
A survey completed by the Australian Cyber Security Centre in 2019 found that most SMEs know they are exposed to cybersecurity risk, but don’t really understand the underlying threat or vulnerabilities leading to that risk. Meaning SMEs cannot interpret how cybersecurity risk translates into business risk.
Without a realistic understanding of the issues faced, SMEs are unlikely to address the risks. The smart choice is to engage Computer Troubleshooters. Our monthly fee to implement, monitor and maintain your cybersecurity defences makes business sense while giving you peace-of-mind.
The process employed by your local Computer Troubleshooters is an initial assessment/discovery meeting. This may involve an overview of your IT system. We use highly sophisticated software that collects information and compiles a report. We outline the health of your IT infrastructure and underline your security vulnerabilities. All at no initial cost to you if you proceed.