---
description: What is cybersecurity? We detail the five main cyberattacks that small businesses are vulnerable to. Plus, we cover the best ways to protect your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: What Is Cybersecurity? And How To Make Sure Your Business Is Protected
---

# What Is Cybersecurity? And How To Make Sure Your Business Is Protected

Canonical: https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected

Published on 02/03/2020 | Written by Lucca Rossi, Anna Hammond.

![What Is Cybersecurity? And How To Make Sure Your Business Is Protected](https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png)

> The topic of cyberattacks often makes headlines around the world. Companies like  PlayStation, eBay, Yahoo and JPMorgan have already spearheaded news on the subject by becoming victims of cybercrime. 

-----

## Article Content

The topic of cyberattacks often makes headlines around the world. Companies like  PlayStation, eBay, Yahoo and JPMorgan have already spearheaded news on the subject by becoming victims of cybercrime. In the case of Travelex, the foreign exchange giant was hit by a digital attack on New Year’s Eve. The criminals behind the notorious Sodinikibi ransomware demanded a $6m payment to restore stolen files. Shockingly, the criminal hacking group claimed to gain access into TravelEx’s systems six months prior to the attack. In an attempt to control the attack, Travelex was forced to take down 30 of its websites across the world. Customers across Europe, Asia and the US were impacted. In Australia, cybercrime is reported every 10 minutes across the nation, according to the Australian Cyber Security Centre. Additionally,  PrivacyAustralia estimates that cybercrime costs the Australian economy more than $1bn annually.Given the media coverage that this type of crime receives, we’d forgive smaller businesses for thinking that large companies and institutions are the main targets for digital attacks. But, they’d be wron g. More than three-quarters of small businesses in Australia (78%) are targeted by cybercriminals, according to SmartCompany, de monstrating that these types of businesses are especially vulnerable. Why is this the case? No matter whether they have a large customer base or do not have high sales, many entrepreneurs stop investing in cybersecurity. That is where the danger lies. Below, we’ve detailed the losses of cybercrime in Australia. We’ve also included some valuable tips, such as the adoption of cybersecurity software, to make digital security a priority for your company.What makes a small business vulnerable to cyberattacks?There are some factors that make SMEs an easy target for hackers. These include:Absence of cybersecurity actions.Lack of training and awareness of employees about digital dangers.Possession of important data, such as customer credit card information.No external platform for file backup and data protection.A cyber attack can be extremely damaging to an SME. System unavailability, loss of important data, damage to customers and problems with the brand’s reputation are the main consequences of this crime. Depending on the severity, bankruptcy can occur, after all, statistics indicate that cyberattacks cost SMEs an average of $2.2million. Half of the costs go towards clean-up and the other to business disruption.According to SmartCompany, businesses that are victims of a cyberattack can get in trouble with governmental agencies too:‘ Both the GDPR and the Notifiable Data Breaches scheme require strict reporting should customer data become compromised⁠ — with the potential for stiff penalties and fines for non-compliance, up to $2.1 million for the NDB, and up to €20 million ($32 million) or 4% of the company’s global annual turnover for GDPR.’Online threats are not only increasing every year, but hackers are also becoming more skilled. The five main types of cyber attacksCybercrimes have very clear objectives: Illegal access to devices and the theft of confidential data. See some types of cybercrime below:MalwareMalware is malicious software that, by downloading suspicious files, allows the criminal to have unauthorised access to third-party data. Viruses, spyware, Trojan horses and ransomware are some of the most well-known malware.RansomwareThis is the type of digital crime in which the hacker hijacks the victim’s data and, from then on, charges a fee for retrieving the information, leading many companies to yield to extortion. Phishing You’ve probably already dealt with this mode of attack\! Phishing is an attempt to obtain data, such as passwords and credit card numbers, from fraudulent emails that imitate trusted sources. It is also common to create fake pages that emulate bank sites to steal confidential information.  Social EngineeringIn this method, the criminal deceives employees of a company to gain access to important data. The threat comes from sources that seem reliable, like a message from a co-worker or authoritative figure. However, that account was probably hacked and the purpose of the accompanying link is to complete the scam.   DDoSThe distributed denial of service (DDoS) attack aims to make a server, application or infrastructure unavailable. It is a very common form of attack on online services, such as e-commerce.What is cybersecurity?At this point, you may be wondering how you can protect your company against these digital threats. Therefore, the time has come to talk about what cybersecurity is and how this practice can help you against the insecurity of the digital environment. Cybersecurity refers to preventive methods that protect a company’s system from unauthorised access. Based on the strategies, the risk of crucial information being accessed is mitigated, maintaining the integrity of the business. How to prevent cyber attacksIn a scenario where companies can take months to identify cyberattacks, such as Travelex, it is essential to have digital protection actions. A strong response strategy includes these three important pillars: People, processes and technology. That’s what we’ll break down below.1. PeopleStaff training is an important part of prevention measures. Many crimes are committed from basic errors, such as opening an email with fake content or downloading suspicious files. Invest in constant training that encourages employees to create strong passwords and also warn of the danger of suspicious content. Create a sense of responsibility for digital protection in them.2. ProcessesWhat’s the best way to proceed in the face of a cyber attack? Have an action map ready in which you also define assignments. Your company can respond quickly to threats. Cybercrimes are increasingly sophisticated, so your reaction method must also evolve at the same rate.3. TechnologyFrom antivirus to backup tools, use  cybersecurity software as an important ally in your prevention strategy. Countless options on the market fit the needs and budget of small businesses.   Another tip is to employ  email security software. This tool protects against viruses, SPAM, phishing, ransomware, among other threats. Protection is essential for the sustainable growth of your business. How does your company shield itself from cyberattacks? Share your insights in the comments.

