⚠️

2024 ASD Annual Cyber Threat Report

The ASD received over 87,400 cybercrime reports in FY2023-24 — one every 6 minutes. Average self-reported cost per cybercrime report: $46,000 for medium businesses. The threat landscape is getting worse, not better.

If you're a Brisbane business owner who thinks "we're too small to be targeted," you need to read this. The ASD's latest Cyber Threat Report makes it clear: small and medium businesses are not an afterthought for cybercriminals — they're the primary target.

Why? Because large enterprises now have sophisticated security operations centres, dedicated security teams, and hundreds of thousands of dollars invested in cyber defences. SMBs, by contrast, are often a single successful phishing email away from a catastrophic breach. And cybercriminals are acutely aware of this.

Here are the seven cybersecurity risks that Brisbane businesses need to understand and address in 2025.

1 Phishing & Business Email Compromise (BEC)

Phishing remains the number one attack vector for Australian businesses — and it's getting dramatically more sophisticated. Gone are the days of obvious spelling mistakes and Nigerian princes. Modern phishing attacks use AI-generated content, impersonate your CEO, your bank, or the ATO, and are nearly impossible to distinguish from legitimate communications.

Business Email Compromise (BEC) is particularly dangerous for SMBs. Attackers compromise a business email account — or convincingly spoof one — and then instruct accounts payable to redirect payments to fraudulent accounts. The ASD reports that BEC caused over $84 million in losses to Australian businesses in FY2023-24.

"The average BEC loss for an Australian SMB is $50,000 per incident. And unlike most fraud, it's rarely recovered."

What to do: Implement multi-factor authentication on all email accounts, deploy email authentication protocols (DMARC, DKIM, SPF), conduct regular phishing simulation training for staff, and establish payment verification protocols that require phone confirmation for changes to payment details.

2 Ransomware: The Australian SMB Epidemic

Ransomware attacks on Australian businesses increased by 23% in 2024. The attackers' business model has evolved: rather than simply encrypting your data and demanding payment to unlock it, modern ransomware gangs also exfiltrate your data and threaten to publish it — a "double extortion" that gives them leverage even if you have backups.

For Brisbane businesses, ransomware typically enters through one of three vectors: a phishing email attachment, a compromised remote access portal (especially RDP), or a vulnerability in unpatched software. The average ransom demand for an Australian SMB is $250,000–$500,000 AUD. Even if you refuse to pay, the remediation cost — forensics, system rebuilds, data recovery — is typically $50,000–$150,000.

What to do: Implement the ACSC Essential 8 (particularly Patch Applications, Restrict Administrative Privileges, and Application Control), maintain tested offline backups, and deploy endpoint detection and response (EDR) software that can detect ransomware behaviour before encryption completes.

3 Weak Credentials & the MFA Gap

Despite years of advice to the contrary, a shocking number of Australian businesses still don't use multi-factor authentication (MFA) on critical systems. According to Microsoft's 2024 Digital Defense Report, 99.9% of account compromise attacks are stopped by MFA. It's one of the single most effective security controls available — and it costs almost nothing to implement.

The problem isn't just absent MFA. It's also password reuse, weak passwords, and credentials exposed in data breaches. The average person reuses the same password across 14 accounts. When one of those accounts is breached (and 10 billion credentials are now available on dark web markets), attackers have access to everything that shares that password — including your business systems.

What to do: Enforce MFA on all accounts — Microsoft 365, Google, banking, accounting software, VPN, and any remote access. Deploy a password manager for the business. Subscribe to dark web monitoring to receive alerts when your credentials are found in breaches.

4 Unpatched Software & Systems

The ACSC reports that over 60% of successful cyberattacks in 2024 exploited known vulnerabilities — vulnerabilities for which patches had been available for more than 30 days. This means attackers aren't even using novel techniques: they're exploiting weaknesses that businesses had the opportunity to fix but didn't.

For Brisbane businesses, the most dangerous unpatched systems are typically: Windows workstations and servers running outdated versions, network devices (routers, firewalls, switches) with vendor-issued firmware updates not applied, third-party applications (Adobe, browsers, Office) with known vulnerabilities, and cloud applications with security settings not reviewed.

What to do: Implement automated patch management to ensure all systems are updated promptly. The ACSC recommends patching critical vulnerabilities within 48 hours and all others within 2 weeks. This is the third mitigation strategy in the Essential 8 and one of the highest ROI security investments you can make.

