{"id":295560,"date":"2025-07-15T13:50:35","date_gmt":"2025-07-15T01:50:35","guid":{"rendered":"https:\/\/www.reckon.com\/au\/?post_type=sbh&#038;p=295560"},"modified":"2026-05-05T17:42:18","modified_gmt":"2026-05-05T05:42:18","slug":"cyber-security","status":"publish","type":"sbh","link":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/","title":{"rendered":"What Is Cyber Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.23&#8243; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.23&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; module_class=&#8221;table-contents&#8221; _builder_version=&#8221;4.23&#8243; background_color=&#8221;#f3f2f6&#8243; custom_padding=&#8221;25px||25px||true|false&#8221; sticky_position=&#8221;top&#8221; sticky_limit_bottom=&#8221;section&#8221; sticky_position_tablet=&#8221;top&#8221; sticky_position_phone=&#8221;none&#8221; sticky_position_last_edited=&#8221;on|desktop&#8221; border_radii=&#8221;on|24px|24px|24px|24px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.23&#8243; text_font=&#8221;||||||||&#8221; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.27.6&#8243; header_2_font_size=&#8221;32px&#8221; hover_enabled=&#8221;0&#8243; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Cyber security is all about protecting computer systems, networks, mobile devices, programs, and data from malicious attacks, both external and internal. As a small business owner, it\u2019s not just about installing antivirus software or setting strong passwords. Rather, you need to commit to creating an end-to-end strategy that protects your sensitive data and eliminates a variety of security risks that have arisen due to our increasingly interconnected and digital world.<\/p>\n<h2>Why cyber security matters to small businesses<\/h2>\n<p><a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/\" data-wpil-monitor-id=\"98\">Cyber security<\/a> is no longer a concern for big corporations alone. Indeed, small businesses are <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/email-scam\/\">increasingly being targeted<\/a> because they don\u2019t have the defences of larger enterprises. According to <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/business-scam-stats\/\">Reckon&#8217;s business scam statistics<\/a> report, scams against small and micro businesses peaked at $17.3 million worth of losses in 2023. Investment scams were the most common, with an average loss of $74k per report. That\u2019s money most small business owners can\u2019t afford.<\/p>\n<p>Cyber attacks come in many shapes and sizes these days, too. Whether it&#8217;s stolen financial details, phishing attacks, ransomware, denial of service attacks, or more, the risks are real, and the fallout can be devastating. A single cyber security breach could compromise your customers\u2019 sensitive data or halt your operations for days or weeks at a time.<\/p>\n<h2>What is cyber security really about?<\/h2>\n<p>At its core, cyber security is about preventing any unauthorised access to your computer systems and data. That includes everything from endpoint security (like laptops and smartphones) to network security, cloud security, and mobile device management. With the right security tools and access controls in place, you can keep malicious software, social engineering scams, and cyber criminals at bay.<\/p>\n<p>Good cyber security also means being able to detect and respond to incidents as fast as possible, which is where threat detection and security orchestration come into play. Implementing systems and processes that allow you to spot vulnerabilities and respond to threats ASAP means you can always protect against unauthorised access.<\/p>\n<h2>Top cyber security threats to watch out for<\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/Top-Cyber-Security-threats.png&#8221; alt=&#8221;Top Cyber Security Threats&#8221; title_text=&#8221;Top Cyber Security Threats&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.6&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>As a small business, you\u2019ll need to be prepared to deal with a wealth of cyber threats:<\/p>\n<ul>\n<li><strong>Phishing attacks:<\/strong> Emails or messages that trick staff into giving away sensitive information (e.g. credit card details, passwords, customer data).<\/li>\n<li><strong>Malware:<\/strong> Malicious software that can steal your data and hamstring your systems (e.g. ransomware, spyware, trojans).<\/li>\n<li><strong>Insider threats:<\/strong> When authorised users misuse their logins to steal sensitive data or give access to outside parties.<\/li>\n<li><strong>Social engineering:<\/strong> Tactics used by cyber criminals to manipulate your employees into revealing sensitive data or deliberately compromising your systems.