{"id":13372,"date":"2025-01-20T10:00:00","date_gmt":"2025-01-20T10:00:00","guid":{"rendered":"https:\/\/modernsciences.org\/staging\/4414\/?p=13372"},"modified":"2024-12-17T03:20:12","modified_gmt":"2024-12-17T03:20:12","slug":"stay-safe-cyber-attacks-expert-checklists-personal-data-protection-january-2025","status":"publish","type":"post","link":"https:\/\/modernsciences.org\/staging\/4414\/stay-safe-cyber-attacks-expert-checklists-personal-data-protection-january-2025\/","title":{"rendered":"How can you stay safe from cyber attacks? Here are 2 simple checklists from experts"},"content":{"rendered":"\n<div class=\"theconversation-article-body\">\n    <figure>\n      <img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"https:\/\/images.theconversation.com\/files\/638041\/original\/file-20241212-15-6nv1e0.jpg?ixlib=rb-4.1.0&#038;rect=883%2C903%2C5232%2C3455&#038;q=45&#038;auto=format&#038;w=754&#038;fit=clip\" >\n        <figcaption>\n          \n          <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.pexels.com\/photo\/portrait-shot-of-a-woman-5473960\/\" target=\"_blank\" rel=\"noopener\">cottonbro studios\/Pexels<\/a><\/span>\n        <\/figcaption>\n    <\/figure>\n\n  <span><a href=\"https:\/\/theconversation.com\/profiles\/jing-jia-2249748\" target=\"_blank\" rel=\"noopener\">Jing Jia<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-newcastle-1060\" target=\"_blank\" rel=\"noopener\">University of Newcastle<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/zhongtian-li-1416448\" target=\"_blank\" rel=\"noopener\">Zhongtian Li<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-newcastle-1060\" target=\"_blank\" rel=\"noopener\">University of Newcastle<\/a><\/em><\/span>\n\n  <p>\u201cCyber security\u201d may sound like a far-off worry for <a href=\"https:\/\/theconversation.com\/are-data-breaches-the-new-normal-should-we-just-assume-our-data-isnt-safe-231396\" target=\"_blank\" rel=\"noopener\">big corporations or telcos<\/a>, but that\u2019s far from the case. Cyber security simply means the practice of <a href=\"https:\/\/theconversation.com\/are-data-breaches-the-new-normal-should-we-just-assume-our-data-isnt-safe-231396\" target=\"_blank\" rel=\"noopener\">safeguarding your sensitive data<\/a> from unauthorised access, theft and damage.  <\/p>\n\n<p>If you have any online accounts at all, you should know how best to protect them. That\u2019s also true if you have a small or medium business.<\/p>\n\n<p>Nearly half of all cyber attacks target small businesses <a href=\"https:\/\/www.embroker.com\/blog\/cyber-attack-statistics\/\" target=\"_blank\" rel=\"noopener\">with 1,000 or fewer employees<\/a>, resulting <a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2023-2024\" target=\"_blank\" rel=\"noopener\">in an average cost<\/a> of A$46,600 for small businesses and $62,800 for medium-sized businesses in Australia.<\/p>\n\n<p>Even if you don\u2019t own a business, your personal savings are vulnerable, too. Last year, individuals affected by cyber crime <a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2023-2024\" target=\"_blank\" rel=\"noopener\">reported an average loss of $30,700<\/a>, up 17% from the previous year.<\/p>\n\n<p>So what can you do to protect yourself? We interviewed 18 financial, legal and cyber security professionals in Australia and developed practical checklists for individuals and small-to-medium businesses. Here\u2019s what they recommend.<\/p>\n\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\" target=\"_blank\" rel=\"noopener\"><img  decoding=\"async\"  alt=\"\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"  data-pk-src=\"https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\"  data-pk-srcset=\"https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/638748\/original\/file-20241216-17-nhthng.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=3 2262w\" ><\/a>\n            <figcaption>\n              <span class=\"caption\"><\/span>\n              \n            <\/figcaption>\n          <\/figure>\n\n<h2 id=\"cyber-security-checklist-for-individuals\">Cyber security checklist for individuals<\/h2>\n\n<p>1. <strong>Use strong, unique passwords<\/strong><\/p>\n\n<p>Strong passwords are a cornerstone of cyber security. You\u2019ve likely heard this a lot, but it bears repeating: set up a unique password for each of your online banking and email accounts, using a combination of letters, numbers and special characters. <\/p>\n\n<p>2. <strong>Enable multi-factor authentication<\/strong><\/p>\n\n<p>Add an extra layer of security to all your important accounts by enabling two-factor or <a href=\"https:\/\/theconversation.com\/what-is-multi-factor-authentication-and-how-should-i-be-using-it-191591\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a> wherever possible (you can easily find this in app settings). This means that after entering your password, you also need to enter a verification code sent to your phone, for example.