{"id":7968,"date":"2025-09-29T11:00:06","date_gmt":"2025-09-28T23:00:06","guid":{"rendered":"https:\/\/www.reckon.com\/reckon-blog\/?p=7968"},"modified":"2026-05-05T16:59:13","modified_gmt":"2026-05-05T04:59:13","slug":"keeping-secure-this-cybersecurity-month","status":"publish","type":"post","link":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/","title":{"rendered":"Keeping secure this Cybersecurity Month"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.23&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;||0px||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; module_class=&#8221;table-contents&#8221; _builder_version=&#8221;4.23&#8243; background_color=&#8221;#f3f2f6&#8243; custom_padding=&#8221;25px||25px||true|false&#8221; sticky_position=&#8221;top&#8221; sticky_limit_bottom=&#8221;section&#8221; sticky_position_tablet=&#8221;top&#8221; sticky_position_phone=&#8221;none&#8221; sticky_position_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|24px|24px|24px|24px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.23&#8243; text_font=&#8221;||||||||&#8221; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.27.6&#8243; header_2_font_size=&#8221;32px&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Cybercrime has become widespread throughout Australia, resulting in significant financial losses for small businesses. What makes small businesses vulnerable is their access to money and personal data: two things that scammers seek out the most. It\u2019s more important than ever to protect yourself and your business from cybercrime.<\/p>\n<p>We spoke with Ed Blackman, Reckon&#8217;s Chief Technical Officer (CTO), to get his perspective on Cybersecurity Month. One of Blackman\u2019s many duties is reviewing and implementing Reckon\u2019s cybersecurity policy, which keeps Reckon staff and customers safe from online attacks.<\/p>\n<p>So, what is cybersecurity? And what can small businesses do to stay safe?<\/p>\n<p><em>This interview has been edited for clarity<\/em><\/p>\n<h2>Defining Cybersecurity<\/h2>\n<p>Cybercrime has become endemic and commonplace in Australia, with damages from <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/business-scam-stats\/\">business scams<\/a> increasing each year, so it\u2019s essential to know how to defend yourself. To begin, you need to understand what <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/\">cybersecurity<\/a> is:<\/p>\n<p>\u201cCybersecurity is protecting yourself and or your business against threats in the cyber world that could harm or cause you or your financial loss,\u201d explains Blackman.<\/p>\n<h2>Investing in your security<\/h2>\n<p>Understanding how much to invest in your small business&#8217;s security is crucial, but it&#8217;s also essential to know what type of protection you need.<\/p>\n<p>\u201cIt really depends on the size of the business and its risk. So, there is certainly not a one-size-fits-all answer for all types of companies and businesses.<\/p>\n<p>Your <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/\" data-wpil-monitor-id=\"99\">cybersecurity policy and protections<\/a> need to be scalable to your means and realistic in response to your risk exposure. Businesses are often victims of data breaches and financial losses due to cybercriminals. They&#8217;re the two biggest things businesses need to consider to protect themselves against.\u201d<\/p>\n<h2>Methods of protection from cybercriminals<\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/09\/Cybersecurity-methods.png&#8221; alt=&#8221;Cybersecurity methods: 1. Set up multifactor authentication 2. Use passphrases instead of passwords 3. Use a password manager service.&#8221; title_text=&#8221;Cybersecurity Methods&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Cybercriminals employ various tactics and tools to gain unauthorised access to your information. To prevent breaches, Blackman recommends several methods:<\/p>\n<p>\u201cTo easily protect your business, use <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/what-is-mfa\/\">multi-factor authentication<\/a> (MFA) and passphrases, and implement a password manager.<\/p>\n<p>MFA make it extremely difficult to access your accounts, as it requires input from you to log in. Enable two-factor authentication across all business accounts, as even less valuable accounts can provide access to different levels of information related to you and your business.<\/p>\n<p>Passphrases can also be the difference between a cyber criminal needing a couple of days to crack a login or 36 years. Couple this with a password manager to track your passwords across all sites, and you have a system in place to protect you and your staff.\u201d<\/p>\n<h2>Train your staff against targeted and opportunistic cyberattacks<\/h2>\n<p>Whether a cyberattack is targeted or opportunistic, it is essential to educate your staff, says Blackman.<\/p>\n<p>\u201cWhat is critical is that you basically need to put the key mitigations in place to prevent all threats.