<\/li>\n<li><strong>Denial of service attacks:<\/strong> Overloading your website or systems with incoming traffic to shut down operations.<\/li>\n<\/ul>\n<p>The latest cyber security threats are becoming more and more sophisticated every day, with the rise of artificial intelligence, zero-day exploits, and malware-as-a-service models posing a serious threat to SMBs.<\/p>\n<h2>The 4 foundations of a strong security posture<\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/4-Strong-Cyber-Secuirty-Foundations.png&#8221; alt=&#8221;Cyber Security Foundations&#8221; title_text=&#8221;4 Strong Cyber Secuirty Foundations&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>1. People<\/h3>\n<p>Security awareness is one of the most overlooked defences, but it\u2019s still incredibly important. Your team should understand how to spot common cyber threats, use strong passwords, and follow company-wide protocols when dealing with sensitive information.<\/p>\n<p>Training (including at the onboarding stage) on phishing attacks, identifying legitimate software, handling financial details securely, and more can all help to keep human error to a minimum, as it\u2019s still one of the biggest risks in cyber security.<\/p>\n<h3>2. Processes<\/h3>\n<p>Your business should have procedures in place for how to respond to a cyber security incident, including things like:<\/p>\n<ul>\n<li>A security strategy for prevention and detection.<\/li>\n<li>A documented incident-response plan.<\/li>\n<li>Ongoing reviews (i.e. quarterly or annually) to pick up any new vulnerabilities and apply security patches.<\/li>\n<\/ul>\n<p>Frameworks like the ACSC\u2019s <a href=\"https:\/\/www.cyber.gov.au\/resources-business-and-government\/essential-cybersecurity\/essential-eight\" target=\"_blank\" rel=\"noopener\">Essential Eight<\/a> or the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\">NIST Cybersecurity Framework<\/a> can guide your small businesses in rolling out the best security measures and set yourself up with a baseline level of protection.<\/p>\n<h3>3. Technology<\/h3>\n<p>There\u2019s no shortage of security solutions that will be useful to your small business. At a minimum, your tech stack should include:<\/p>\n<ul>\n<li><strong>Antivirus<\/strong> software for detecting and blocking malicious software.<\/li>\n<li><strong>Firewalls<\/strong> to control incoming and outgoing traffic.<\/li>\n<li><strong>Access controls<\/strong> to make sure only authorised users are able to get into to your systems.<\/li>\n<li><strong>Endpoint security<\/strong> to protect user devices (i.e. staff laptops and smartphones).<\/li>\n<li><strong>Cloud security<\/strong> if you store data or run platforms in the cloud.<\/li>\n<li><strong>Encryption tools<\/strong> to protect your most sensitive information in storage and in transit.<\/li>\n<\/ul>\n<p>Bear in mind that having multiple layers of protection across your network means that if one defence fails, others will be in place to still stop the threat.<\/p>\n<h3>4. Monitoring<\/h3>\n<p>Cyber security should never be a set-and-forget solution. Ongoing monitoring is the only way to spot emerging threats and keep a strong defence over time. This includes having tools for intrusion-prevention systems, threat-detection platforms, real-time alerts, and automated responses.<\/p>\n<p>If your team doesn\u2019t have in-house cyber security professionals, you can hire security services to stay on top of threats and respond to incidents as they arise.<\/p>\n<h2>Best practices for protecting your small business<\/h2>\n<p>In order to best protect your business against security threats, you\u2019ll need to take a proactive and layered approach. Here\u2019s how:<\/p>\n<ul>\n<li>Use strong passwords and set up multi-factor authentication wherever possible.<\/li>\n<li>Update your software and operating systems to patch security vulnerabilities.<\/li>\n<li>Back up critical data to a secure offsite location or, more easily, in the cloud.<\/li>\n<li>Segment your network to limit the reach of a potential cyber attack.<\/li>\n<li><a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/hiring-staff-process\/recruiting-onboarding\/\">Train your staff<\/a> on how to recognise and respond to a variety of cyber threats.<\/li>\n<li>Carry out risk assessments to spot weaknesses in your current security controls.<\/li>\n<li>Limit user access to sensitive data and systems to only those who need it.<\/li>\n<\/ul>\n<h2>Cyber security and business continuity<\/h2>\n<p>A data breach will affect your technology while at the same time compromising your ability to serve customers and uphold your reputation. That\u2019s why business continuity planning should be a core component of any cyber security strategy.