SlideShare a Scribd company logo
Modbury & Salisbury

Top tips for protecting your
business online
Allison Miller, Vanguard Visions Consulting
Session Overview
• Why protect your business online?
• Why is now a good time to be doing business
online?
• Top tips for protecting your business online
• Online cyber-smart business assessment
• What will you investigate?
• Workshop evaluation
Why protect your
business online?
Why protect your
business online?
• More business is being done
online
• Privacy obligations
• Maintain reputation / trust
• Protect virtual assets (data)
• Multiple users of the one device

Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety
Why is now a good time
to do business online?
Top five industries to fly in 2013 in
Australia

Source: Ibis World (2013) –
http://www.ibisworld.com.au/about/media/pressrelease/release.aspx?id=304
Internet is a game changer

Source: Deloitte Access Economics Pty Ltd (2013) –
http://www.deloitte.com/view/en_AU/au/services/financial-advisory/deloitte-accesseconomics/05660fd56ab1e310VgnVCM1000003256f70aRCRD.htm
Top tips for protecting
your business online
Australian Department of Defence, Intelligence and Security, Oct 2013
Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG
Develop a back-up strategy

1. Assess your level of risk and
identify actions to minimise
2. What data needs to be backed
up and how often
3. Select an appropriate back-up
device/location
4. Set reminds to do your back-ups
5. Test that you can use your
backed up data
6. Store backed up data away from
its original source

Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg
staysmartonline.gov.au/alert_service
Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
Do the cyber-smart
business assessment
staysmartonline.gov.au/business/home_based_businesses/questionnaire
What will you investigate
further?
Workshop evaluation
Want to know more?

More info: digitalcapability.com.au
Register for eUpdates: bit.ly/digitalcapability
Follow on:
Twitter - twitter.com/digitalcapabili
Facebook - facebook.com/digitalcapability
LinkedIn - bit.ly/DCLinkedIN
Google+ - bit.ly/DCGoogleplus
Pinterest - pinterest.com/vanguardvisions
Allison Miller
0400 732 270
allison@vanguardvisions.com.au
vanguardvisionsconsulting.com.au

vanguardvisionsconsulting.com.au

More Related Content

PPTX
Top tips for running your business safely online - 030614
Vanguard Visions
 
PPTX
Driving customers to your website
Vanguard Visions
 
PDF
Yourlifeisatransmediaexperience 110118022436 Phpapp02
macdebruijn
 
PDF
What's in a name? Better vocabularies = better bioinformatics?
Keith Bradnam
 
PPTX
Social proof yourself in less than an hour a week
Vanguard Visions
 
PPTX
What can I do with my eportfolio after formal education and training?
Vanguard Visions
 
PPTX
Choosing the right learning management system (LMS) / virtual learning enviro...
Vanguard Visions
 
Top tips for running your business safely online - 030614
Vanguard Visions
 
Driving customers to your website
Vanguard Visions
 
Yourlifeisatransmediaexperience 110118022436 Phpapp02
macdebruijn
 
What's in a name? Better vocabularies = better bioinformatics?
Keith Bradnam
 
Social proof yourself in less than an hour a week
Vanguard Visions
 
What can I do with my eportfolio after formal education and training?
Vanguard Visions
 
Choosing the right learning management system (LMS) / virtual learning enviro...
Vanguard Visions
 

Similar to Top tips for protecting your business online Oct 13 (20)

PPTX
Top tips for protecting your business online (updated) Feb 14
Vanguard Visions
 
PDF
Trust at the Interface of Start-up and Enterprise
Benjamin Elias
 
PPTX
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
 
PDF
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
Dropbox
 
PDF
Schrodinger’s Backup: Is Your Backup Really a Backup?
Ortus Solutions, Corp
 
PPTX
2 fa it101
c_______101
 
PPTX
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
PPTX
Community IT Webinar - IT Security for Nonprofits
Community IT Innovators
 
PPTX
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Jason Hong
 
PDF
Microservices Workshop All Topics Deck 2016
Adrian Cockcroft
 
PDF
Enterprise io t investment presentation
Rick Zullo
 
PDF
Digital self defense 101 me rit
Ben Woelk, CISSP, CPTC
 
PDF
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud Security Alliance Lviv Chapter
 