5 Insider Threats & Accidental Data Loss

Not all data breaches are the result of malicious external attacks. The Australian Privacy Commissioner receives hundreds of voluntary breach notifications each year from businesses where the cause was an employee error — a file sent to the wrong email address, confidential data uploaded to a personal Google Drive, a laptop left in a taxi, or a USB drive lost at the airport.

The Privacy Act (and its forthcoming reforms) hold businesses responsible for how they protect personal data — regardless of whether the breach was intentional. A single notifiable data breach can expose your business to regulatory action, significant reputational damage, and potential civil claims from affected individuals.

What to do: Implement data loss prevention (DLP) controls in Microsoft 365, classify sensitive data, restrict unnecessary file sharing, ensure full-disk encryption on all laptops and mobile devices, and deploy remote wipe capability for all company devices.

6 Supply Chain Attacks

This is a newer and increasingly concerning threat vector. Rather than attacking your business directly, attackers compromise one of your suppliers, software vendors, or IT providers — and use that access to reach you. The SolarWinds and MOVEit attacks demonstrated how devastating supply chain compromises can be.

For Brisbane SMBs, the most common supply chain risks are: accounting software updates that deliver malware, compromised IT support tools that give attackers backdoor access, and vendor email accounts that are used to launch BEC attacks against your accounts payable.

What to do: Assess the security practices of key suppliers who have access to your systems or data. Implement the principle of least privilege — limit what access each vendor has. Verify that your MSP has demonstrable security practices (look for ISO 27001 alignment, ACSC certification, or similar credentials).

7 Inadequate Backup & Recovery

Many businesses believe they have backups. Fewer have actually tested those backups. Even fewer have a documented recovery plan that defines how long recovery will take and who is responsible for what. In a ransomware scenario, the difference between "we're back up in 4 hours" and "we're rebuilding from scratch over 2 weeks" is entirely determined by your backup and recovery posture.

The ACSC recommends the 3-2-1 backup rule: three copies of data, on two different media types, with one copy offsite (or in the cloud). Backups should be tested at least quarterly with a documented recovery time objective (RTO) and recovery point objective (RPO).

What to do: Review your current backup setup against the 3-2-1 rule. Test a recovery from backup — actually restore a file or a server, don't just assume the backup is working. Ensure at least one backup copy is air-gapped or immutable (cannot be encrypted by ransomware). Document your recovery plan.

The ACSC Essential 8: Your Baseline Defence

The Australian Cyber Security Centre's Essential 8 is the most practical security framework for Australian businesses. It was specifically designed to mitigate the most common attack vectors — including all seven risks we've discussed above. If your business implements the Essential 8 to Maturity Level 1, you will prevent the vast majority of cybercrime incidents that affect Australian SMBs.

The eight mitigations are: Application Control, Patch Applications, Configure Microsoft Office Macro Settings, User Application Hardening, Restrict Administrative Privileges, Patch Operating Systems, Multi-factor Authentication, and Regular Backups.

Your 10-Step Cybersecurity Checklist for 2025

Enable MFA on all accounts — Microsoft 365, Google, banking, VPN
Implement automated patch management for all devices and applications
Deploy endpoint detection & response (EDR) on all computers
Set up email authentication (DMARC, DKIM, SPF)
Conduct phishing simulation training for all staff
Test your backups — actually restore data from them
Review and restrict administrative privileges (who really needs admin?)
Enable full-disk encryption on all laptops and mobile devices
Subscribe to dark web monitoring for your business credentials
Get an ACSC Essential 8 assessment to understand your baseline

How Renot IT Protects Brisbane Businesses

Our cybersecurity services for Brisbane businesses start with an ACSC Essential 8 assessment to understand your current posture, then implement a multi-layered security stack including:

  • 24/7 SOC monitoring via SIEM platform
  • Endpoint detection & response (EDR) on all managed devices
  • Microsoft 365 Advanced Threat Protection
  • Dark web credential monitoring
  • Monthly phishing simulation campaigns
  • Automated patch management with compliance reporting
  • Immutable backup with tested recovery SLAs

We've guided 30+ Brisbane businesses through Essential 8 compliance and managed zero major security breaches across our client base. That's not luck — it's the result of treating security as a proactive, ongoing discipline rather than a one-time checkbox.

Get a free cybersecurity assessment

Find out your current ACSC Essential 8 maturity level and exactly where your vulnerabilities are — at no cost.

Book Free Assessment →