<br \/>Your plan should include data recovery procedures, emergency contacts and response protocols, as well as a comprehensive communication plan to alert stakeholders in the event of a breach.<\/p>\n<p>Cyber security might sound technical, but at the end of the day, it\u2019s about protecting what matters most: your data, your business, your staff, and your customers. Taking the right steps to strengthen your defences is time well spent, because in our ever-changing digital economy, staying secure is a must.<\/p>\n<p>[\/et_pb_text][ba_social_share icon_bg=&#8221;#03002e&#8221; icon_padding=&#8221;10px|12px|10px|12px|true|true&#8221; layout=&#8221;classic&#8221; show_text=&#8221;off&#8221; btn_padding=&#8221;0px|0px|0px|0px|false|false&#8221; btn_bg_color=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;25px||||false|false&#8221; custom_css_before=&#8221; content: %22SHARE THIS%22;|| font-size: 16px;|| font-weight: 700;|| line-height: 22px;|| letter-spacing: 0em;|| text-align: center;|| color: #ff5447;|| margin-bottom: 10px;|| display: inline-flex;|| position: absolute;|| margin-top: 10px;&#8221; border_width_top_main=&#8221;1px&#8221; border_color_top_main=&#8221;#e4e4e4&#8243; border_radii_icon=&#8221;on|5px|5px|5px|5px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_before_last_edited=&#8221;off|desktop&#8221;][ba_social_share_child _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;facebook&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;linkedin&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;email&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][\/ba_social_share][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p> Small businesses are increasingly under threat some scams, so what is cyber security? A way to keep your customers safe. <\/p>\n","protected":false},"author":35,"featured_media":295562,"menu_order":0,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"sbh_category":[307],"class_list":["post-295560","sbh","type-sbh","status-publish","format-standard","has-post-thumbnail","hentry","sbh_category-technology-and-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Is Cyber Security: Overview For Small Businesses | Reckon<\/title>\n<meta name=\"description\" content=\"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Cyber Security\" \/>\n<meta property=\"og:description\" content=\"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Reckon\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/reckonhq\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-05T05:42:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/\"},\"author\":{\"name\":\"Simon Jones\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b545528d0f97dde1cd2f9738897f1bcd\"},\"headline\":\"What Is Cyber Security\",\"datePublished\":\"2025-07-15T01:50:35+00:00\",\"dateModified\":\"2026-05-05T05:42:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/\"},\"wordCount\":1587,\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/What-is-Cyber-Security-Header.png\",\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/\",\"name\":\"What Is Cyber Security: Overview For Small Businesses | Reckon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/What-is-Cyber-Security-Header.png\",\"datePublished\":\"2025-07-15T01:50:35+00:00\",\"dateModified\":\"2026-05-05T05:42:18+00:00\",\"description\":\"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/What-is-Cyber-Security-Header.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/What-is-Cyber-Security-Header.png\",\"width\":1200,\"height\":409,\"caption\":\"What is cyber security header\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cyber-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Technology and Security\",\"item\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Cyber Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"name\":\"Reckon\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\",\"name\":\"Reckon\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"width\":300,\"height\":237,\"caption\":\"Reckon\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/reckonhq\\\/\",\"https:\\\/\\\/x.com\\\/ReckonHQ\",\"https:\\\/\\\/www.instagram.com\\\/reckonhq\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/reckon\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Reckonltd\\\/\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Reckon_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b545528d0f97dde1cd2f9738897f1bcd\",\"name\":\"Simon Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Simon-Jones-150x150-1.png\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Simon-Jones-150x150-1.