---
description: Australian SMEs are not practicing recommended cyber safety measures during the lockdown due to poor password management methods. We reveal the key facts.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Poor password management culture puts Australian SMEs at risk
---

# Poor Password Management Culture Puts Australian SMEs At Risk

Canonical: https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes

Published on 30/04/2020 | Written by Anna Hammond.

![Poor Password Management Culture Puts Australian SMEs At Risk](https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png)

> The fight against COVID-19 has led many of us indoors.  As a result, companies across Australia are allowing employees to work from home to stay in line with isolation guidelines . More than half (57%) of Australian SMEs are now operating with a distributed workforce. Additionally, 41% are buying the necessary tools to operate  remotely . 

-----

## Article Content

The fight against COVID-19 has led many of us indoors.  As a result, companies across Australia are allowing employees to work from home to stay in line with isolation guidelines . More than half (57%) of Australian SMEs are now operating with a distributed workforce. Additionally, 41% are buying the necessary tools to operate  remotely . Yet, while small and mid-sized companies (SMEs) are taking the necessary steps to ensure business continuity, Capterra’s research\* indicates that cybersecurity processes have been less efficient.The study pointed to three areas that need improvement, including:Password storage: The majority of SME employees rely on human memory to store account logins and passwords, (only a third make use of password managers.)Password strength:  More than a quarter of respondents use an identical password for all accounts.Cybersecurity culture:SME employees often share passwords with colleagues, and  between personal and business accounts.Password management systems are inefficientAn encouraging number of employees (41%) changed their password within the last month. Despite this, SMEs are demonstrating lax password security practices. Infographic 1: Most popular password management methods in Australian SMEs.Writing down passwords on paper is inefficient and unsafe.  If misplaced, it can expose sensitive company information to untrustworthy third-parties. It is also an unsustainable password storage method.The most common form of password storage, however, is human memory. The survey indicated that 72% of respondents use software and platforms in the cloud (partially or completely). This suggests that the number of access credentials that an employee has is considerable.Expecting employees to remember strong, unique passwords for  all of these accounts is unrealistic .  However , only a third of employees make use of password management software. What is a password manager? A password manager is a software tool that enables users to synchronise passwords across several accounts. The tool saves and stores multiple passwords within a central vault, and users can activate them using a master password. How to improve password management A password management tool is a safe way for businesses to store credentials. It’s important to find a platform that employees can easily adapt to—otherwise, they may well abandon it. By taking advantage of free trials, you’ll be able to identify a tool that suits your business best. Many password managers offer a free version, and the monthly cost to upgrade can be as little as a few dollars per employee.Password sharing is common practice within SMEsWorryingly, 44% of respondents said they share passwords between personal and business accounts. This, combined with the fact that 68% of workers use personal devices (even occasionally) to carry out work, puts businesses at greater risk of exposure should one account be compromised. Of those respondents who use personal devices:40% installed antivirus software24% installed email security software27% installed a firewall.Devices without security software installed leaves the user vulnerable to cybercriminals. The same applies to a business account that shares identical credentials with an employee’s personal account. If that account is hacked, the business account is vulnerable too.Another area of concern was the lax approach within SMEs toward sharing passwords between peers (which 18% admitted to.) While this may seem risk-free, this action opens up the possibility of internal risks, such as the case of data theft by a disgruntled employee. How to share passwords securelyIn some cases, employees will need to share passwords. There are three methods to communicate passwords securely:Verbally, ideally in person.Use encrypted emails to write the information, often included with email security tools.Share them in a password vault, included in many password management systems. Password strength isn’t prioritisedIf a hacker gets hold of one set of credentials, they’ll likely try using these details to access other business and personal accounts. It’s therefore advised that businesses should create a strong and unique password for every account they own. Encouragingly, a third of respondents said they follow this advice. However, 28% of respondents use an identical password for all accounts and 39% use a few main passwords or one password that is slightly adapted, across multiple sites.How to strengthen passwordsA hard-to-crack password is a simple yet effective means to strengthen the security of any online account.  This includes:At least eight to sixteen charactersA combination of capital and lowercase lettersSpecial charactersNumbers.E ducating staff on what a strong password looks like is a great way to encourage remote workplace security. However,  most password managers include  a secure password generator feature , which helps take the pressure off of staff.Phishing email attacks remain a challengePhishing emails are one of the most common methods that cybercriminals use to obtain valuable data from a target. It consists of sending an email (that appears to be from another person or company) to the recipient, in a bid to get them to reveal private information. Usually, they’ll aim to obtain a password, bank details, or confidential details of the organisation.Infographic 2: Phishing attack cases in Australian SMEs.The majority of the respondents said they had not been victims of such an attack. However, more than a quarter of respondents have fallen victim to a phishing email. Of those cases, 14% said the attack took place since working remotely due to the pandemic. Shockingly, 48% said they were misled  by a topic related to COVID-19.As widely reported in the media, hackers are taking advantage of the pandemic by using it as an angle to infiltrate corporate networks. Using coronavirus-related false pretences, hackers are convincing people to open malicious emails. How to protect against phishing emailsTraining employees to recognise phishing emails should be an obligation for SMEs. It is one of the most common forms of cyberattack yet disguises itself in many ways. A security breach can cause irreversible damage to an SME; it can destroy its reputation and lead to bankruptcy.Employees are the best line of defence for SMEs. To ramp up security efforts, companies should ensure their staff:Make use of email security software.Conduct cybersecurity training to educate them on recognising malicious emails.Know who to contact in the case of an emergency. Our previous research highlighted that 62% of SME employees don’t know this, particularly junior staff.Australian SMEs must increase cybersafety measuresCybercriminals are always waiting for people (and companies) to make a mistake. Sadly, coronavirus has given them more opportunities rather than slowing them down. This is mostly due to teleworkers not taking adequate steps to secure their work environment. Even with a distributed workforce, employers must establish cybersecurity guidelines . It’s also good practice that companies have at least one cybersecurity point of contact. This person should be responsible for the implementation of protocols, secure business software. They should also be the champion of driving a cybersafety-first culture. Virtual cybersecurity training sessions work well for educating remote employees. Try creating a live webinar whereby employees can learn, take notes and ask questions. Ready to run your first cybersafety session? Check out Capterra’s directory of the highest-rated webinar software today.

