{"id":297977,"date":"2025-10-14T12:55:30","date_gmt":"2025-10-14T00:55:30","guid":{"rendered":"https:\/\/www.reckon.com\/au\/?post_type=sbh&#038;p=297977"},"modified":"2025-10-14T12:55:41","modified_gmt":"2025-10-14T00:55:41","slug":"cybersecurity-checklist","status":"publish","type":"sbh","link":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/","title":{"rendered":"Cyber Security Checklist: How You Can Protect Your Business"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.23&#8243; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;0px||||false|false&#8221; da_disable_devices=&#8221;off|off|off&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,2_3&#8243; _builder_version=&#8221;4.23&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; custom_padding=&#8221;||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; module_class=&#8221;table-contents&#8221; _builder_version=&#8221;4.23&#8243; background_color=&#8221;#f3f2f6&#8243; custom_padding=&#8221;25px||25px||true|false&#8221; sticky_position=&#8221;top&#8221; sticky_limit_bottom=&#8221;section&#8221; sticky_position_tablet=&#8221;top&#8221; sticky_position_phone=&#8221;none&#8221; sticky_position_last_edited=&#8221;on|desktop&#8221; pac_dcm_carousel_specific_module_num=&#8221;0&#8243; border_radii=&#8221;on|24px|24px|24px|24px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.23&#8243; text_font=&#8221;||||||||&#8221; global_colors_info=&#8221;{}&#8221; background__hover_enabled=&#8221;on|desktop&#8221;][\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; pac_dcm_carousel_specific_module_num=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Intro&#8221; _builder_version=&#8221;4.27.4&#8243; header_2_font_size=&#8221;32px&#8221; header_2_font_size_tablet=&#8221;30px&#8221; header_2_font_size_phone=&#8221;26px&#8221; header_2_font_size_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;]Protecting your business from cyberthreats is more crucial than ever, as cyberattacks are becoming more frequent and causing a staggering amount of <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/business-scam-stats\/\">financial loss for Australian businesses<\/a>. With our ultimate cybersecurity checklist, you can implement a strong policy that protects you, your staff, and your business from cybercriminals.<br \/>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-graphic.png&#8221; alt=&#8221;cybersecurity checklist, passphrases, MFAs, training, upgrade security, anti-virus software and cloud backups&#8221; title_text=&#8221;Cybersecurity Checklist Graphic&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>1. Passphrases not passwords<\/h2>\n<p>As cybercriminals become more proficient at hacking and accessing your passwords through data leaks, the old way of creating \u2018passwords\u2019 is no longer effective. It\u2019s now commonplace for your data to be compromised by a company that has a loose cybersecurity policy, so make sure you use passphrases and password managers to <a href=\"https:\/\/www.reckon.com\/au\/blog\/keeping-secure-this-cybersecurity-month\/\">safeguard your accounts<\/a>.<\/p>\n<p>When using passphrases, incorporate symbols, numbers, and letters that are unique and memorable, making it harder for cybercriminals to hack. For example, \u201857 stray ducklings eating snails!\u2019 is a random phrase, but almost impossible to crack for anyone. A good passphrase could be the difference between a couple of days and 36 years to crack your logins.<\/p>\n<p>You can also remove the hassle of remembering your passphrases with a password manager. These are easy-to-use services that generate and store logins across your accounts and prompt changes for you.<\/p>\n<h2>2. Use Multi-factor Authentication<\/h2>\n<p>More and more software applications and cloud storage services require that you use <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/what-is-mfa\/\">multi-factor authentication<\/a> (MFA) to get access to your accounts on top of logins. If you use any Google or Microsoft application, you are familiar with MFAs.<\/p>\n<p>If you aren\u2019t sure what an MFA is, basically, it&#8217;s a secondary security measure that needs to be \u2018passed\u2019 in addition to your passwords or phrases. An MFA attempts to authenticate that it is really you logging in by confirming via SMS, face recognition, or PIN code.<\/p>\n<h2>3. Cybercrime training and awareness<\/h2>\n<p>As phishing scams become more common and better developed by cybercriminals, <a href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/email-scam\/\">spotting an email scam<\/a> becomes increasingly tricky. This is why having training sessions for you and your staff to spot the hallmarks of a phishing scam (and more) will protect you from data and financial loss.<\/p>\n<p>Training will help you identify what kind of scams are used by cybercriminals, like:<\/p>\n<ul>\n<li><strong>Email phishing:<\/strong> a common scam method that involves you clicking on a malicious link, downloading a malware attachment, or accidentally revealing personal information.<\/li>\n<li><strong>Spearphishing:<\/strong> highly personalised and targeted phishing scams that can look legitimate, especially if they imitate someone you know, like a friend, relative, or colleague.<\/li>\n<li><strong>Smishing:<\/strong> SMS phishing, usually involving a link, attachment, or request for data.<\/li>\n<li><strong>Vishing:<\/strong> phone call scamming.<\/li>\n<\/ul>\n<h2>4. Bolster your physical security<\/h2>\n<p>Ensuring your data, devices, and systems are physically safe is as vital as protecting your online accounts. Here are some safety tips to consider for your business:<\/p>\n<ul>\n<li>Lock away sensitive devices like laptops and hard drives, and never leave them in vehicles or insecure locations.<\/li>\n<li>Whether you work from home, office, or another environment, pay attention to access points, locks, and alarms.