CyberHUB
Cyber security quick wins – Tips and techniques

Reading time: 2 minutes
Developing a cyber risk management plan takes some time, but there are some strategies that financial professionals can put in place while it does this.
The Australian Signals Directorate (ASD) suggest setting up email authentication measures such as multi-factor authentication which can help to prove an email is not forged and it is indeed from who it says it is from. It is most often used to block harmful or fraudulent uses of email such as phishing and spam.1
Protecting domain names is another valuable practice and includes measures such as using a reputable registrar, choosing a strong password, enabling privacy protection and regularly renewing the domain. Registering additional domain names can offer further protection because it helps to secure a business’s online identity and prevent competitors from purchasing the other extensions of your domain.
Another key focus area is ensuring sensitive client data such as financial or health information can only be accessed by those authorized. While sharing information online is how most of us communicate and conduct business, using strong passwords and two-factor authentication, encryption and replacing single sign-ons with unique logins are all important.
Finally, awareness and training are key aspects of cyber resilience helps practices, and their clients identify risks and threats and take steps to prevent cyber-attacks. Remaining vigilant and informed requires ongoing training and updates to keep cyber secure.
Other focus areas include:
Client portals
Can mitigate exposure to cyber threats because they enable the secure sharing of documents and reports with your clients, and often have added security benefits such as two-factor authentication for added security.
Strong passwords
A straight-forward measure that can be enacted immediately. Best practice describes strong passwords as having more than eight characters, containing alphanumeric characters, no personal information, preferably incorrect spelling and should not have been used before.
File sharing apps
Sharepoint can be used to share files instead of sending over email, because they require permissions to be set for user access.
Software updates
An important way of ensuring you have the latest functionality updates with the best security as well.
Digital access
Does not require a blanket approach. A regular audit of permissions and controls across your business will ensure your team has access to what they need to perform their job, while also limiting exposure.
Learn more about our all-in-one secure client portal
Continue reading
Trends from the US – What does this mean for your business?
Over the past decade, Government and regulators have built a framework of governance for businesses to provide them with a structured approach to cyber-incidents and accountability.
Dive into the conversation