Why Cyber Security Awareness Should Be Your Top Priority in 2024

March 14, 2025
Development

Cyber security awareness

<img decoding="async" class="wp-image-1857 size-full alignnone" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Cyber-security-awareness.png" alt="Cyber security awareness" width="940" height="600" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Cyber-security-awareness.png 940w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Cyber-security-awareness-300x191.png 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/Cyber-security-awareness-768x490.png 768w" sizes="(max-width: 940px) 100vw, 940px">

How cyber aware are your employees? 

Cybersecurity incidents like phishing, stolen credentials, and malware caused 44% of all data breaches reported under the Notifiable Data Breaches Scheme in the second half of 2023 (OAIC). For many incidents, the root cause is down to social engineering. That means that one or more of your employees has unknowingly taken a compromising action, guided by a threat actor.

Did you know: 30% of all data breaches were due to human error. Security controls like those outlined in the ACSC’s Essential Eight can help stop these types of errors.

Up-to-date, regular cybersecurity training and ongoing awareness campaigns help drive down the risk factor for employee compromise. Your top cybersecurity priority for 2024? It should be setting up your business and employees for success with cybersecurity awareness.

Let’s step through a common play by cyber attackers

An email lands in Mark’s inbox. Mark is in charge of procurement while Kirsty is on maternity leave. It’s three days until the end of the financial year and he’s received a lot of requests for last-minute purchases from all over the business. This email is from the head of marketing.

“Hey Mark,

I’m sure you’re under the pump at the minute but we have leftover budget for the year and want to grab this digital asset management system. I’ve attached the invoice to be paid, we’re keen to get it up and running ASAP.

Thanks a mil!

Lara”

Mark pays the invoice, notes it against marketing, and moves along to the next request. What he fails to notice is that the email has come from a slightly different address from Lara’s usual one. 

Instead, he’s just paid company funds into a fraudster’s account. Adding insult to injury, the attached document contained a malicious payload. That payload is now working its way through company systems, to encrypt company data at the flick of a switch and then demand a ransom to decrypt it.

The perp was able to find all the information they needed to carry out their attack in under five minutes – thanks to a quick browse on LinkedIn. They know EOFY is busy in procurement and take advantage of that pressure, and that Mark’s in a new role. In fact, they’ve sent out the exact same play across hundreds of similar Aussie businesses at the same time.

Security is everyone’s responsibility

Controls like file scanning, two-person approvals for large payments, and bouncing emails from domains similar to the internal company domain are ways to help stop these attacks from a technical perspective. Australia’s Protective Security Policy Framework can also help guide businesses. 

But technical and process-based controls alone aren’t enough to stop all cyber attacks.

Employees need to stay alert and aware – and not be fooled. The only way you can ensure employees are on the lookout is by empowering them with cybersecurity knowledge, via training and awareness programs.

How to increase cybersecurity awareness

Here are some ways to keep cybersecurity ticking in employees’ brains:

  • Include cybersecurity messaging on your intranet, in company newsletters, at all-hands meetings, and peppered into other internal communications.
  • Ensure comprehensive onboarding cybersecurity training, including when employees step into new temporary or permanent roles.
  • Curate specific training types for different roles and groups, based on their duties and access to information.
  • Run quarterly, up-to-date refresher training company-wide, accounting for different learning styles (e.g. workshops, written, video).
  • Find and empower security champions within your business.

Need a hand?

If you need a hand in creating or running the right training for employees, creating a bank of internal cyber messaging blasts, or automating your cyber awareness program, just give us a shout. We can help set your whole team up for success to deflect the bad guys from all angles.

Related Posts:

Smart house concept. Communication network of residence. Energy management system. IoT. AI.
<img width="300" height="179" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/WFH-security-300x179-Mar-13-2025-05-58-28-4906-AM.jpg" class="crp_thumb crp_featured" alt="Smart house concept. Communication network of residence. Energy management system. IoT. AI." title="Why is Cyber Security Awareness Important" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/WFH-security-300x179-Mar-13-2025-05-58-28-4906-AM.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/WFH-security-Mar-13-2025-05-58-10-3609-AM.jpg 750w" sizes="(max-width: 300px) 100vw, 300px">
rodion-kutsaiev-LI61nid_juE-unsplash
<img width="300" height="257" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-300x257-Mar-13-2025-05-48-28-9176-AM.jpg" class="crp_thumb crp_featured" alt="rodion-kutsaiev-LI61nid_juE-unsplash" title="Cyber Wise in October: Embracing Cyber Security Awareness Month" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-300x257-Mar-13-2025-05-48-28-9176-AM.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-1024x878-Mar-13-2025-05-48-31-2172-AM.jpg 1024w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-768x658-Mar-13-2025-05-48-08-4730-AM.jpg 768w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-1536x1317-Mar-13-2025-05-48-25-2248-AM.jpg 1536w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/rodion-kutsaiev-LI61nid_juE-unsplash-2048x1755-Mar-13-2025-05-48-39-9863-AM.jpg 2048w" sizes="(max-width: 300px) 100vw, 300px">
The Evolving Landscape of Cyber Threats
<img width="300" height="200" src="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/The-Evolving-Landscape-of-Cyber-Threats-300x200-2.jpg" class="crp_thumb crp_featured" alt="The Evolving Landscape of Cyber Threats" title="The Evolving Landscape of Cyber Threats: What You Need to Know for 2024" srcset="https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/The-Evolving-Landscape-of-Cyber-Threats-300x200-2.jpg 300w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/The-Evolving-Landscape-of-Cyber-Threats-1024x683-2.jpg 1024w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/The-Evolving-Landscape-of-Cyber-Threats-768x513-2.jpg 768w, https://21452509.fs1.hubspotusercontent-na1.net/hubfs/21452509/Imported_Blog_Media/The-Evolving-Landscape-of-Cyber-Threats-3.jpg 1500w" sizes="(max-width: 300px) 100vw, 300px">

Frequently Asked
Questions

Do you complete Security Audits?

YES - we can complete one-off audits to give you a second opinion on your environment. However, this is what we refer to as IT Cowboys, and we would prefer to build an ongoing relationship with you. That’s why, when you commit to one of our packages, we complete an onboarding audit, which includes a security audit, a gap analysis against our Tactical 12 fortress, along with internal and external penetration tests. We then put together a plan for remediation as quickly as possible to ensure your compliance and get your insurance sorted ASAP so you’re covered.

Do you come to site?

In the initial onboarding process, we attend your site to document and understand how you operate, completing a checklist, inspecting infrastructure suitability, meeting key stakeholders, and performing general IT housekeeping. Once the onboarding process is complete, your environment should be rock solid, and the need to attend the site moving forward should be very minimal, if at all.

Will my existing computers be supported?

YES - Providing they are a currently supported operating system by the vendor and under warranty by the manufacturer.

Do you support Apple Mac and can they be compliant?

YES - we worked hard to ensure that Apple products can be supported and secured under all our product offerings.

What happens if an issue arises outside my support contract?

inSUPPORT Helpdesk operates a 24/7 'follow-the-sun' support desk, serviced by a team of global geeks. You might get a Kiwi from New Zealand on one call, and a Pinoy/Pinay from the Philippines on the next.