<\/p>\n<p>The key difference between an opportunistic and a targeted attack is the level of the person they&#8217;re going after, or the type of person. A more targeted attack will be aimed at a senior employee or leader in a business. In contrast, opportunity attacks have no intended target but rely on the ignorance of an unsuspecting victim.<\/p>\n<p>What is essential is implementing regular training for yourself and your staff on how to recognise scam attacks. Ensure that your staff, especially those in key positions, are aware of basic fraudulent attacks, such as <a href=\"https:\/\/www.reckon.com\/au\/security\/email-scams\/\">phishing and spear phishing tactics<\/a>.\u201d<\/p>\n<h2>Cyber attack breaches and your business<\/h2>\n<p>When a cyberattack occurs, you must notify the proper authorities. Blackman explains that the best people to contact aren\u2019t the police, but the Australian Signals Directorate (ASD).<\/p>\n<p>\u201cWhen a breach occurs, the first thing to do is get help. The government has an excellent resource, ASD, available at <a href=\"http:\/\/cyber.gov.au\" target=\"_blank\" rel=\"noopener\">cyber.gov.au<\/a>. This is the first place you need to go to.<\/p>\n<p>There&#8217;s a whole section on what to do when you&#8217;ve been breached; work through the advice and the steps that they suggest. If you have any breaches, attempted breaches, or are unsure, this is the best place to go to.\u201d<\/p>\n<h2>Preventing cyber attacks<\/h2>\n<p>Cybersecurity can cause stress to small business owners, since it becomes yet another responsibility to manage when running their businesses.<\/p>\n<p>While it can be a burden, it\u2019s essential to be proactive and secure your business; the cost of not doing so can damage your livelihood or harm your customers. You can keep yourself cybersecure by:<\/p>\n<ul>\n<li>Setting up your <a href=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/Reckon-Cybersecurity-Checklist.pdf\">cybersecurity policy<\/a> through:\n<ul>\n<li>MFAs<\/li>\n<li>Passphrasses<\/li>\n<li>Password mangers<\/li>\n<\/ul>\n<\/li>\n<li>Training staff to identify common cybercriminal tactics<\/li>\n<li>Reporting breaches when they occur at <a href=\"http:\/\/cyber.gov.au\" target=\"_blank\" rel=\"noopener\">cyber.gov.au<\/a><\/li>\n<\/ul>\n<p>By using Reckon\u2019s CTO, Ed Blackman\u2019s advice and expertise as a starting point, you can maintain your business&#8217;s cybersecurity and keep it safe from scammers.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/Ed-Blackman-headshot-2.png&#8221; alt=&#8221;Ed Blackman, Reckon Chief Technology Officer&#8221; title_text=&#8221;Ed Blackman Headshot 2&#8243; align=&#8221;center&#8221; _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Ed Blackman, Reckon Chief Technology Officer<\/em><\/p>\n<p>[\/et_pb_text][ba_social_share icon_bg=&#8221;#03002e&#8221; icon_padding=&#8221;10px|12px|10px|12px|true|true&#8221; layout=&#8221;classic&#8221; show_text=&#8221;off&#8221; btn_padding=&#8221;0px|0px|0px|0px|false|false&#8221; btn_bg_color=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;25px||||false|false&#8221; custom_css_before=&#8221; content: %22SHARE THIS%22;|| font-size: 16px;|| font-weight: 700;|| line-height: 22px;|| letter-spacing: 0em;|| text-align: center;|| color: #ff5447;|| margin-bottom: 10px;|| display: inline-flex;|| position: absolute;|| margin-top: 10px;&#8221; border_width_top_main=&#8221;1px&#8221; border_color_top_main=&#8221;#e4e4e4&#8243; border_radii_icon=&#8221;on|5px|5px|5px|5px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_before_last_edited=&#8221;off|desktop&#8221;][ba_social_share_child _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;facebook&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;linkedin&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;email&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][\/ba_social_share][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.<\/p>\n","protected":false},"author":36,"featured_media":294919,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p><span style=\"font-weight: 400;\">When it comes to security, businesses can be at a loss when the crime occurs online. No robber hides around the corner; no corner store gets held up. In fact, cybercrime can happen in broad daylight with just a few lines of text in an email.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">We spoke with Ed Blackman, Reckon's CTO, to get him to weigh in on Cybersecurity Month. One of Blackman\u2019s many duties is reviewing and implementing Reckon\u2019s cybersecurity policy, which keeps Reckon staff and customers safe from online attacks.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">So, what is cybersecurity? And what can small businesses do to stay safe?<\/span><\/p><h2><b>Defining Cybersecurity<\/b><\/h2><p><span style=\"font-weight: 400;\">The industry behind cybersecurity is huge. More and more businesses and individuals are affected, amounting to <\/span><a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/asd-cyber-threat-report-july-2022-june-2023\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">eye-watering damages<\/span><\/a><span style=\"font-weight: 400;\"> that have crippled businesses big and small. The need to protect yourself on an ongoing basis is becoming more evident.