## Disclaimer

> \*Survey methodologyTo collect the data from this report, we conducted an online survey between 4th April 2020 and 14th April 2020. The responses come from a sample of the Australian market. Of the  916 people who participated in the survey, we were able to discover that 57% of Australian SMEs are already operating fully remotely. We also discovered that 6% plan to. We then screened out all respondents not working remotely, and found 500 respondents fitted within our criteria:Australian residentEmployed by a small or mid-sized businessEmployed full-time or part-timeWorking remotely as a response to COVID-19.The participants come from various business sectors and levels of seniority.Note: Infographics 1 had multiple response options, so the total sum of the percentages exceeds 100%.

## About the author

### Anna Hammond

Anna was an analyst for Capterra.

## Related Categories

- [Compliance Software](https://www.capterra.com.au/directory/30110/compliance/software)
- [Cybersecurity Software](https://www.capterra.com.au/directory/31037/cybersecurity/software)
- [Endpoint Protection Software](https://www.capterra.com.au/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.com.au/directory/30003/network-security/software)
- [Vulnerability Management Software](https://www.capterra.com.au/directory/31062/vulnerability-management/software)

## Related Articles

- [Low-Code Vs No-Code: Building Applications Focused On Functionality](https://www.capterra.com.au/blog/1780/low-code-vs-no-code-building-applications)
- [How to Create an Electronic Signature Using Free Software](https://www.capterra.com.au/blog/1845/create-electronic-signature-free-software)
- [5 Top free travel agency software and their key features](https://www.capterra.com.au/blog/3531/top-free-travel-agency-software)
- [Digitisation Vs Digitalisation: What’s The Difference?](https://www.capterra.com.au/blog/1675/digitisation-vs-digitalisation-whats-the-difference)
- [Cybersecurity threats: Advanced email phishing attacks are biggest concern for Aussie businesses in 2024](https://www.capterra.com.au/blog/4488/cybersecurity-threats-report-australia)