PDF
The Architecture of Privacy 1st Edition Courtney Bowman
kiroslunow74
 
PDF
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Joel Oleson
 
PPTX
Cyber security fundamentals & ethical hacking
ervaijnathgoler
 
PPTX
Data Management 101 (2015)
Kristin Briney
 
PPTX
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
PPTX
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Vanguard Visions
 
PDF
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
Top tips for protecting your business online (updated) Feb 14
Vanguard Visions
 
Trust at the Interface of Start-up and Enterprise
Benjamin Elias
 
Global Azure Bootcamp 216 - Azure Rights Management
Riwut Libinuko
 
eFolder Webinar_Expert Series_Six Best Practices for Complete Laptop Protection
Dropbox
 
Schrodinger’s Backup: Is Your Backup Really a Backup?
Ortus Solutions, Corp
 
2 fa it101
c_______101
 
Developing A Cyber Security Incident Response Program
BGA Cyber Security
 
Community IT Webinar - IT Security for Nonprofits
Community IT Innovators
 
Statistical Analysis of Phished Email Users, Intercepted by the APWG/CMU Phis...
Jason Hong
 
Microservices Workshop All Topics Deck 2016
Adrian Cockcroft
 
Enterprise io t investment presentation
Rick Zullo
 
Digital self defense 101 me rit
Ben Woelk, CISSP, CPTC
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Cloud Security Alliance Lviv Chapter
 
The Architecture of Privacy 1st Edition Courtney Bowman
kiroslunow74
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
Joel Oleson
 
Cyber security fundamentals & ethical hacking
ervaijnathgoler
 
Data Management 101 (2015)
Kristin Briney
 
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Managing Cloud Business Solutions for Salisbury/Modbury Digital Enterprise Pr...
Vanguard Visions
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
Ad

More from Vanguard Visions (20)

PPTX
Tips and tools for working smarter
Vanguard Visions
 
PPTX
Increase student motivation (and reduce cheating) using Moodle and Mahara
Vanguard Visions
 
PPTX
Increase student motivation (and reduce cheating) using Mahara
Vanguard Visions
 
PPTX
Top tips and techniques for getting started (or expanding) your flexible trai...
Vanguard Visions
 
PPTX
Managing and measuring your social media activities using Hootsuite - October...
Vanguard Visions
 
PPTX
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Vanguard Visions
 
PPTX
Blogging brings you business - but how? - August 2014
Vanguard Visions
 
PPTX
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Vanguard Visions
 
PPTX
Don't let your business become digital road kill - 250614
Vanguard Visions
 
PPTX
Creating and managing a WordPress business website - March 2014
Vanguard Visions
 
PPTX
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Vanguard Visions
 
PPTX
Implementing workplace online training - 130214
Vanguard Visions
 
PPTX
E-portfolios: It’s more than filing stuff in a shoebox - 040214
Vanguard Visions
 
DOCX
Managing Cloud Business Solutions Worksheets v2 Nov 13
Vanguard Visions
 
PPTX
How can iWOT support thin training markets - Converge13 - 211113
Vanguard Visions
 
PPTX
Vvc leading & managing people from anywhere - national telework week - 191113
Vanguard Visions
 
PPTX
Creating Learning-Centred Environments - IDEA13 - 121113
Vanguard Visions
 
DOC
Links from Transforming educational practice - Designing Learning in the Digi...
Vanguard Visions
 
PPTX
Transforming educational practice - Designing Learning in the Digital Age pre...
Vanguard Visions
 
PPTX
How can iWOT support thin training markets - EYEQ - 251013
Vanguard Visions
 
Tips and tools for working smarter
Vanguard Visions
 
Increase student motivation (and reduce cheating) using Moodle and Mahara
Vanguard Visions
 
Increase student motivation (and reduce cheating) using Mahara
Vanguard Visions
 
Top tips and techniques for getting started (or expanding) your flexible trai...
Vanguard Visions
 
Managing and measuring your social media activities using Hootsuite - October...
Vanguard Visions
 