<\/p>\n\n<p>3. <strong>Be cautious with email attachments and links<\/strong><\/p>\n\n<p>Avoid clicking on links or downloading attachments from unknown or unsolicited emails or <a href=\"https:\/\/theconversation.com\/scammers-can-slip-fake-texts-into-legitimate-sms-threads-will-a-government-crackdown-stop-them-200644\" target=\"_blank\" rel=\"noopener\">text messages<\/a>. Verify the sender and stay vigilant. <\/p>\n\n<p>4. <strong>Limit what personal info you share online<\/strong><\/p>\n\n<p>Cyber criminals often use publicly available information for <a href=\"https:\/\/theconversation.com\/phishing-scams-7-safety-tips-from-a-cybersecurity-expert-216198\" target=\"_blank\" rel=\"noopener\">social engineering attacks<\/a> where they pretend to be someone you know, your employer, or even a business you\u2019ve interacted with. Be mindful of any information you share on social media and other platforms.<\/p>\n\n<p>5. <strong>Avoid public wifi for sensitive transactions<\/strong><\/p>\n\n<p>When accessing sensitive information (like banking sites), avoid using public wifi or hotspots. It\u2019s best to use your mobile data connection or, if you know how to set one up, use a virtual private network, or VPN.<\/p>\n\n<p>6. <strong>Exercise caution when using artificial intelligence (AI) tools<\/strong><\/p>\n\n<p>Before uploading sensitive or confidential information to AI tools such as ChatGPT or Claude, think of the potential risks. Avoid using untrusted or unsecured platforms, check their policies to understand how your data might be shared, and be mindful of the types of information you share with these tools. <\/p>\n\n<p>7. <strong>Use encryption for sensitive information<\/strong><\/p>\n\n<p>Encrypt personal files and sensitive communications to protect them from unauthorised access. For example, you can set a password for your document in Microsoft Word by selecting \u201cEncrypt with Password\u201d under the \u201cInfo\u201d tab in the \u201cFile\u201d menu. This ensures only people with the password can open or modify the file.<\/p>\n\n<p>8. <strong>Stay informed about cyber security threats<\/strong><\/p>\n\n<p>Keep up with cyber security news and trends to know what types of attacks are becoming common. You can do this by subscribing to <a href=\"https:\/\/theconversation.com\/au\/topics\/cybersecurity-535\" target=\"_blank\" rel=\"noopener\">news articles<\/a> on scams or checking websites like <a href=\"https:\/\/www.scamwatch.gov.au\/\" target=\"_blank\" rel=\"noopener\">Scamwatch<\/a>.<\/p>\n\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\" target=\"_blank\" rel=\"noopener\"><img  decoding=\"async\"  alt=\"\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\"  data-pk-src=\"https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\"  data-pk-srcset=\"https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=750&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/638752\/original\/file-20241216-17-j9klt8.png?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=943&amp;fit=crop&amp;dpr=3 2262w\" ><\/a>\n            <figcaption>\n              <span class=\"caption\"><\/span>\n              \n            <\/figcaption>\n          <\/figure>\n\n<h2 id=\"cyber-security-checklist-for-small-and-medium-businesses\">Cyber security checklist for small and medium businesses<\/h2>\n\n<p>Much of the advice for individuals also applies to business owners. But there are other things you should keep in mind when it\u2019s not just your personal data that\u2019s at stake.<\/p>\n\n<p>1. <strong>Evaluate how long to keep information<\/strong><\/p>\n\n<p>Determine how long to retain information and data and assess if it\u2019s valuable for the organisation. For example, an accounting firm may retain client tax records for five years, but delete older records no longer relevant to current business.<\/p>\n\n<p>2. <strong>Remove unnecessary information and data<\/strong><\/p>\n\n<p>Remove information that no longer serves a purpose to reduce the risk of exposure during a breach. For example, retail businesses should periodically delete outdated customer email lists.<\/p>\n\n<p>3. <strong>Keep software and systems up to date<\/strong><\/p>\n\n<p>Keep all systems, applications and devices updated. Software may contain vulnerabilities that cyber criminals can exploit, and updates are a way to patch these up and keep your systems secure.<\/p>\n\n<p>4. <strong>Keep an eye on who can access what<\/strong><\/p>\n\n<p>Limit access to information based on roles within the organisation. For example, at an accounting firm, only the relevant employees should have access to the financial records of its clients, and they should be protected with multi-factor authentication.<\/p>\n\n<p>5. <strong>Have reliable data backup procedures<\/strong><\/p>\n\n<p>Regularly back up essential data to a secure location. Having reliable backups allows for recovery in the event of data loss or ransomware attacks.