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Simon-Jones-150x150-1.png\",\"caption\":\"Simon Jones\"},\"description\":\"Content Writer Simon has spent more than 15 years as a journalist and content marketer, covering a broad spectrum of topics for both print and digital mastheads. He specialises in finance and technology, with a particular interest in the intersection of AI and fintech.\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/author\\\/simon-jones\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Is Cyber Security: Overview For Small Businesses | Reckon","description":"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/","og_locale":"en_US","og_type":"article","og_title":"What Is Cyber Security","og_description":"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.","og_url":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/","og_site_name":"Reckon","article_publisher":"https:\/\/www.facebook.com\/reckonhq\/","article_modified_time":"2026-05-05T05:42:18+00:00","og_image":[{"width":1200,"height":409,"url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ReckonHQ","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#article","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/"},"author":{"name":"Simon Jones","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b545528d0f97dde1cd2f9738897f1bcd"},"headline":"What Is Cyber Security","datePublished":"2025-07-15T01:50:35+00:00","dateModified":"2026-05-05T05:42:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/"},"wordCount":1587,"publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"image":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png","inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/","url":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/","name":"What Is Cyber Security: Overview For Small Businesses | Reckon","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png","datePublished":"2025-07-15T01:50:35+00:00","dateModified":"2026-05-05T05:42:18+00:00","description":"What is cyber security and why does it matter for small businesses? Learn how to protect your data, avoid threats, and stay safe online.","breadcrumb":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#primaryimage","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/07\/What-is-Cyber-Security-Header.png","width":1200,"height":409,"caption":"What is cyber security header"},{"@type":"BreadcrumbList","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Technology and Security","item":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/"},{"@type":"ListItem","position":2,"name":"What Is Cyber Security"}]},{"@type":"WebSite","@id":"https:\/\/www.reckon.com\/au\/#website","url":"https:\/\/www.reckon.com\/au\/","name":"Reckon","description":"","publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.reckon.com\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.reckon.com\/au\/#organization","name":"Reckon","url":"https:\/\/www.reckon.com\/au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","width":300,"height":237,"caption":"Reckon"},"image":{"@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/reckonhq\/","https:\/\/x.com\/ReckonHQ","https:\/\/www.instagram.com\/reckonhq\/","https:\/\/www.linkedin.com\/company\/reckon\/","https:\/\/www.youtube.com\/user\/Reckonltd\/","https:\/\/en.wikipedia.org\/wiki\/Reckon_(company)"]},{"@type":"Person","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b545528d0f97dde1cd2f9738897f1bcd","name":"Simon Jones","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/07\/Simon-Jones-150x150-1.png","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/07\/Simon-Jones-150x150-1.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/07\/Simon-Jones-150x150-1.png","caption":"Simon Jones"},"description":"Content Writer Simon has spent more than 15 years as a journalist and content marketer, covering a broad spectrum of topics for both print and digital mastheads. He specialises in finance and technology, with a particular interest in the intersection of AI and fintech.","url":"https:\/\/www.reckon.com\/au\/author\/simon-jones\/"}]}},"_links":{"self":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh\/295560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh"}],"about":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/types\/sbh"}],"author":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/users\/35"}],"version-history":[{"count":2,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh\/295560\/revisions"}],"predecessor-version":[{"id":303716,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh\/295560\/revisions\/303716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media\/295562"}],"wp:attachment":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media?parent=295560"}],"wp:term":[{"taxonomy":"sbh_category","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh_category?post=295560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}