## Links

- [View on Capterra](https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes)
- [Blog](https://www.capterra.com.au/blog)
- [Home](https://www.capterra.com.au/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Capterra Australia helps millions of people find the best business software with user reviews, ratings and price comparisons.","email":"info@capterra.com.au","url":"https://www.capterra.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.com.au/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCjRCDmEibpHwyX3m2b3y80w"]},{"name":"Capterra Australia","url":"https://www.capterra.com.au/","@id":"https://www.capterra.com.au/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Poor password management culture puts Australian SMEs at risk","description":"Australian SMEs are not practicing recommended cyber safety measures during the lockdown due to poor password management methods. We reveal the key facts.","url":"https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes","about":{"@id":"https://www.capterra.com.au/#organization"},"@id":"https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes#webpage","@type":"WebPage","isPartOf":{"@id":"https://www.capterra.com.au/#website"}},{"description":"The fight against COVID-19 has led many of us indoors.  As a result, companies across Australia are allowing employees to work from home to stay in line with isolation guidelines . More than half (57%) of Australian SMEs are now operating with a distributed workforce. Additionally, 41% are buying the necessary tools to operate  remotely . ","author":[{"name":"Anna Hammond","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png","@id":"https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes#primaryimage","@type":"ImageObject"},"@type":"BlogPosting","articleBody":"&lt;p&gt;The fight against COVID-19 has led many of us indoors.  As a result, companies across Australia are allowing employees to work from home to stay in line with isolation guidelines . &lt;a href=&quot;/blog/1453/australias-lockdown-fast-tracked-digital-transformation&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;More than half (57%) of Australian SMEs&lt;/a&gt; are now operating with a distributed workforce. Additionally, 41% are buying the necessary tools to operate  remotely . &lt;/p&gt;&lt;img title=&quot;poor-password-management-cybersecurity-issues&quot; alt=&quot;Poor password management within Australian SMEs&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/D2EjCQ7T_MCdZkS4UNfUZrQ5rNcNQk7eCr07J_VBJ8o/5787f9efa13cb01b343770f8802dc1d1/poor-password-management-cybersecurity-issues.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Yet, while small and mid-sized companies (SMEs) are taking the necessary steps to ensure business continuity, Capterra’s research* indicates that cybersecurity processes have been less efficient.&lt;/p&gt;&lt;p&gt;The study pointed to three areas that need improvement, including:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;b&gt;Password storage: &lt;/b&gt;The majority of SME employees rely on human memory to store account logins and passwords, (only a third make use of &lt;a href=&quot;/directory/30923/password-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;password managers&lt;/a&gt;.)&lt;/li&gt;&lt;li&gt;&lt;b&gt;Password strength:  More than a quarter of respondents use an identical password for all accounts.&lt;/b&gt;&lt;/li&gt;&lt;li&gt;&lt;b&gt;Cybersecurity culture:&lt;/b&gt;SME employees often share passwords with colleagues, and  between personal and business accounts.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Password management systems are inefficient&lt;/h2&gt;&lt;p&gt;An encouraging number of employees (41%) changed their password within the last month. Despite this, SMEs are demonstrating lax password security practices. &lt;/p&gt;&lt;figure class=&quot;aligncenter&quot;&gt;&lt;img title=&quot;most-popular-password-management-systems-smes-australia&quot; alt=&quot;Most popular password management methods Australia&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/gDz6SBMzps229vy7eigmhxosDn9kidmN8zRipIslEI4/efd21c27a25d667feca1003e25b444b8/most-popular-password-management-systems-smes-australia.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;figcaption&gt;Infographic 1: Most popular password management methods in Australian SMEs.&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;Writing down passwords on paper is inefficient and unsafe.  If misplaced, it can expose sensitive company information to untrustworthy third-parties. It is also an unsustainable password storage method.&lt;/p&gt;&lt;p&gt;The most common form of password storage, however, is human memory. The survey indicated that 72% of respondents use software and platforms in the cloud (partially or completely). This suggests that the number of access credentials that an employee has is considerable.