<\/p>\n\n<p>6. <strong>Conduct regular security audits<\/strong><\/p>\n\n<p>Regularly audit systems and networks to identify vulnerabilities. For example, an accounting firm that stores sensitive client data like financial records should conduct quarterly security audits to ensure the data stays safe and nobody has gained illicit access.<\/p>\n\n<p>7. <strong>Train employees on cyber security best practices<\/strong><\/p>\n\n<p>Employees play a significant role in cyber security. Regular training can help them recognise phishing emails, suspicious links and other tactics used by cyber criminals. <\/p>\n\n<p>8. <strong>Create an incident response plan<\/strong><\/p>\n\n<p>Develop a response plan for cyber security incidents that outlines the steps to take in case of a cyber incident or breach. If something happens, having a plan in place will help you react quickly and efficiently.<\/p>\n\n<p>9. <strong>Consider investing in cyber security insurance<\/strong><\/p>\n\n<p>Cyber insurance can help mitigate the financial fallout from a breach, covering aspects like data restoration, legal fees and public relations efforts.<\/p>\n\n<p>Cyber attacks are constantly evolving, so everyone must stay vigilant about their cyber security \u2013 whether it\u2019s simply protecting the logins to your social media accounts, or ensuring the safety of your entire business.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img  loading=\"lazy\"  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"The Conversation\"  width=\"1\"  height=\"1\"  style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important\"  referrerpolicy=\"no-referrer-when-downgrade\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"https:\/\/counter.theconversation.com\/content\/245040\/count.gif?distributor=republish-lightbox-basic\" ><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n\n  <p><span><a href=\"https:\/\/theconversation.com\/profiles\/jing-jia-2249748\" target=\"_blank\" rel=\"noopener\">Jing Jia<\/a>, Senior Lecturer, Business School, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-newcastle-1060\" target=\"_blank\" rel=\"noopener\">University of Newcastle<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/zhongtian-li-1416448\" target=\"_blank\" rel=\"noopener\">Zhongtian Li<\/a>, Senior Lecturer, Business School, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-newcastle-1060\" target=\"_blank\" rel=\"noopener\">University of Newcastle<\/a><\/em><\/span><\/p>\n\n  <p>This article is republished from <a href=\"https:\/\/theconversation.com\" target=\"_blank\" rel=\"noopener\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/how-can-you-stay-safe-from-cyber-attacks-here-are-2-simple-checklists-from-experts-245040\" target=\"_blank\" rel=\"noopener\">original article<\/a>.<\/p>\n<\/div>\n\n\n\n\n<p class=\"\"><\/p>\n","protected":false},"excerpt":{"rendered":"cottonbro studios\/Pexels Jing Jia, University of Newcastle and Zhongtian Li, University of Newcastle \u201cCyber security\u201d may sound like&hellip;\n","protected":false},"author":1046,"featured_media":13374,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","fifu_image_url":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/2\/2b\/Cybersecurity_Visuals_Challenge_2019_-_Rebecca_Wang.jpg","fifu_image_alt":"","footnotes":""},"categories":[1],"tags":[3451,3450,3444,3453,3438,3457,3447,3448,3440,3455,3446,3439,3442,3443,3452,3454,3456,3458,3441,3449,3445,474],"class_list":{"0":"post-13372","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorized","8":"tag-access-control","9":"tag-ai-tool-caution","10":"tag-cyber-attacks","11":"tag-cyber-insurance","12":"tag-cybersecurity-tips","13":"tag-data-backups","14":"tag-data-retention","15":"tag-employee-training","16":"tag-encryption","17":"tag-incident-response-plan","18":"tag-multi-factor-authentication","19":"tag-personal-data-protection","20":"tag-phishing-awareness","21":"tag-public-wi-fi-risks","22":"tag-ransomware-protection","23":"tag-scamwatch","24":"tag-security-audits","25":"tag-sensitive-transactions","26":"tag-small-business-security","27":"tag-software-updates","28":"tag-strong-passwords","29":"tag-the-conversation","30":"cs-entry","31":"cs-video-wrap"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/posts\/13372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/users\/1046"}],"replies":[{"embeddable":true,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/comments?post=13372"}],"version-history":[{"count":1,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/posts\/13372\/revisions"}],"predecessor-version":[{"id":13373,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/posts\/13372\/revisions\/13373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/media\/13374"}],"wp:attachment":[{"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/media?parent=13372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/categories?post=13372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/modernsciences.org\/staging\/4414\/wp-json\/wp\/v2\/tags?post=13372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}