<\/span><\/p><p><span style=\"font-weight: 400;\">According to the 2022-2023 Cyber Threat Report from the Minister of Defence, Richard Marles, and the Australian Signals Directorate, average losses by size of business due to cybercrime are up by 14% from 2021 to 2022.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Averaging $71,600 for large-sized businesses<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Averaging $97,200 for medium-sized businesses<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Averaging $46,000 for small-sized businesses<\/span><\/li><\/ul><p><img class=\"wp-image-7994 aligncenter\" src=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/ASD-Infograph-3-300x150.png\" alt=\"\" width=\"742\" height=\"371\" \/><\/p><p><span style=\"font-weight: 400;\">Now, more than ever, small businesses must consider their security. Blackman defines cybersecurity simply for small business owners.<\/span><\/p><blockquote><p><b><i>Well, it's basically just protecting yourself, personally, and your business against threats in the cyber world that could harm or cause you and your business loses. <\/i><\/b><\/p><\/blockquote><h2><b>Investing in your security<\/b><\/h2><p><span style=\"font-weight: 400;\">Understanding how much you need to invest in your small business's security is important. But it\u2019s not as simple as it seems.<\/span><\/p><blockquote><p><b><i>It really depends on the size of the business and its risk. So, there is certainly not a one-size-fits-all answer for all types of businesses.<\/i><\/b><\/p><\/blockquote><p><span style=\"font-weight: 400;\">Your <\/span><a href=\"https:\/\/www.reckon.com\/reckon-blog\/a-simple-small-business-cybersecurity-checklist\/\"><span style=\"font-weight: 400;\">cybersecurity policy<\/span><\/a><span style=\"font-weight: 400;\"> and protections need to be scalable to your means and realistic in response to your risk exposure.<\/span><\/p><p><span style=\"font-weight: 400;\">Your policy should address the common threats cybercriminals pose to you and your small business.<\/span><\/p><blockquote><p><b><i>The two most common threats are financial loss and data breach. They're probably the two biggest things businesses need to consider protecting themselves against.\u00a0<\/i><\/b><\/p><\/blockquote><h2><b>Cybercriminals, tools, and tactics<\/b><\/h2><p><span style=\"font-weight: 400;\">When cybercriminals try to access your data, your <\/span><a href=\"https:\/\/www.reckon.com\/reckon-blog\/a-simple-small-business-cybersecurity-checklist\/\"><span style=\"font-weight: 400;\">cybersecurity plan<\/span><\/a><span style=\"font-weight: 400;\"> should consider several things.<\/span><\/p><blockquote><p><b><i>Turn on multi-factor authentication for all your accounts that contain valuable data, even those that don't, because people can attack those to access more valuable accounts.\u00a0<\/i><\/b><\/p><\/blockquote><p><span style=\"font-weight: 400;\">Another policy to implement is passphrases instead of regular passwords.<\/span><\/p><blockquote><p><b><i>A passphrase helps you think of a couple of completely unrelated words to create a long password that is difficult for an attacker to crack.<\/i><\/b><\/p><p><b><i>When cybercriminals try to crack a password, using a particular passphrase can be the difference between needing a <\/i><\/b><b><i>couple of days to break the password or 36 years<\/i><\/b><b><i>.<\/i><\/b><\/p><\/blockquote><p>Passwords and passphrases are a fact of life now. You need to protect yourself and your business. Having trouble remembering the never-ending list of passwords? No worries, Blackman has a solution.<\/p><blockquote><p><b><i>The best place to start is with a password manager. This tool allows you to have unique passwords without constant individual maintenance. All it requires is for you to come up with your original password\/passphrase to get access, and you can let the service do the rest.<\/i><\/b><\/p><\/blockquote><p><img class=\"wp-image-7990 aligncenter\" src=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/Cyber-icon-2-300x182.png\" alt=\"\" width=\"687\" height=\"417\" \/><\/p><h3><b>Are cybercriminals looking for more than just data?<\/b><\/h3><p><span style=\"font-weight: 400;\">Cybercriminals are after more than raw data. As we\u2019ve seen recently, attacks involve cybercriminals gaining access to personal information and important accounts related to either bank accounts or business systems.<\/span><\/p><blockquote><p><b><i>They're trying to get PII (personally identifiable information) about you or your customers so that they can proceed with further attacks.\u00a0<\/i><\/b><\/p><p><b><i>They will also want to access your account and look at things like invoices. Cybercriminals will draft new copies using your invoices and the design and resend them with your spoofed email address. This is an everyday fraudulent financial activity that businesses experience.