The Australian Business’s Cybersecurity Checklist: 10 Steps to Protect Your Assets

Cyber threats are a significant risk to businesses of all sizes in Australia. But you don’t need to be a large corporation to build a robust defence. By following a structured approach, you can significantly reduce your risk of a cyberattack and protect your business’s critical assets, reputation, and customer data.

This checklist is based on key principles from the Australian Cyber Security Centre (ACSC) and is designed to be a practical, actionable guide for any Australian business. For expert support in implementing these steps, Orro’s team of cybersecurity specialists provides a complete suite of services to ensure your business is resilient.

1. Implement Multi-Factor Authentication (MFA)

Why it matters: A staggering number of cyberattacks start with compromised passwords. MFA adds an essential second layer of security, making it exponentially harder for cybercriminals to access your accounts even if they have stolen a password. The Australian government considers it one of the most effective controls you can implement.

  • Action: Enable MFA on all critical accounts, starting with email, banking, social media, and any cloud services (e.g., Microsoft 365, Google Workspace, cloud accounting software)

2. Patch Your Systems and Software

Why it matters: Software vulnerabilities are a primary entry point for cybercriminals. By regularly applying security patches, you close these loopholes before they can be exploited by malicious actors.

  • Action: Set all operating systems (Windows, macOS), web browsers, and applications to update automatically. Create a schedule to manually check for and install updates for any software that doesn’t have an automatic update feature.

3. Back Up Your Data (And Test the Backups)

Why it matters: A robust backup strategy is your best defence against ransomware and data loss from a system failure. Without it, you could lose everything.

  • Action: Regularly back up all your critical business data. Follow the “3-2-1 rule”:
    • 3 copies of your data.
    • 2 different media types (e.g., an internal drive and an external hard drive).
    • 1 copy stored offsite (e.g., in a secure cloud service or at a separate physical location).
    • Crucially: Periodically test your backups to ensure you can actually restore your data when needed.

4. Train Your Employees to Spot and Respond to Threats

Why it matters: Your employees are your first and best line of defence. An attack like a phishing email is only successful if someone clicks on it.

  • Action: Conduct regular, mandatory cybersecurity awareness training for all staff. Focus on how to identify phishing scams, recognise suspicious links, and safely handle sensitive information. Encourage a culture where employees feel comfortable reporting anything that looks suspicious without fear of punishment. Orro provides security awareness training as part of our managed security services.

5. Restrict Administrative Privileges

Why it matters: Giving too many employees “admin” access to systems and networks significantly increases the risk of a breach. If a single account with high-level access is compromised, the damage can be catastrophic.

  • Action: Grant administrative access only to those who absolutely require it for their job. Create separate standard user accounts for day-to-day activities, even for IT staff. Regularly review who has admin privileges.

6. Develop an Incident Response Plan

Why it matters: When an incident occurs, time is of the essence. A pre-defined plan ensures you can contain the damage, communicate effectively, and recover quickly.

  • Action: Create a simple, clear plan that answers the following questions:
    • Who is on the response team? (e.g., an IT person, a business owner, a legal contact).
    • What are the immediate steps to contain the breach? (e.g., disconnect a compromised device from the network).
    • How will you communicate with staff, customers, and the media?
    • When do you need to report an incident to authorities like the ACSC and the Office of the Australian Information Commissioner (OAIC)?
    • Orro’s Incident Response team is available 24/7 to help you develop a comprehensive plan and act as your first responders in a crisis.

7. Secure Your Network and Devices

Why it matters: Your network is the gateway to your business. Ensuring it is properly configured is fundamental to your security.

  • Action: Install and maintain up-to-date antivirus and anti-malware software on all computers and devices. Change the default password on your Wi-Fi router. Create a separate guest network for visitors and personal devices. Use a firewall to control incoming and outgoing network traffic. Orro provides Managed Security services, including 24/7 monitoring from our Australian-based Security Operations Centres (SOCs), to take the stress out of securing your networks.

8. Know Your Legal Obligations Under the Privacy Act

Why it matters: Australian law, particularly the Notifiable Data Breaches (NDB) scheme, requires you to report data breaches that are likely to cause “serious harm.” Failure to comply can result in significant penalties and reputational damage.

  • Action: Understand what constitutes an “eligible data breach.” Ensure your incident response plan includes a clear process for assessing and, if necessary, notifying the OAIC and affected individuals. Have a clear, up-to-date privacy policy on your website. As a trusted partner, Orro can provide expert guidance to help you navigate compliance and regulatory requirements.

9. Control the Use of USBs and External Devices

Why it matters: External devices can be a vector for malware. A simple USB stick found in a car park and plugged into an office computer can unleash a devastating attack.

  • Action: Create a policy for staff on the use of external devices. If possible, configure network policies to prevent the use of unauthorised USB drives. Ensure all devices are scanned for viruses before any data is transferred.

10. Engage with the Australian Cyber Security Community

Why it matters: Staying informed is crucial in the ever-changing world of cyber threats. Government and industry bodies offer a wealth of free resources.

  • Action: Join the ACSC Partnership Program. Subscribe to ACSC Alerts. Leverage free resources from cyber.gov.au and business.gov.au. For a more proactive approach, contact Orro for a Security Maturity Assessment to identify and control your security weaknesses before they can be exploited.

Related Insights

21 August 2021

Lessons from the Colonial Pipeline Hack

In May this year, criminals performed a successful cyberattack on a large US organisation called Colonial Pipeline. Colonial Pipeline supply oil (or gas in the US) to 45% of the eastern seaboard of the USA. 
22 May 2024

Cybersecurity lessons from the financial sector: Unpacking decades of defence

For decades, the financial sector has been a prime target of cyber-attacks, a trend that started well before the recent spike in data breaches across other industries. To keep pace with the evolving tactics of cyber criminals, financial institutions have had to continuously hone their cyber defence mechanisms. Orro’s Director of Cyber Services, Manuel Salazar, offers insights into what SMEs can learn from a sector that’s become battle-hardened in the face of relentless cyber threats.
5 May 2021

The Importance of Cyber Security for Your Businesses

Security should never be considered an add-on for your business – it’s a critical base element! The reality of today’s world is that security is becoming the elephant in the room that must be discussed.

<span data-metadata=""><span data-buffer="">Explore our Resources

Cyber Security
post
Understanding and Implementing the ACSC's Essential Eight for Your Business
Cyber Security
post
Phishing in the Australian Context: The Latest Scams to Watch Out For
Cyber Security
post
Beyond the Firewall: Why a Cyber-Resilient Culture is Your Best Defence 🛡️
Cyber Security
post
The CFO's Playbook: Justifying Cybersecurity Investment
Cyber Security
post
Threat Hunt: Salt Typhoon
Cyber Security
post
The Australian Business's Cybersecurity Checklist: 10 Steps to Protect Your Assets