Google AI
The Times Australia
Business and Money

Experts urge Australian businesses to prioritise cybersecurity

  • Written by: The Times

ACT NOW OR PAY MILLIONS LATER: PRIORITISE CYBERSECURITY TO  PREVENT CATASTROPHIC BUSINESS LOSSES 

Australia’s leading cybersecurity experts have sounded the alarm, urging all businesses to prioritise  cybersecurity planning in their FY26 budgets and invest in protecting their increasingly valuable data  from being accessed by cyber criminals.

The warning from professional services firm RSM Australia comes after a spate of suspected cyber  intrusions targeting several small to major Australian businesses, which led to significant financial losses  for themselves and their clients, and massive reputational damage. 

It also follows recent ransomware attacks on several Perth businesses across financial services,  insurance, government and tertiary education industries that severely impacted these organisations’  internal operations including their ability to service customers.

RSM Australia Partner Cyber Security & Privacy Risk Services, Riaan Bronkhorst, who advises  companies from his base in Perth, said a cyber-attack occurs every six minutes and can cost many  millions of dollars, and all businesses regardless of their size, are vulnerable.

“Failing to invest in robust protection now risks crippling your business with losses potentially reaching  hundreds of thousands of dollars, even into the millions,” he said.  

“Organisations are exacerbating the problem by dragging their feet on cybersecurity investments as our  recent research confirmed*, along with IBM’s Cost of a Data Breach Report 2024, which shows that the  average cost of a cyber-attack is $4.17 million.

“The delay is reckless and could lead to catastrophic consequences for their businesses, particularly as  we are living in a digital age, where cyber criminals are becoming more sophisticated and targeted in  their attacks.

“To avoid falling victim to cyber threats there are ways for companies to minimise their risk and protect  their sensitive data, and their reputation.”

Here are the top 10 cybersecurity tips from Mr Bronkhorst and the team at RSM Australia to help  businesses budget for increased protection and cybersecurity:

1. Encrypt sensitive information  

Your valuable personal belongings are protected within your homes under lock and key, so your  business and customer data also need protecting from unauthorised access. Defining the different  data types within an organisation is also crucial.  

2. Run a cyber threat analysis

Undertake a risk or maturity assessment, which involves thinking about all the things that could  go wrong and how likely they are to happen, to uncover potential gaps in compliance and  operational resilience, and to identify threats and vulnerabilities.

3. Secure supply chains

Know who you’re working with at all times by performing regular vendor and third-party risk  assessments/audits on key suppliers, especially those providing IT or cyber security services.

4. Protect your printers

This sounds simple but is often forgotten - enable security in the network they are connected to  and enforce password printing to protect important information from ending up in the wrong place.

5. Evaluate crisis arrangements and rehearse incident response plans

Review recovery plans both within your organisation and those provided by vendors to ensure a  "backup parachute" is always ready to be deployed in the event of an emergency. Put this to the  test with a simulated exercise to identify any system weaknesses.  

6. Unmask hidden vulnerabilities

Perform a comprehensive network (e.g., firewall) configuration review to identify and address  potential weaknesses in systems. If these security systems aren’t set up correctly it leaves weak  security spots, just like leaving doors unlocked, which makes it easier for criminals to steal your  information.

7. Review user access permissions

Take a close look at who has permission to access sensitive systems and data to ensure only  authorised users have access.

8. Know your obligations

Stay informed, review policies and regulations often and keep an eye on any new regulations that  may have come into effect.  

9. Assess monitoring tools

Identify if there is a need to upgrade or replace any custom use cases such as laptops, mobile  devices, cybersecurity detection services and security operation centres.  


10. Empower through education

Upskill users and business leaders with an understanding of Personally Identifiable Information  (sensitive data that can identify them such as addresses or birthdays), phishing (deceptive  emails), vishing (deceptive phone calls) and other social engineering techniques that manipulate  people for sensitive information or access online.

Business Times

What It Takes to Be a Board Member on a Major Public or Private C…

Board seats carry prestige, influence and, in some cases, substantial remuneration. But the reality is less glamorous tha...

Why a Commercial Slush Machine Can Create New Revenue Streams for…

Most business owners are always looking for that one addition that pays for itself quickly, keeps customers happy, and keep...

Thinking of Creating a Business Startup? How to Use AI to Get Ahe…

In 2026, launching a startup is no longer just about having a good idea. It is about execution speed, cost efficiency, an...

The Times Features

Cost of living increases worry Farrer residents

COST OF LIVING ‘CRUNCH’ HITS FARRER HARD, THE NATIONALS HEAR During a visit to Albury this week...

What's On: Two Psychics and a Medium – Australian …

HIT LIVE SHOW TWO PSYCHICS AND A MEDIUM EMBARK ON  AUSTRALIAN TOUR — AND NO TWO NIGHTS WILL BE T...

Before vaccines, diphtheria used to kill hundreds each …

The Northern Territory[1] and Western Australia[2] are experiencing outbreaks of an almost-era...

realestate.com.au attracts the buyer for 9 in 10 listed…

New PropTrack data reveals the impact realestate.com.au has on property sales, with the  platfor...

The Hidden Threat Inside Data Centers: Why Fuel Degrada…

Data centers are designed with one overriding objective: uninterrupted operation. To achieve this...

Holidays: How to Book a Flight — and Protect Your Money…

For decades, booking an overseas holiday was a straightforward transaction: choose your destinat...

Olivia Colman, Kate Box to join an exclusive Live Q…

Fresh out of cinemas, JIMPA - the new film by acclaimed director Sophie Hyde (Good Luck to you, ...

Homemade Food: Cheaper Than Takeaway, Healthier Than Yo…

As the cost of living continues to bite across Australia, households are taking a harder look at...

The Coalition wants NDIS reform to focus on 3 things. H…

The government is expected to announce further changes to the National Disability Insurance Sche...