<\/li>\n<li>Never leave devices unlocked, unprotected by passwords, or with screens active.<\/li>\n<li>Never insert an unknown USB drive or hard drive into your devices.<\/li>\n<li>Know (and restrict) who has access to any sensitive physical location or device.<\/li>\n<li>Enable \u2018find my device\u2019 and other location-sourcing functions on devices.<\/li>\n<\/ul>\n<h2>5. Update software often and install antivirus software<\/h2>\n<p>By updating your software frequently, you limit your exposure to cyberthreats. Software providers like Apple, Google, and Microsoft usually include better cybersecurity measures in their updates. For instance, when new malware threats arise, a company like Apple would release hot fixes or emergency security updates to address them.<\/p>\n<p>To increase the security of your devices, you can also download and subscribe to antivirus or anti-malware software. These services run in the background, scanning for and monitoring cyberthreats for you. They notify you if any malicious programs are detected, and prevent and remove them from your devices.<\/p>\n<h2>6. Enable and automate cloud backups<\/h2>\n<p>Backing up your data to cloud servers and other storage media, like hard drives, helps minimise the damage if you do get hacked. For example, if your device gets corrupted by malware, you can simply reset it to the factory default, then restore your system by downloading the uncorrupted backup. So have a backup of all your data in a separate place, such as cloud storage (think OneDrive), to help safeguard your business.<\/p>\n<h2>Protecting your small business from cyberattacks<\/h2>\n<p>By implementing these small but practical tips, you can better protect yourself and your business from harm. While cyberattacks can feel like the end of the world if they occur, they are common, and you can recover from them.<\/p>\n<p>If you are a <a href=\"https:\/\/www.reckon.com\/au\/blog\/scam-response-checklist\/\">victim of cybercrime<\/a>, there are plenty of resources and organisations like <a href=\"https:\/\/www.idcare.org\/get_help\/small-business\" target=\"_blank\" rel=\"noopener\">IDCARE<\/a> and <a href=\"https:\/\/www.scamwatch.gov.au\/\" target=\"_blank\" rel=\"noopener\">Scamwatch<\/a> that can help you get back on track.<\/p>\n<p>&nbsp;<br \/>\n[\/et_pb_text][ba_social_share icon_bg=&#8221;#03002e&#8221; icon_padding=&#8221;10px|12px|10px|12px|true|true&#8221; layout=&#8221;classic&#8221; show_text=&#8221;off&#8221; btn_padding=&#8221;0px|0px|0px|0px|false|false&#8221; btn_bg_color=&#8221;RGBA(255,255,255,0)&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;50px||||false|false&#8221; custom_padding=&#8221;25px||||false|false&#8221; custom_css_before=&#8221; content: %22SHARE THIS%22;|| font-size: 16px;|| font-weight: 700;|| line-height: 22px;|| letter-spacing: 0em;|| text-align: center;|| color: #ff5447;|| margin-bottom: 10px;|| display: inline-flex;|| position: absolute;|| margin-top: 10px;&#8221; border_width_top_main=&#8221;1px&#8221; border_color_top_main=&#8221;#e4e4e4&#8243; border_radii_icon=&#8221;on|5px|5px|5px|5px&#8221; global_colors_info=&#8221;{}&#8221; custom_css_before_last_edited=&#8221;off|desktop&#8221;][ba_social_share_child _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;facebook&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;linkedin&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][ba_social_share_child network_type=&#8221;email&#8221; _builder_version=&#8221;4.23&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/ba_social_share_child][\/ba_social_share][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.<\/p>\n","protected":false},"author":36,"featured_media":297981,"menu_order":0,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"sbh_category":[307],"class_list":["post-297977","sbh","type-sbh","status-publish","format-standard","has-post-thumbnail","hentry","sbh_category-technology-and-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Checklist: How You Can Protect Your Business | Reckon<\/title>\n<meta name=\"description\" content=\"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Checklist: How You Can Protect Your Business\" \/>\n<meta property=\"og:description\" content=\"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"Reckon\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/reckonhq\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T00:55:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"409\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ReckonHQ\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/\"},\"author\":{\"name\":\"Oliver Gye\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\"},\"headline\":\"Cyber Security Checklist: How You Can Protect Your Business\",\"datePublished\":\"2025-10-14T00:55:30+00:00\",\"dateModified\":\"2025-10-14T00:55:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/\"},\"wordCount\":1262,\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Cybersecurity-checklist-header.png\",\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/\",\"name\":\"Cyber Security Checklist: How You Can Protect Your Business | Reckon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Cybersecurity-checklist-header.png\",\"datePublished\":\"2025-10-14T00:55:30+00:00\",\"dateModified\":\"2025-10-14T00:55:41+00:00\",\"description\":\"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Cybersecurity-checklist-header.