&lt;/p&gt;&lt;p&gt;Expecting employees to remember strong, unique passwords for  all of these accounts is unrealistic .  However , only a third of employees make use of &lt;a href=&quot;/directory/30923/password-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;password management software&lt;/a&gt;. &lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;&lt;b&gt;&lt;i&gt;What is a password manager? &lt;/i&gt;&lt;/b&gt;&lt;i&gt;A password manager is a software tool that enables users to synchronise passwords across several accounts. The tool saves and stores multiple passwords within a central vault, and users can activate them using a master password. &lt;/i&gt;&lt;/div&gt;&lt;h3&gt;How to improve password management &lt;/h3&gt;&lt;p&gt;A password management tool is a safe way for businesses to store credentials. It’s important to find a platform that employees can easily adapt to—otherwise, they may well abandon it. By taking advantage of free trials, you’ll be able to identify a tool that suits your business best. &lt;/p&gt;&lt;p&gt;Many &lt;a href=&quot;/directory/30923/password-management/pricing/free/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;password managers offer a free version&lt;/a&gt;, and the monthly cost to upgrade can be as little as a few dollars per employee.&lt;/p&gt;&lt;h2&gt;Password sharing is common practice within SMEs&lt;/h2&gt;&lt;p&gt;Worryingly, 44% of respondents said they share passwords between personal and business accounts. This, combined with the fact that 68% of workers use personal devices (even occasionally) to carry out work, puts businesses at greater risk of exposure should one account be compromised. &lt;/p&gt;&lt;p&gt;Of those respondents who use personal devices:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;40% installed antivirus software&lt;/li&gt;&lt;li&gt;24% installed email security software&lt;/li&gt;&lt;li&gt;27% installed a firewall.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Devices without security software installed leaves the user vulnerable to cybercriminals. The same applies to a business account that shares identical credentials with an employee’s personal account. If that account is hacked, the business account is vulnerable too.&lt;/p&gt;&lt;p&gt;Another area of concern was the lax approach within SMEs toward sharing passwords between peers (which 18% admitted to.) While this may seem risk-free, this action opens up the possibility of internal risks, such as the case of data theft by a disgruntled employee. &lt;/p&gt;&lt;h3&gt;How to share passwords securely&lt;/h3&gt;&lt;p&gt;In some cases, employees will need to share passwords. There are three methods to communicate passwords securely:&lt;/p&gt;&lt;ol&gt;&lt;li&gt;Verbally, ideally in person.&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;https://digitalguardian.com/blog/what-email-encryption&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;Use encrypted emails&lt;/a&gt; to write the information, often included with &lt;a href=&quot;/directory/31358/email-security/software?features[]=Encryption&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;email security tools&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Share them in a password vault, included in many &lt;a href=&quot;/directory/30923/password-management/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;password management systems&lt;/a&gt;. &lt;/li&gt;&lt;/ol&gt;&lt;h2&gt;Password strength isn’t prioritised&lt;/h2&gt;&lt;p&gt;If a hacker gets hold of one set of credentials, they’ll likely try using these details to access other business and personal accounts. It’s therefore advised that businesses should create a strong and unique password for every account they own. &lt;/p&gt;&lt;p&gt;Encouragingly, a third of respondents said they follow this advice. However, 28% of respondents use an identical password for all accounts and 39% use a few main passwords or one password that is slightly adapted, across multiple sites.&lt;/p&gt;&lt;h3&gt;How to strengthen passwords&lt;/h3&gt;&lt;p&gt;A hard-to-crack password is a simple yet effective means to strengthen the security of any online account.  This includes:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;At least eight to sixteen characters&lt;/li&gt;&lt;li&gt;A combination of capital and lowercase letters&lt;/li&gt;&lt;li&gt;Special characters&lt;/li&gt;&lt;li&gt;Numbers.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;E ducating staff on what a strong password looks like is a great way to encourage remote workplace security. However,  most password managers include  a secure password generator feature , which helps take the pressure off of staff.