Evidencing compliance of quality training and assessment (SNR 15) through e-l...
Vanguard Visions
 
Blogging brings you business - but how? - August 2014
Vanguard Visions
 
Emerging E-learning Trends, Tools, Techniques supporting 70 20 10
Vanguard Visions
 
Don't let your business become digital road kill - 250614
Vanguard Visions
 
Creating and managing a WordPress business website - March 2014
Vanguard Visions
 
Mahara Hui 14 - What to consider when introducing educators to Mahara - 200214
Vanguard Visions
 
Implementing workplace online training - 130214
Vanguard Visions
 
E-portfolios: It’s more than filing stuff in a shoebox - 040214
Vanguard Visions
 
Managing Cloud Business Solutions Worksheets v2 Nov 13
Vanguard Visions
 
How can iWOT support thin training markets - Converge13 - 211113
Vanguard Visions
 
Vvc leading & managing people from anywhere - national telework week - 191113
Vanguard Visions
 
Creating Learning-Centred Environments - IDEA13 - 121113
Vanguard Visions
 
Links from Transforming educational practice - Designing Learning in the Digi...
Vanguard Visions
 
Transforming educational practice - Designing Learning in the Digital Age pre...
Vanguard Visions
 
How can iWOT support thin training markets - EYEQ - 251013
Vanguard Visions
 
Ad

Recently uploaded (20)

PPTX
Keynote: CATHOLIC UNIVERSITY: A PLACE OF CREATIVITY AND KNOWLEDGE
Alvaro Barbosa
 
PPTX
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
PI Software
 
PDF
Danielle Oliveira New Jersey - A Seasoned Lieutenant
Danielle Oliveira New Jersey
 
PDF
WAKUZOOM DIGITAL ORIGINAL COMPANY PROFILE.pdf
emmedia319
 
PDF
Best 10 Website To Buy Instagram Accounts Bulk 2025 USA
pvabest USA 2025
 
PDF
askOdin - An Introduction to AI-Powered Investment Judgment
YekSoon LOK
 
PPTX
6 Timeless Japanese Concepts to Improve Business Processes
RUPAL AGARWAL
 
PPTX
斯特灵大学文凭办理|办理UOS毕业证成绩单文凭复刻学历学位认证多久
1cz3lou8
 
PPTX
Is Your Brand Ready for Expansion? A Strategic Guide to Scaling Successfully
RUPAL AGARWAL
 
PDF
Rodolfo Belcastro su All Around The Worlds Magazine - Febbraio 2025
Rodolfo Belcastro
 
PDF
Employnova Global Services : Outsourcing
Employnova Global Services
 
PPTX
E-commerce and its impact on business.
pandeyranjan5483
 
PPTX
Pakistan’s Leading Manpower Export Agencies for Qatar
Glassrooms Dubai
 
DOCX
UNIT 2 BC.docx- cv - RESOLUTION -MINUTES-NOTICE - BUSINESS LETTER DRAFTING
MANJU N
 
PPTX
Communications Recruiter Melbourne.pptx
ReithGordon
 
PDF
Data Sheet Cloud Integration Platform - dataZap
Chainsys SEO
 
PDF
2025 07 29 The Future, Backwards Agile 2025.pdf
Daniel Walsh
 
PPTX
Mining Services and Iron Ore Transportation in India.pptx
Naaraayani Minerals Pvt.Ltd
 
PDF
Followers to Fees - Social media for Speakers
Corey Perlman, Social Media Speaker and Consultant
 
PPTX
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 
Keynote: CATHOLIC UNIVERSITY: A PLACE OF CREATIVITY AND KNOWLEDGE
Alvaro Barbosa
 
Unlocking Creativity Top Adobe Tools for Content Creators Buy Adobe Software...
PI Software
 
Danielle Oliveira New Jersey - A Seasoned Lieutenant
Danielle Oliveira New Jersey
 
