This guide has been developed to help small and micro businesses adapt to working during the COVID-19 pandemic. It will help businesses with simple and actionable advice in order to both identify common and emerging cyber threats and develop resilient business practices to protect themselves.
The cyber security basics
The COVID-19 pandemic has heightened concerns throughout society, including around cyber security. No matter the type of cyber threat, there are simple steps that businesses can take to protect themselves.
Watch out for scam emails (phishing)
Scam emails or phishing (pronounced ‘fishing’) are emails that are often made to appear as if they were sent from individuals or organisations you think you know, or you think you should trust. They are designed to trick individuals out of their money and information.
Phishing communications often mimic professional phrasing, branding and logos of authentic businesses in order to appear genuine. They are designed to defraud individuals and businesses by: requesting or pretending to confirm personal information, passphrases or credit card numbers; demand payment for a fake account; or by tricking them into clicking a harmful link or attachment. Attachments may contain malware, which is software designed to harm your computer or to gain access to your computer without your knowledge.
Phishing is not just limited to email. These scams are delivered via SMS, instant messaging and social media. Phishing is becoming increasingly difficult to identify, as cybercriminals adapt their methods and find new ways to steal money and data.
Small and micro businesses should:
See the ACSC’s guidance on Detecting socially engineered messages.
Update your software
An update is a new, improved or safer version of installed software (an operating system or application) on computers and mobile devices.
Small and micro businesses should:
See the ACSC’s step-by-step guides on Turning on automatic updates (For Windows 10) and Turning on automatic updates (For iMac & MacBook, iPhone & iPad).
Use strong unique passphrases
Passwords are passé! Passphrases are the first line of defence for your accounts. Passphrases grant access to a computer, application or online service and are most effective when they are unique to a single account.
Small and micro businesses should:
See the ACSC’s Small business cyber security guide for guidance on creating strong passphrases.
Enable multi-factor authentication
Multi-factor authentication is one of the most effective security controls you can implement to prevent unauthorised access to computers, applications and online services. Multi-factor authentication typically requires a combination of proofs, such as:
Using multi-factor authentication makes it much harder for cyber criminals to attack your business. Cyber criminals might manage to steal one type of proof of identity (for example, your passphrase) but it is very difficult to steal the correct combination of several proofs for any given account.
Small and micro businesses should:
See the ACSC’s step-by-step guides on how to turn on multi-factor authentication for Apple ID, Facebook, Gmail and Twitter.
Backup your data
A backup is a digital copy of your business’ most important data (for example, customer details or sales figures). This data can be saved to an external USB hard drive (which is disconnected from computers when not in use), or to somewhere on the internet, such as a cloud storage service. You can set your computer to automatically backup your data and it will save your data periodically without human intervention. So long as you maintain regular backups, in the event that you lose access to your onsite data, you will then be able to restore what was lost.
Small and micro businesses should:
Additional COVID-19 measures
The COVID-19 pandemic has meant businesses need to be flexible to a different way of operating, such as having more people work from home. Remote working introduces new cyber security risks. The following are additional measures you can implement while operating your business in the COVID-19 environment.
Portable devices
You and your staff may be using portable devices – such as laptops, tablets or mobile phones – to conduct business activities. Some staff may need training on the cyber security basics when using unfamiliar portable devices and connecting them to your business network.
Small and micro businesses should:
See the ACSC’s guidance on Quick wins for your portable devices.
Physical security
The physical security of assets is important when considering an increase in the number of staff who are working remotely. As more staff are mobile, there is a greater risk that portable devices can become lost, stolen or broken, and for strangers to obtain access to your business operations.
Small and micro businesses should:
Avoid public Wi-Fi
Public Wi-Fi hotspots, such as those available in places like cafes, libraries, hotels and airports, can be convenient. They can also be a cyber security risk. Cybercriminals have been known to set up rogue Wi-Fi hotspots with names that look legitimate but can intercept communications in order to steal your banking credentials, account passphrases or other valuable information.
Small businesses should:
See the ACSC’s guidance on Using Virtual Private Networks.
Staff training
Working from home can be daunting for staff who haven’t done it before, especially if it’s a sudden decision. Informing and training staff in their cyber security responsibilities is important and will ensure your staff can help protect your businesses.
Small and micro businesses should:
Further information
The ACSC’s Threat update: COVID-19 malicious cyber activity provides an overview of observed COVID-19 malicious activity impacting Australians.
The ACSC’s Small business cyber security guide contains cyber security guidance tailored for small businesses to help them protect themselves against cyber threats.
The ACSC’s step-by-step guides are practical handbooks with steps and visual aides for small businesses to turn on automatic updates for operating systems, such as Microsoft Windows 10 and Apple iOS and macOS.
The ACSC’s step-by-step guides for turning on multi-factor authentication are a practical handbooks with steps and visual-aides for small businesses to turn on multi-factor authentication for Apple ID, Facebook, Gmail and Twitter.
The ACSC’s Quick Wins for your Portable Devices provides information on actions small businesses can take to improve the security of their portable devices.