&lt;/p&gt;&lt;h2&gt;Phishing email attacks remain a challenge&lt;/h2&gt;&lt;p&gt;Phishing emails are one of the most common methods that cybercriminals use to obtain valuable data from a target. It consists of sending an email (that appears to be from another person or company) to the recipient, in a bid to get them to reveal private information. Usually, they’ll aim to obtain a password, bank details, or confidential details of the organisation.&lt;/p&gt;&lt;figure class=&quot;aligncenter&quot;&gt;&lt;img title=&quot;phishing-attacks-Australian-SMEs-staff&quot; alt=&quot;Phishing attack cases in Australia&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/jFkJji5TslwJltnGk6cxc35Z286XMVsu92wQSkol84U/6761e9dc3f520d123ca4ad2b0a1b0f9b/phishing-attacks-Australian-SMEs-staff.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;figcaption&gt;Infographic 2: Phishing attack cases in Australian SMEs.&lt;/figcaption&gt;&lt;/figure&gt;&lt;p&gt;The majority of the respondents said they had not been victims of such an attack. However, more than a quarter of respondents &lt;i&gt;have &lt;/i&gt;fallen victim to a phishing email. Of those cases, 14% said the attack took place since working remotely due to the pandemic. Shockingly, 48% said they were misled  by a topic related to COVID-19.&lt;/p&gt;&lt;p&gt;As widely reported in the media, hackers are taking advantage of the pandemic by &lt;a href=&quot;https://economictimes.indiatimes.com/tech/internet/hackers-are-using-covid-19-disruption-to-infiltrate-corporate-networks/articleshow/74837213.cms?from=mdr&quot; rel=&quot;noopener noreferrer nofollow&quot; target=&quot;_blank&quot;&gt;using it as an angle to infiltrate corporate networks&lt;/a&gt;. Using coronavirus-related false pretences, hackers are convincing people to open malicious emails. &lt;/p&gt;&lt;h4&gt;How to protect against phishing emails&lt;/h4&gt;&lt;p&gt;Training employees to recognise phishing emails should be an obligation for SMEs. It is one of the most common forms of cyberattack yet disguises itself in many ways. A security breach can cause &lt;a href=&quot;/blog/1350/report-risks-poor-cybersecurity-knowledge-remote-working&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;irreversible damage to an SME&lt;/a&gt;; it can destroy its reputation and lead to bankruptcy.&lt;/p&gt;&lt;p&gt;Employees are the best line of defence for SMEs. To ramp up security efforts, companies should ensure their staff:&lt;/p&gt;&lt;ul&gt;&lt;li&gt;Make use of &lt;a href=&quot;/directory/31358/email-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;email security software&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Conduct cybersecurity training to educate them on recognising malicious emails.&lt;/li&gt;&lt;li&gt;Know who to contact in the case of an emergency. Our previous research highlighted that &lt;a href=&quot;/blog/1350/report-risks-poor-cybersecurity-knowledge-remote-working&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;62% of SME employees don’t know this&lt;/a&gt;, particularly junior staff.&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Australian SMEs must increase cybersafety measures&lt;/h2&gt;&lt;p&gt;Cybercriminals are always waiting for people (and companies) to make a mistake. Sadly, coronavirus has given them more opportunities rather than slowing them down. This is mostly due to teleworkers not taking adequate steps to secure their work environment. &lt;/p&gt;&lt;p&gt;Even with a distributed workforce, employers must establish cybersecurity guidelines . It’s also good practice that companies have at least one cybersecurity point of contact. This person should be responsible for the implementation of protocols, secure business software. They should also be the champion of driving a cybersafety-first culture. &lt;/p&gt;&lt;p&gt;Virtual cybersecurity training sessions work well for educating remote employees. Try &lt;a href=&quot;/blog/1447/guide-create-ultimate-live-webinar&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;creating a live webinar&lt;/a&gt; whereby employees can learn, take notes and ask questions. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;Ready to run your first cybersafety session? Check out Capterra’s directory of the &lt;a href=&quot;/directory/30937/webinar/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;highest-rated webinar software&lt;/a&gt; today.&lt;/div&gt;","dateModified":"2022-11-15T19:55:44.000000Z","datePublished":"2020-04-30T07:45:13.000000Z","headline":"Poor Password Management Culture Puts Australian SMEs At Risk","inLanguage":"en-AU","mainEntityOfPage":"https://www.capterra.com.au/blog/1545/poor-password-management-culture-australian-smes#webpage","publisher":{"@id":"https://www.capterra.com.au/#organization"}}]}
</script>