WAKUZOOM DIGITAL ORIGINAL COMPANY PROFILE.pdf
emmedia319
 
Best 10 Website To Buy Instagram Accounts Bulk 2025 USA
pvabest USA 2025
 
askOdin - An Introduction to AI-Powered Investment Judgment
YekSoon LOK
 
6 Timeless Japanese Concepts to Improve Business Processes
RUPAL AGARWAL
 
斯特灵大学文凭办理|办理UOS毕业证成绩单文凭复刻学历学位认证多久
1cz3lou8
 
Is Your Brand Ready for Expansion? A Strategic Guide to Scaling Successfully
RUPAL AGARWAL
 
Rodolfo Belcastro su All Around The Worlds Magazine - Febbraio 2025
Rodolfo Belcastro
 
Employnova Global Services : Outsourcing
Employnova Global Services
 
E-commerce and its impact on business.
pandeyranjan5483
 
Pakistan’s Leading Manpower Export Agencies for Qatar
Glassrooms Dubai
 
UNIT 2 BC.docx- cv - RESOLUTION -MINUTES-NOTICE - BUSINESS LETTER DRAFTING
MANJU N
 
Communications Recruiter Melbourne.pptx
ReithGordon
 
Data Sheet Cloud Integration Platform - dataZap
Chainsys SEO
 
2025 07 29 The Future, Backwards Agile 2025.pdf
Daniel Walsh
 
Mining Services and Iron Ore Transportation in India.pptx
Naaraayani Minerals Pvt.Ltd
 
Followers to Fees - Social media for Speakers
Corey Perlman, Social Media Speaker and Consultant
 
BUSINESS FINANCE POWER POINT PRESENTATION
JethSrey
 

Top tips for protecting your business online Oct 13

  • 1. Modbury & Salisbury Top tips for protecting your business online Allison Miller, Vanguard Visions Consulting
  • 2. Session Overview • Why protect your business online? • Why is now a good time to be doing business online? • Top tips for protecting your business online • Online cyber-smart business assessment • What will you investigate? • Workshop evaluation
  • 4. Why protect your business online? • More business is being done online • Privacy obligations • Maintain reputation / trust • Protect virtual assets (data) • Multiple users of the one device Image: IC3 and Computer Use and Safety - http://en.wikiversity.org/wiki/IC3/Computer_Use_and_Safety
  • 5. Why is now a good time to do business online?
  • 6. Top five industries to fly in 2013 in Australia Source: Ibis World (2013) – http://www.ibisworld.com.au/about/media/pressrelease/release.aspx?id=304
  • 7. Internet is a game changer Source: Deloitte Access Economics Pty Ltd (2013) – http://www.deloitte.com/view/en_AU/au/services/financial-advisory/deloitte-accesseconomics/05660fd56ab1e310VgnVCM1000003256f70aRCRD.htm
  • 8. Top tips for protecting your business online
  • 9. Australian Department of Defence, Intelligence and Security, Oct 2013 Source: Strategies to Mitigate Targeted Cyber Intrusions - http://www.asd.gov.au/infosec/top35mitigationstrategies.htm
  • 10. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 11. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Hard Disk Drive - http://en.wikipedia.org/wiki/Hard_disk_drive ; Iomega external hard disk drive - http://commons.wikimedia.org/wiki/File:Iomega_external_hard_disk_drive_%28cut%29.JPG
  • 12. Develop a back-up strategy 1. Assess your level of risk and identify actions to minimise 2. What data needs to be backed up and how often 3. Select an appropriate back-up device/location 4. Set reminds to do your back-ups 5. Test that you can use your backed up data 6. Store backed up data away from its original source Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 13. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Master lock with root password - http://commons.wikimedia.org/wiki/File:Master_lock_with_root_password.jpg
  • 14. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: purple Slog: “Information Security Wordle” http://www.flickr.com/photos/purpleslog/2870445268/
  • 15. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Tactical Technology Collective “Title Screen” - http://www.flickr.com/photos/ttc_press/5007644722/
  • 16. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Frederick Hermann - Just like the Nest with a more connected world all the devices need software updates now. Your TV, DVD player, watch, thermostat etc didn't used to ask for constant
  • 17. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 18. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Image: Virtual Private Network - http://en.wikipedia.org/wiki/Virtual_private_network
  • 19. Tips from Stay Smart Online http://www.staysmartonline.gov.au/business Imagine: e-commerce - http://commons.wikimedia.org/wiki/File:E-commerce.jpg
  • 20. staysmartonline.gov.au/alert_service Tips from Stay Smart Online http://www.staysmartonline.gov.au/business
  • 21. Do the cyber-smart business assessment staysmartonline.gov.au/business/home_based_businesses/questionnaire
  • 22. What will you investigate further?
  • 24. Want to know more? More info: digitalcapability.com.au Register for eUpdates: bit.ly/digitalcapability Follow on: Twitter - twitter.com/digitalcapabili Facebook - facebook.com/digitalcapability LinkedIn - bit.ly/DCLinkedIN Google+ - bit.ly/DCGoogleplus Pinterest - pinterest.com/vanguardvisions
  • 25. Allison Miller 0400 732 270 [email protected] vanguardvisionsconsulting.com.au vanguardvisionsconsulting.com.au