<\/i><\/b><\/p><\/blockquote><p><img class=\"wp-image-7986 aligncenter\" src=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/Cyber-Icon-300x182.png\" alt=\"\" width=\"742\" height=\"450\" \/><\/p><h2><b>Opportunity vs. targeted cyber attacks<\/b><\/h2><p><span style=\"font-weight: 400;\">Cybercrime, while occurring virtually, resembles how theft is carried out physically. There are opportunistic attacks, where an attacker has, by chance, noticed a vulnerability and will exploit it, versus targeted attacks, which are pre-meditated. Think of a targeted attack like a thief casing a bank to plan their next heist.<\/span><\/p><p><span style=\"font-weight: 400;\">Knowing the difference is key to a sound cybersecurity strategy, and a policy that mitigates these types of attacks is vital.\u00a0<\/span><\/p><blockquote><p><b><i>The critical difference is that you basically need to put the key mitigations in place to prevent all threats.<\/i><\/b><\/p><p><b><i>The key difference between an opportunistic and a targeted attack is the level of the person they're going after or the type of person. A more targeted attack will be aimed at a senior leader in a business.\u00a0<\/i><\/b><\/p><\/blockquote><p><span style=\"font-weight: 400;\">Ultimately, it comes down to people. Cybercriminals exploit knowledge gaps to gain access to sensitive information. By educating yourself and your staff, you can learn to spot phishing attempts or scams and mitigate or prevent critical losses.<\/span><\/p><blockquote><p><b><i>Another key defence you must implement is regular training for yourself and your staff on recognising attacks. Ensure your staff, especially those in key positions, know basic fraudulent attacks, such as <\/i><\/b><a href=\"https:\/\/www.reckon.com\/au\/security\/email-scams\/\"><b><i>phishing and spear phishing tactics<\/i><\/b><\/a><b><i>.<\/i><\/b><\/p><\/blockquote><h2><b>Cyber-breach aftermath\u00a0<\/b><\/h2><p><span style=\"font-weight: 400;\">Small businesses can be confused about where to turn after a breach or an attempted breach. When a breach occurs, you can\u2019t just call 000. That\u2019s where the Australian Signals Directorate (ASD) comes in.<\/span><\/p><blockquote><p><b><i>If you don't think you\u2019re sufficiently skilled, the first thing to do is get help. The government has an excellent resource called <\/i><\/b><a href=\"http:\/\/cyber.gov.au\"><b><i>cyber.gov.au<\/i><\/b><\/a><b><i>. That is my advice; the first place you should go is there.\u00a0<\/i><\/b><\/p><p><b><i>There's a whole section on what to do when you've been breached; work through the advice and the steps that they suggest. If you have any breaches, attempted breaches, or are unsure, go there.<\/i><\/b><\/p><\/blockquote><p><span style=\"font-weight: 400;\">Whether you are creating a new policy or reviewing your current one, it is important to remember that your security is ongoing. Make sure to go through <\/span><a href=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/10\/Reckon-Cybersecurity-Checklist.pdf\"><span style=\"font-weight: 400;\">our cybersecurity checklist<\/span><\/a><span style=\"font-weight: 400;\"> to inspire your own policy. Stay vigilant, and make the most of Cybersecurity Month.<\/span><\/p><p>\u00a0<\/p>[caption id=\"attachment_5870\" align=\"aligncenter\" width=\"300\"]<img class=\"size-medium wp-image-5870\" src=\"https:\/\/www.reckon.com\/reckon-blog\/wp-content\/uploads\/2022\/08\/Ed-Blackman-300x300.png\" alt=\"\" width=\"300\" height=\"300\" \/> Ed Blackman<br \/>Reckon Chief Technology Officer[\/caption]","_et_gb_content_width":"","inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[343],"tags":[],"class_list":["post-7968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Keeping secure this Cybersecurity Month<\/title>\n<meta name=\"description\" content=\"It&#039;s Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping secure this Cybersecurity Month | Reckon\" \/>\n<meta property=\"og:description\" content=\"It&#039;s Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/\" \/>\n<meta property=\"og:site_name\" content=\"Reckon\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/reckonhq\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-28T23:00:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T04:59:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oliver Gye\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:site\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oliver Gye\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/\"},\"author\":{\"name\":\"Oliver Gye\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\"},\"headline\":\"Keeping secure this Cybersecurity Month\",\"datePublished\":\"2025-09-28T23:00:06+00:00\",\"dateModified\":\"2026-05-05T04:59:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/\"},\"wordCount\":1307,\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Cybersecurity-month-no-text.png\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/\",\"name\":\"Keeping secure this Cybersecurity Month\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Cybersecurity-month-no-text.png\",\"datePublished\":\"2025-09-28T23:00:06+00:00\",\"dateModified\":\"2026-05-05T04:59:13+00:00\",\"description\":\"It's Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.