Loading
Over the past few years there has been a significant increase cyber crime targeted at the SME market. There are two factors contributing to this rise. First, is the rise in crypto-currencies, which has enabled anyone in the world to be paid a sum of money, without being identified or held accountable (ransomware). Second, is the increased focus on security by the enterprise sector, meaning that targeting a large number of small businesses has become more effective than trying to breach a single large business.
60% of small businesses who experience a breach, go out of business within 6 months.
Over 90% of breaches are the result of human error. It only takes one person to click one wrong link.
Almost half of all recorded cyber attacks are targeted at SMEs as they are often easy targets.
Complete our online cyber risk assessment to determine where your business is most at risk. Share these reports internally and benchmark your results with of similar size and/or in similar industries.
More InformationStart your cyber security journey right! We have collected everything you need to start reducing your cyber security risk. Access our collection of cyber policy documents, operational checklists and market place of preferred vendors.
More InformationDid you know 90% of breaches are due to human error? It only takes one person in your business to click a link or open an attachment for a breach to occur. You can significantly reduce this risk by providing short engaging micro-lessons for staff to learn basic cyber security hygiene.
More InformationWe have designed a simple four part framework to make getting started as easy as possible.
Access to this content is free forever!
It is much easier to protect your most valuable items. For this reason we store our most valued physical items in a safe. This program will help you identify what your most valuable digital assets are.
Get StartedIt is widely accepted that enabling Two-Factor on your systems is the most effective way to prevent a breach. This program will explain what Two-Factor is and how it can be implemented in your business.
Get StartedThe most common way a hacker will access your business is via an email with malicious links and/or attachments. This program will provide you with awareness material to educate your team on how to avoid being a victim.
Get StartedWith data breaches being announced daily, it is critical your business and team have good password hygiene. This program will explain the dangers of poor password hygiene and solutions to keep your login details safe.
Get StartedComplete the free cyber risk assessment to visualise your risk and
benchmark against similar businesses.
Please see a list below of the categories covered in our security framework.
Each category contains professionally prepared, ready to use policy templates, actionable checklists, and vetted vendors.
Covering cyber security basics and base policy documents every business should have.
Actions steps to define what information is important and how that information should be handled.
Steps to review and implement strong/robust authentication security for all systems and staff.
Actions to ensure that your networks are configured and maintained with cyber security considerations.
Actions to ensure the companies email security is robust and defends you from the most common threats.
Actions to ensure that software and operating systems are configured and maintained to ensure security.
Secure your web browsers, and implement controls to ensure safe internet usage by all staff.
Actions to ensure the security and availability of your website environment.
Actions to ensure that your companies devices are safe both in and out of the office.
Actions to review and implement best practice endpoint protection and management.
Ensure that all staff have an understanding of the risks of removable media and safe behaviour.
Actions to ensure you operate within applicable local and international privacy/security regulations.
Actions to ensure staff are aware of safe behavior and systems are set up correctly for remote connection.
Actions to test and implement a robust and reliable disaster recovery system.
Process to ensure, that should an incident occur, you have a clear course of action to follow.
Actions to address your human cyber risk and foster a cyber aware culture.
Actions to ensure that your operational team has resources and procedures to be cyber safe.
Actions to ensure you have clear, meaningful policies to address and reduce your cyber risk.
You can significantly reduce your cyber risk by providing awareness training to your team. Staff are invited to your training program via an email invitation and are sent one training courses every 3 months. Staff engagement and completion is tracked and available in dashboard reporting.
Phishing Explained
Password Hygiene
Being Safe Online
Information Security
CEO Fraud
Social Engineering
Getting started could not be easier! Start with our free program, or jump right in and get full access, delivered in minutes.
Our basic program is FREE forever!
Perfect for up to 50 staff
Suited for mid-large companies
Before you go, would you like to get free access to Cyber Aware's cyber health check and STOP program?
Complete the form below and we will send you immediate access.
Please complete the form below and we will send your free access to our Cyber Security Basics program within 24 hours.
Please complete the form below and a member of the Cyber Aware team will be in contact to setup your account and issue invoice.
Please complete the form below and a member of the Cyber Aware team will be in contact to discuss Cyber Aware services.