Editor's Notes

  • #2: Introduce yourselfiPads / laptopsWifiSurvey at end
  • #4: Raise your hand if you think protecting your business online is important?Discuss with the group:Ask everyone “Why is protecting your business online important?”
  • #5: Why protect your business online?:More and more business are doing business online, whether thatsselling or paying employees/creditors so the risk of a cyber-attack is on the riseYour business has legal obligations which govern how you must manage your customer’s information to ensure privacyAn online security breach (credit card scam, access to people’s private information) could impact your business’s reputation and/or your relationship with your customers as they will lose trust in your businessYou need to protectyour business’s virtual assets the same as you would your tangible assets – that is the data and information being stored on your devices/serversOften in small/home-based businesses computer/devices are share with their family, So it is very important that you make sure you put in place effective security process, and that you and your staff (and your family) are using the internet in a safe and secure way.
  • #6: Discuss with the group:“Why is now a good time to doing more business online?”
  • #7: We are seeing more and more people turning to the web to shop, study and search for information about products and services.Online education and shopping are among the top five industries predicted to grow by around 10% both in 2012 and 2013, and beyond
  • #8: The internet is a game changer, with a number of industries significantly changing or being ‘broken’, for example :Music industry being changed by ‘peer to peer’ file sharing which significantly impacted the number of retail musiceBooks means that we are seeing less and less bookstoresMurdoch can’t dump his newspaper shares quick enough as it’s a dying industryPlaces like Harvey Norman, Myer etc are feeling the impact of online shoppingDeloitte Access Economics (NBN Business Readiness Survey) is predicting that:One third of business are significantly being impacted by the internet now, with nearly 5 out of 10 businesses feeling some impact (32% + 17%) on the short fuseWhere does your business sit on this quadrant?
  • #10: At least 85% of the targeted cyber intrusions that the Australian Signals Directorate (ASD, formerly DSD) responds to could be prevented by following the following simple tips for protecting your business online.
  • #11: Install security software that includes a: firewall - Hardware or software which monitors information going in and out of your computer. anti-virus - A virus is a computer program designed to 'infect' and corrupt a computer and is able to copy itself. The virus can disrupt programs installed on a computeranti-spyware - Software that is installed on a computing device and takes information from it without the consent or knowledge of the user and gives that information to a third party. Set it to scanregularly.Ensure that it is updated automatically. What are people using? Payvs Free Security SoftwareSecurity Software is not required on mobile devices (smart phones / tablets) or Apple computers
  • #12: Develop a backup strategy for your critical data. A good strategy includes daily backups, an additional weekly or monthly backup and offsite storage of at least the weekly back-up media. Test that you can recover with back-up data. Creating a back-up of your data is a sensible and easy way to ensure that in the event of a fire, computer theft or virus infection you can recover all of your business information from your computer or website quickly and easily.The financial cost and time that it takes to create and implement a back up strategy is likely to be only a fraction of what you will spend if you need to recover from a data loss without one.Think of a backup strategy as insurance for your dataMake regular backups of critical data and programs on your computer. Store the backup disks in secure offsite storage. Make sure you avoid needing to recover data by having good security practices in the first place. Install and use security software including a firewall and anti-virus and anti-spyware software. Read more about securing you computer. Use a strong password to secure your back-up. This will make it much more difficult, if not impossible, for someone to view it or misuse it.
  • #13: Develop a back-up strategyDevelop a disaster recovery plan. Start by assessing your level of risk and identifying what actions you can take to minimise the risk. Assess what data and programs on your computer need to be backed up and how often. You may either back up all the data and certain programs on your hard drive each time you back up or you may do incremental back-ups. Incremental back-ups only include the files that have changed since the last time therefore saving time and space. Select a back-up device that is large enough to store the files and fast enough so it is not too time-consuming. Examples include CDs, DVDs, memory sticks or an external hard drive. Make a note somewhere obvious, such as in an office diary, reminding you to do the back-up. Test the data that has been backed up successfully and that your process is working properly. Store the back-up copies in a safe location away from your computer systems i.e. away from your home or business premises. Remember putting this information on portable media makes it vulnerable to physical removal so secure it.Would this work for your business?