\",\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/blog\\\/keeping-secure-this-cybersecurity-month\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Cybersecurity-month-no-text.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Cybersecurity-month-no-text.png\",\"width\":950,\"height\":500,\"caption\":\"Cybersecurity month header\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"name\":\"Reckon\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\",\"name\":\"Reckon\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"width\":300,\"height\":237,\"caption\":\"Reckon\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/reckonhq\\\/\",\"https:\\\/\\\/x.com\\\/ReckonHQ\",\"https:\\\/\\\/www.instagram.com\\\/reckonhq\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/reckon\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Reckonltd\\\/\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Reckon_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\",\"name\":\"Oliver Gye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"caption\":\"Oliver Gye\"},\"description\":\"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/author\\\/oliver-gye\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Keeping secure this Cybersecurity Month","description":"It's Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/","og_locale":"en_US","og_type":"article","og_title":"Keeping secure this Cybersecurity Month | Reckon","og_description":"It's Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.","og_url":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/","og_site_name":"Reckon","article_publisher":"https:\/\/www.facebook.com\/reckonhq\/","article_published_time":"2025-09-28T23:00:06+00:00","article_modified_time":"2026-05-05T04:59:13+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png","type":"image\/png"}],"author":"Oliver Gye","twitter_card":"summary_large_image","twitter_creator":"@ReckonHQ","twitter_site":"@ReckonHQ","twitter_misc":{"Written by":"Oliver Gye","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/#article","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/"},"author":{"name":"Oliver Gye","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579"},"headline":"Keeping secure this Cybersecurity Month","datePublished":"2025-09-28T23:00:06+00:00","dateModified":"2026-05-05T04:59:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/"},"wordCount":1307,"publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"image":{"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png","articleSection":["Insights"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/","url":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/","name":"Keeping secure this Cybersecurity Month","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/#primaryimage"},"image":{"@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png","datePublished":"2025-09-28T23:00:06+00:00","dateModified":"2026-05-05T04:59:13+00:00","description":"It's Cybersecurity Month, a time to focus on keeping your business safe online. Discover how you can keep secure with expert advice.","inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/#primaryimage","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/06\/Cybersecurity-month-no-text.png","width":950,"height":500,"caption":"Cybersecurity month header"},{"@type":"WebSite","@id":"https:\/\/www.reckon.com\/au\/#website","url":"https:\/\/www.reckon.com\/au\/","name":"Reckon","description":"","publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.reckon.com\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.reckon.com\/au\/#organization","name":"Reckon","url":"https:\/\/www.reckon.com\/au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","width":300,"height":237,"caption":"Reckon"},"image":{"@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/reckonhq\/","https:\/\/x.com\/ReckonHQ","https:\/\/www.instagram.com\/reckonhq\/","https:\/\/www.linkedin.com\/company\/reckon\/","https:\/\/www.youtube.com\/user\/Reckonltd\/","https:\/\/en.wikipedia.org\/wiki\/Reckon_(company)"]},{"@type":"Person","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579","name":"Oliver Gye","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","caption":"Oliver Gye"},"description":"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.","url":"https:\/\/www.reckon.com\/au\/author\/oliver-gye\/"}]}},"modified_by":"Oliver Gye","_links":{"self":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts\/7968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/comments?post=7968"}],"version-history":[{"count":1,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts\/7968\/revisions"}],"predecessor-version":[{"id":303591,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/posts\/7968\/revisions\/303591"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media\/294919"}],"wp:attachment":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media?parent=7968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/categories?post=7968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/tags?post=7968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}