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Cybersecurity-checklist-header.png\",\"width\":1200,\"height\":409,\"caption\":\"cybersecurity checklist header\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/cybersecurity-checklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Technology and Security\",\"item\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/small-business-resources\\\/technology-and-security\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Checklist: How You Can Protect Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#website\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"name\":\"Reckon\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#organization\",\"name\":\"Reckon\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/reckon-logo-yoast.png\",\"width\":300,\"height\":237,\"caption\":\"Reckon\"},\"image\":{\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/reckonhq\\\/\",\"https:\\\/\\\/x.com\\\/ReckonHQ\",\"https:\\\/\\\/www.instagram.com\\\/reckonhq\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/reckon\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Reckonltd\\\/\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Reckon_(company)\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/#\\\/schema\\\/person\\\/b5625a73d7f24764f35bc6a9ec05d579\",\"name\":\"Oliver Gye\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"contentUrl\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/Aliver-Gye-150x150-1.png\",\"caption\":\"Oliver Gye\"},\"description\":\"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.\",\"url\":\"https:\\\/\\\/www.reckon.com\\\/au\\\/author\\\/oliver-gye\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Checklist: How You Can Protect Your Business | Reckon","description":"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Checklist: How You Can Protect Your Business","og_description":"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.","og_url":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/","og_site_name":"Reckon","article_publisher":"https:\/\/www.facebook.com\/reckonhq\/","article_modified_time":"2025-10-14T00:55:41+00:00","og_image":[{"width":1200,"height":409,"url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@ReckonHQ","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#article","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/"},"author":{"name":"Oliver Gye","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579"},"headline":"Cyber Security Checklist: How You Can Protect Your Business","datePublished":"2025-10-14T00:55:30+00:00","dateModified":"2025-10-14T00:55:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/"},"wordCount":1262,"publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"image":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png","inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/","url":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/","name":"Cyber Security Checklist: How You Can Protect Your Business | Reckon","isPartOf":{"@id":"https:\/\/www.reckon.com\/au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#primaryimage"},"image":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png","datePublished":"2025-10-14T00:55:30+00:00","dateModified":"2025-10-14T00:55:41+00:00","description":"Discover our cybersecurity checklist that has everything you need to jumpstart your cybersecurity and protect your business from scams.","breadcrumb":{"@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#primaryimage","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2025\/10\/Cybersecurity-checklist-header.png","width":1200,"height":409,"caption":"cybersecurity checklist header"},{"@type":"BreadcrumbList","@id":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/cybersecurity-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Technology and Security","item":"https:\/\/www.reckon.com\/au\/small-business-resources\/technology-and-security\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Checklist: How You Can Protect Your Business"}]},{"@type":"WebSite","@id":"https:\/\/www.reckon.com\/au\/#website","url":"https:\/\/www.reckon.com\/au\/","name":"Reckon","description":"","publisher":{"@id":"https:\/\/www.reckon.com\/au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.reckon.com\/au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.reckon.com\/au\/#organization","name":"Reckon","url":"https:\/\/www.reckon.com\/au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/05\/reckon-logo-yoast.png","width":300,"height":237,"caption":"Reckon"},"image":{"@id":"https:\/\/www.reckon.com\/au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/reckonhq\/","https:\/\/x.com\/ReckonHQ","https:\/\/www.instagram.com\/reckonhq\/","https:\/\/www.linkedin.com\/company\/reckon\/","https:\/\/www.youtube.com\/user\/Reckonltd\/","https:\/\/en.wikipedia.org\/wiki\/Reckon_(company)"]},{"@type":"Person","@id":"https:\/\/www.reckon.com\/au\/#\/schema\/person\/b5625a73d7f24764f35bc6a9ec05d579","name":"Oliver Gye","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","url":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","contentUrl":"https:\/\/www.reckon.com\/au\/wp-content\/uploads\/2024\/09\/Aliver-Gye-150x150-1.png","caption":"Oliver Gye"},"description":"Content Writer Oliver Gye is a content writer and publisher who is passionate about creating engaging content for the small business community. He specialises in UX, business support &amp; compliance, and small business journalism in fintech and accounting.","url":"https:\/\/www.reckon.com\/au\/author\/oliver-gye\/"}]}},"_links":{"self":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh\/297977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh"}],"about":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/types\/sbh"}],"author":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/users\/36"}],"version-history":[{"count":0,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh\/297977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media\/297981"}],"wp:attachment":[{"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/media?parent=297977"}],"wp:term":[{"taxonomy":"sbh_category","embeddable":true,"href":"https:\/\/www.reckon.com\/au\/wp-json\/wp\/v2\/sbh_category?post=297977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}