  • #14: If you do not have a dedicated IT Manager, assign someone person in your organisation to have responsibility for network security egpassword, backups, AV updates, and minimise the number of users with administrative privileges.Strong Passwords:Generally, a strong password has the following attributes:• a minimum length of eight (8) characters; and• a mix of upper and lower case letters; and• at least one numeral; and• at least one non-alphanumeric character; and• does not include a dictionary word in any language.The two main ways criminals defeat strong passwords is by:• using malicious software on your computer that monitors your computer to find your password, by looking in the place where passwords are stored, monitoring your key strokes or screen activity; and• tricking people into disclosing their important passwords, or other sensitive information of value to a criminal – this is called phishing.
  • #15: Develop clear policies for staff using your computer or network. Ensure that staff understand how they are allowed to use email and the internet. A computer security policy is a document that covers the rules and practices that you want your staff to follow when working with e-mail, browsing the Web, and accessing confidential data stored in your system. A security policy can help your organisation reduce security breaches and data loss by helping employees follow through with safe and secure computing practices.In some cases you may find your customers and/or suppliers demand that you have a security policy in place that they can review - especially if you may be formally linking into their IT systemsA security policy may cover:Acceptable use - how staff use email and the internet. Should certain websites be blocked to staff? Should there be a restriction on the size of email attachments? Handling sensitive data - who and how should sensitive data be handled and stored. Securing and handling equipment - is there a system in place to track who is using equipment in the organisation? Using internet safely - what system is in place to ensure anti-virus, anti-spyware, operating systems, Web browsers and other software are kept up to date? Remote access - what is the system to ensure security is maintained while accessing the work from the road or at home?
  • #16: Develop a 'culture of security'. Businesses need to have Internet security measures in place and make sure staff are aware of and follow internet security practices. When creating your security policy, identify and work on securing the IT assets that impact your business the most. Implement a process of reporting breaches. If staff are able to report breaches confidentially they may be more willing to report at all. Set clear policies on what websites employees can and can not access.  Staff need to know what is expected of them when using email and the internet at work. Keep your security policy up to date. Review the security policy yearly to ensure it is still relevant. Stay up to date on cyber security issues. Subscribe to the Stay Smart Online Alert service to keep up to date on the latest security and network vulnerabilities. Develop clear rules for staff so that they understand what they need to be aware of and their responsibilities. You should also have clear policies on personal use and what is, or isn't, allowed. Provide induction training for new employees. It is a good time to introduce staff to your security polices and practices. Keep staff up-to-date
  • #17: Use software from reputable sources. Keep your software patches up-to-date,ie a fix for a software program, also known as a software updateIt is possible that flaws within software (called vulnerabilities) can allow hackers to remotely access and take control of your computer.These vulnerabilities exist in the operating system (Windows, Linux, Mac OS etc) and the applications that are installed on your computer (browsers, media players, word processing etc).When software providers become aware of vulnerabilities in their products, they often issue an update to the software to fix the problem. These updates are also known as patches. Similar to the way fabric patches are used to repair holes in clothing, software patches repair holes in software.Most of the software that you have installed on your computer can be updated automatically if the computer is connected to the internet.Update your web browser to the latest version. Web browsers are regularly updated to fix security flaws, so it is important to update your web browser to the latest version.