## About the authors

### Lucca Rossi

Lucca is a Program Manager in Capterra. As an analyst, he covered themes such as cybersecurity and digital means of payment. His work appeared on the sheet of S.Paulo and TecMundo.

### Anna Hammond

Anna was an analyst for Capterra.

## Related Categories

- [Compliance Software](https://www.capterra.com.au/directory/30110/compliance/software)
- [Cybersecurity Software](https://www.capterra.com.au/directory/31037/cybersecurity/software)
- [Endpoint Protection Software](https://www.capterra.com.au/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.com.au/directory/30003/network-security/software)
- [Vulnerability Management Software](https://www.capterra.com.au/directory/31062/vulnerability-management/software)

## Related Articles

- [Report: The Risks Of Poor Cybersecurity Knowledge And Remote Working](https://www.capterra.com.au/blog/1350/report-risks-poor-cybersecurity-knowledge-remote-working)
- [Digitisation Vs Digitalisation: What’s The Difference?](https://www.capterra.com.au/blog/1675/digitisation-vs-digitalisation-whats-the-difference)
- [Low-Code Vs No-Code: Building Applications Focused On Functionality](https://www.capterra.com.au/blog/1780/low-code-vs-no-code-building-applications)
- [Cybersecurity threats: Advanced email phishing attacks are biggest concern for Aussie businesses in 2024](https://www.capterra.com.au/blog/4488/cybersecurity-threats-report-australia)
- [Data breaches: Nearly half of Aussie employees use same password across multiple accounts](https://www.capterra.com.au/blog/4506/data-breaches-and-employee-behaviours-australia-report)

