1. Enable strong authentication methods 

    Protect your accounts with multi-factor authentication (MFA) to add a critical security layer beyond just passwords.
  2. Data backup

    Whether you’re a business owner or an individual, regularly back up important data both locally and in the cloud. This helps to mitigate any damage and facilitate recovery in the event of data loss due to cyberattacks or other disasters.
  3. Handle personally identifiable information (PII) with care 

    Exercise utmost caution when dealing with personally identifiable information (like your name, birth date, address, bank details). Before sharing any personal details over the phone, ensure the caller’s legitimacy by independently contacting the company using verified contact information from official sources. Additionally, be circumspect about the amount and nature of personal information you share online, limiting exposure to prevent potential misuse.
  4. Pause before you pay 

    Take a moment to think before providing your payment details online, over the phone or via SMS, especially in response to urgent or unsolicited requests.
  5. Limit access to sensitive data

    If you are business owner, practice the principle of need to know and least privilege by limiting access to sensitive data based on individual roles. Regularly review access rights and adjust them as needed.
  6. Enforce role-based task segmentation for high-risk operations

    To enhance security and reduce the risk of fraud or errors within a business context, it’s crucial to implement segregation of duties for high-risk tasks. This approach involves dividing responsibilities among different individuals to ensure that no single person has control over the entire process. By requiring that multiple people review and approve each stage of critical operations, you can effectively prevent unauthorized actions and increase the accuracy and integrity of your processes.
  7. Enhance physical security measures

    Strengthen your defenses against unauthorized access by implementing robust physical security protocols. Secure all electronic devices with password protection and keep them in locked or restricted areas when not in use. Similarly, store sensitive paper records in locked filing cabinets or safes. Ensure electronic devices are encrypted at rest.
  8. Verify email addresses 

    Always double-check the sender’s email by hovering over the address. Look for subtle misspellings or unusual characters that could indicate a fraudulent email (e.g., ‘.com’ replaced with ‘.con’). Fraudsters might also create an email address that looks somewhat similar like @bgprivatemelb.com instead of @bgprivate.com.au. Scam email addresses might also be completely different to what they should be as the fraudsters hope you won’t notice. For example,
  9. Strengthen your cybersecurity

    Contact your computer service provider to ensure frequent updates to your systems, and network, minimizing potential security vulnerabilities.  Activate automatic updates to ensure you’re always running the most secure versions of software.
  10. Think before you click

    In our fast-paced world, scammers often exploit hasty decisions. Take a moment to reflect before entering your card details online.
  1. Monitor your accounts

    Regularly check your bank and credit card statements for any unauthorized transactions. Consider setting up SMS or email alerts for transactions to help monitor your accounts effectively.
  2. Lower your credit limit

    Reduce your credit card limit to decrease potential fraud exposure.
  3. Set transaction limits

    Protect your finances by setting daily or transactional spending limits on your accounts.
  4. Verify supplier payments

    Always confirm payment details directly with your suppliers by phone before transferring funds, especially if the instructions come via email.
  5. Safely navigate emails

    Avoid clicking on links or downloading attachments from unknown senders. Access services directly through official apps or websites instead.
  6. Be cautious with attachments

    Do not open attachments or links that appear suspicious, as they may contain malware.
  7. Password hygiene

    Utilize long unique passphrases for all accounts.
  8. Use secure payment options

    Consider using payment methods like PayID, which offer additional security features.
  9. Beware of impersonation scams

    If you receive a call claiming to be from your bank and urging you to download software, hang up immediately. Always contact your bank directly using a trusted number.
  10. Scrutinise SMS requests

    Ignore urgent SMS messages that prompt you to settle debts, update details, or change passwords. These are likely scams.
  11. Double check URLs

    Ensure the website’s URL is correct before logging in or making payments, as scammers often create fake sites that mimic legitimate ones.
  12. Monitor your credit

    Regularly request your credit report from major bureaus (Equifax, Illion, Experian) and consider placing a credit report ban to prevent identity theft.
  13. Stay informed

    For more information on protecting yourself from cyber threats, visit the Australian Cyber Security Centre and Scamwatch websites.

Contact us

Our independent IT partners over at F1 can assist you with cyber security advice and solutions.

Contact us and we’ll help: +61 3 9810 0700 |

Contact us