  • #18: Use spam filters to reduce the amount of spam that your business receives.Know how to manage the spam that gets through and ensure your staff know how to recognise scam and hoax emails and to avoid clicking on links or opening attachments from suspicious emails. Email viruses, worms and Trojans are capable of harming your business computer system and with it your ability to conduct your business.Email is one of the easiest and fastest means of business communication. As with any form of communication that is cheap and easy it is open to abuse. Spam-the electronic equivalent of 'junk mail'-now makes up the majority of email traffic. Spam includes electronic mail as well as mobile phone messaging such as SMS and MMS.Because businesses often advertise their email addresses they are likely to receive greater volumes of spam than home users. This not only has an impact on productivity, but spam can also carry viruses, worms and Trojans through malicious code in attachments and commands embedded in seemingly normal messages.If you use email to conduct your business you need to know how to reduce the spam you receive and to securely manage what does reach your inbox. You also need to be aware of your legal obligations to ensure any electronic messages you send to consumers do not breach Spam Act or the Australian E-marketing code of practiceDo not to open email attachments or click on hyperlinks in emails from unknown or questionable sources. It is not enough that the email originated from an address you recognise. Don't ever reply to spam. This is likely to compound the problem by confirming your email address to the spammers. Report spam to the Australian Communications and Media Authority (ACMA) at www.spam.acma.gov.au or phone 1300 855 180. Spam SMS can be reported to 0429 999 888Watch out for spam / viruses via inboxes/direct messages in social media spaces too.
  • #19: Being able to access the office while on the road can provide increased productivity and flexibility. However, it is important to ensure your equipment and connection is secure so that your network is not vulnerable or your sensitive business information exposed.Remote access can create a number of security risks for your otherwise secure network. When you open up your network to connections from an external source you increase the risk that this connection can be used by a third party to access your network or that business information can be intercepted. You need to ensure that you secure access so that only legitimate users can access your network and that you encrypt data to prevent theft. Securing remote access requires a degree of technical knowledge. If remote access is an important part of your business, and you transmit sensitive business information, it may be worthwhile to invest in specialist advice from a computer expert.Seek expert advice. Securing your remote access requires a degree of technical knowledge so seek expert advice from a computer professional if needed. Install up-to-date security software (firewall, antivirus and anti-spyware) on remote devices. Ensure that your network is also secure and security software is also up-to-date. Make sure that staff using laptops do not set their computer to log-in automatically. Make sure that they don't store their password on their laptop. Delete staff remote access privileges once they are not needed. For example, don't let someone who has left the company retain access to your network.
  • #20: Selling online can be great for your business as it expands your potential customer base to all those connected to the internet. But it also can expose your business to fraudsters, cyber vandals and criminals.Fraudulent purchases can result in lost revenue and reputation and dealing with credit card chargebacks can be time consuming and make it difficult to assess your current financial position. Having an online shop can expose your systems to unauthorised access and theft of customer information such as credit card details. Vandals and criminals can also attempt to disrupt your business through denial of services attacks, typically to extort money.To take full advantage of the digital economy you need to put in place some simple security measures so your business and your customers are protected.Keep a look out for suspect online orders. Taking steps to verify a buyer is genuine when you receive an order will save you the potential hassle of a credit card charge back later, and may prevent fraud. Secure your e-commerce website. Use the latest version of your e-commerce software and make sure your server is secure (see secure your computers and servers). Use strong passwords and change them regularly. Particularly in securing customer financial data. Don't store private customer data and credit card details on a public e-commerce server.  Store these details offline Regularly monitor and test your e-commerce systems. Conduct penetration tests of your systems and audit your security practices to ensure best practice.
  • #21: Keep yourself informed about the latest cyber security risks. Subscribe to email notification services that keep you informed about the latest cyber security risks and solutions. See our Alert Service.
  • #22: What did you find out about your business?http://www.staysmartonline.gov.au/business/home_based_businesses/questionnaire
  • #23: What will you investigate further and why?
  • #24: Ask participants to complete the online workshop evaluation