## Links

- [View on Capterra](https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected)
- [Blog](https://www.capterra.com.au/blog)
- [Home](https://www.capterra.com.au/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Capterra Australia helps millions of people find the best business software with user reviews, ratings and price comparisons.","email":"info@capterra.com.au","url":"https://www.capterra.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCjRCDmEibpHwyX3m2b3y80w"]},{"name":"Capterra Australia","url":"https://www.capterra.com.au/","@id":"https://www.capterra.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"What Is Cybersecurity? And How To Make Sure Your Business Is Protected","description":"What is cybersecurity? We detail the five main cyberattacks that small businesses are vulnerable to. Plus, we cover the best ways to protect your business.","url":"https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected","about":{"@id":"https://www.capterra.com.au/#organization"},"@id":"https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected#webpage","@type":"WebPage","isPartOf":{"@id":"https://www.capterra.com.au/#website"}},{"description":"The topic of cyberattacks often makes headlines around the world. Companies like  PlayStation, eBay, Yahoo and JPMorgan have already spearheaded news on the subject by becoming victims of cybercrime. ","author":[{"name":"Lucca Rossi","@type":"Person"},{"name":"Anna Hammond","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png","@id":"https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected#primaryimage","@type":"ImageObject"},"@type":"BlogPosting","articleBody":"&lt;p&gt;The topic of cyberattacks often makes headlines around the world. Companies like  PlayStation, eBay, Yahoo and JPMorgan have already spearheaded news on the subject by becoming victims of cybercrime. &lt;/p&gt;&lt;img title=&quot;what-is-cybersecurity-1&quot; alt=&quot;What is cyber security&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/E0_MOe-PfffKP7aiGfqk3IzR7ZjSS1_eI4VWz9zNbRo/9104eb0e6e575ab3deca91205a649ec0/what-is-cybersecurity-1.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;In the case of Travelex, &lt;a href=&quot;https://www.techradar.com/au/news/travelex-website-was-hit-by-sodinokibi-ransomware&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;the foreign exchange giant was hit by a digital attack on New Year’s Eve&lt;/a&gt;. The criminals behind the notorious Sodinikibi ransomware demanded a $6m payment to restore stolen files. Shockingly, the criminal hacking group claimed to gain access into TravelEx’s systems six months prior to the attack. &lt;/p&gt;&lt;p&gt;In an attempt to control the attack, Travelex was forced to take down 30 of its websites across the world. Customers across Europe, Asia and the US were impacted. &lt;/p&gt;&lt;p&gt;In Australia, &lt;a href=&quot;https://thenewdaily.com.au/life/tech/2019/10/07/email-hacks-cybercrime-australia/&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;cybercrime is reported every 10 minutes&lt;/a&gt; across the nation, according to the Australian Cyber Security Centre. Additionally,  PrivacyAustralia estimates that &lt;a href=&quot;https://privacyaustralia.net/vulnerabilities-for-smes/&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;cybercrime costs the Australian economy&lt;/a&gt; more than $1bn annually.&lt;/p&gt;&lt;p&gt;Given the media coverage that this type of crime receives, we’d forgive smaller businesses for thinking that large companies and institutions are the main targets for digital attacks. But, they’d be wron g. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;More than three-quarters of small businesses in Australia (78%) are targeted by cybercriminals, according to &lt;a href=&quot;https://www.smartcompany.com.au/finance/fraud/cyber-crime-stay-ahead/&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;SmartCompany&lt;/a&gt;, de monstrating that these types of businesses are especially vulnerable. &lt;/div&gt;&lt;p&gt;Why is this the case? No matter whether they have a large customer base or do not have high sales, many entrepreneurs stop investing in cybersecurity. &lt;/p&gt;&lt;p&gt;That is where the danger lies. &lt;/p&gt;&lt;p&gt;Below, we’ve detailed the losses of cybercrime in Australia. We’ve also included some valuable tips, such as the adoption of &lt;a href=&quot;/directory/31037/cybersecurity/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt;, to make digital security a priority for your company.&lt;/p&gt;&lt;h2&gt;What makes a small business vulnerable to cyberattacks?&lt;/h2&gt;&lt;p&gt;There are some factors that make SMEs an easy target for hackers. These include:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Absence of cybersecurity actions.&lt;/li&gt;&lt;li&gt;Lack of training and awareness of employees about digital dangers.&lt;/li&gt;&lt;li&gt;Possession of important data, such as customer credit card information.&lt;/li&gt;&lt;li&gt;No external platform for file backup and data protection.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;A cyber attack can be extremely damaging to an SME. System unavailability, loss of important data, damage to customers and problems with the brand’s reputation are the main consequences of this crime. Depending on the severity, bankruptcy can occur, after all, statistics indicate that &lt;a href=&quot;https://securityboulevard.com/2019/02/cyber-attack-costs-can-cripple-small-and-medium-sized-businesses/&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;cyberattacks cost SMEs an average of $2.2million&lt;/a&gt;. Half of the costs go towards clean-up and the other to business disruption.