The Cyber Identity offering for small business is designed to secure your most important assets; you, and your people.
Situation & risk to small business
Do you have dual use personal & business computers? Any compromise on these devices can result in a number of harmful outcomes for your business including:
unauthorised access to sensitive data such as invoices, client information, intellectual property, revenue, sales and emails
reputation damage through use of your email account to issue fake invoices and send phishing emails
consumer trust in your brand
stolen credentials for your business accounts sold on the dark web
Do you leverage a managed IT provider? Business owners need to know whether the cyber security practices of you and your staff are sufficient so that;
the same or similar passwords shared between personal devices and corporate IT can't result in unauthorised access. The most effective way to mitigate this is through the use of phishing resistant multi-factor authentication.
if personal devices had malware on them capable of spreading to your corporate IT, that it would be prevented at the source before it reached your corporate systems.
if your business was being targeted via malicious actor, would you detect them attempting to access business systems?
Business email compromise (BEC)
After criminals gained access to her private email account, an Australian small business owner had her business accounts taken over.
Small businesses are targets for cyber crime, see the resources page for helpful documents from the ACSC.
For a primer on cyber security topics and best practice, Cyber Identity recommends the Australia Cyber Security Centre's Small Business Cyber Security Guide.
Cyber Identity's solution
There is never a 'silver bullet' in security. Any effective solution is a layering of different mitigations that make you a more difficult, harder target, such that you are never the lowest hanging fruit for criminals. We aim to secure your people, turning them into secure citizens of the internet so that they cannot be trivially used to target your business.
A personal security questionnaire to tailor our offering
Evaluation of existing personal security posture
Remediation of any identified compromise following evaluation
Assessment and risk management for exposure to previous security breaches
Assistance in the implementation and monitoring of:
Password management
Email aliasing
Hardware based multi-factor authentication
Identity monitoring
Virtual payment methods/providers
Canary tokens
Managed endpoint detection and response*
A services retainer for advice and response following a personal cyber security incident.
A trusted advisor to turn to for personal security inquiries and planning.
Analysis of current cyber threats to individuals and noteworthy news. It is shared with our clients, and used to constantly improve our offerings.