&lt;/p&gt;&lt;p&gt;According to &lt;a href=&quot;https://www.smartcompany.com.au/finance/fraud/cyber-crime-stay-ahead/&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;SmartCompany&lt;/a&gt;, businesses that are victims of a cyberattack can get in trouble with governmental agencies too:&lt;/p&gt;&lt;p&gt;‘ Both the GDPR and the Notifiable Data Breaches scheme require strict reporting should customer data become compromised⁠ — with the potential for stiff penalties and fines for non-compliance, up to $2.1 million for the NDB, and up to €20 million ($32 million) or 4% of the company’s global annual turnover for GDPR.’&lt;/p&gt;&lt;p&gt;Online threats are not only increasing every year, but hackers are also becoming more skilled. &lt;/p&gt;&lt;h2&gt;The five main types of cyber attacks&lt;/h2&gt;&lt;img title=&quot;types-of-cyber-attacks&quot; alt=&quot;Types of cyber attacks&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/nd-PF9JoN0nZhT50dS2GFTWhiivYrfMuGINV8Dr2KSI/98581dfcf48a0d9665a74c6c4cdaa01d/types-of-cyber-attacks.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Cybercrimes have very clear objectives: Illegal access to devices and the theft of confidential data. See some types of cybercrime below:&lt;/p&gt;&lt;h3&gt;Malware&lt;/h3&gt;&lt;p&gt;Malware is malicious software that, by downloading suspicious files, allows the criminal to have unauthorised access to third-party data. Viruses, spyware, Trojan horses and ransomware are some of the most well-known malware.&lt;/p&gt;&lt;h3&gt;Ransomware&lt;/h3&gt;&lt;p&gt;This is the type of digital crime in which the hacker hijacks the victim’s data and, from then on, charges a fee for retrieving the information, leading many companies to yield to extortion. &lt;/p&gt;&lt;h3&gt;Phishing &lt;/h3&gt;&lt;p&gt;You’ve probably already dealt with this mode of attack! Phishing is an attempt to obtain data, such as passwords and credit card numbers, from fraudulent emails that imitate trusted sources. It is also common to create fake pages that emulate bank sites to steal confidential information.  &lt;/p&gt;&lt;h3&gt;Social Engineering&lt;/h3&gt;&lt;p&gt;In this method, the criminal deceives employees of a company to gain access to important data. The threat comes from sources that seem reliable, like a message from a co-worker or authoritative figure. However, that account was probably hacked and the purpose of the accompanying link is to complete the scam.   &lt;/p&gt;&lt;h3&gt;DDoS&lt;/h3&gt;&lt;p&gt;The distributed denial of service (DDoS) attack aims to make a server, application or infrastructure unavailable. It is a very common form of attack on online services, such as e-commerce.&lt;/p&gt;&lt;h2&gt;What is cybersecurity?&lt;/h2&gt;&lt;p&gt;At this point, you may be wondering how you can protect your company against these digital threats. Therefore, the time has come to talk about what cybersecurity is and how this practice can help you against the insecurity of the digital environment. &lt;/p&gt;&lt;p&gt;Cybersecurity refers to preventive methods that protect a company’s system from unauthorised access. Based on the strategies, the risk of crucial information being accessed is mitigated, maintaining the integrity of the business. &lt;/p&gt;&lt;h2&gt;How to prevent cyber attacks&lt;/h2&gt;&lt;p&gt;In a scenario where companies can take months to identify cyberattacks, such as Travelex, it is essential to have digital protection actions. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;A strong response strategy includes these three important pillars: People, processes and technology. &lt;/div&gt;&lt;p&gt;That’s what we’ll break down below.&lt;/p&gt;&lt;h3&gt;1. People&lt;/h3&gt;&lt;p&gt;Staff training is an important part of prevention measures. Many crimes are committed from basic errors, such as opening an email with fake content or downloading suspicious files. &lt;/p&gt;&lt;p&gt;&lt;a href=&quot;/directory/10008/training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Invest in constant training&lt;/a&gt; that encourages employees to create strong passwords and also warn of the danger of suspicious content. Create a sense of responsibility for digital protection in them.&lt;/p&gt;&lt;h3&gt;2. Processes&lt;/h3&gt;&lt;p&gt;What’s the best way to proceed in the face of a cyber attack? Have an action map ready in which you also define assignments. Your company can respond quickly to threats. Cybercrimes are increasingly sophisticated, so your reaction method must also evolve at the same rate.&lt;/p&gt;&lt;h3&gt;3. Technology&lt;/h3&gt;&lt;p&gt;From antivirus to backup tools, use  &lt;a href=&quot;/directory/31037/cybersecurity/software?overall_rating_ge=4&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cybersecurity software&lt;/a&gt; as an important ally in your prevention strategy. Countless options on the market fit the needs and budget of small businesses.   &lt;/p&gt;&lt;p&gt;Another tip is to employ  &lt;a href=&quot;/directory/31358/email-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;email security software&lt;/a&gt;. This tool protects against viruses, SPAM, phishing, ransomware, among other threats. &lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Protection is essential for the sustainable growth of your business. How does your company shield itself from cyberattacks? Share your insights in the comments.&lt;/div&gt;","dateModified":"2022-11-15T20:05:45.000000Z","datePublished":"2020-03-02T08:33:54.000000Z","headline":"What Is Cybersecurity? And How To Make Sure Your Business Is Protected","inLanguage":"en-AU","mainEntityOfPage":"https://www.capterra.com.au/blog/1338/what-is-cybersecurity-how-to-make-sure-business-protected#webpage","publisher":{"@id":"https://www.capterra.com.au/#organization"}}]}
</script>
