Visit the crayon.com enterprise site
Crayon Channel APAC
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • DocuSign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login

Search

Become a Partner Partner Login
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • DocuSign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login
Crayon Channel APAC

Search

Home / Enablement Hub / Insights / Blogs / What to consider when building a Security Practice

What to consider when building a Security Practice

As the modern industry moves away from working in a central location (hybrid working conditions etc.), businesses need improved security processes to protect their systems. Cybercrime is increasing, with criminals aiming to exploit weaknesses due to a lack of oversight and weak security.

Cybersecurity Risk Increases

Cybersecurity Risk Increases

The Australian Cyber Security Centre (ACSC) reported that cybercrime saw an increase of 13% in Australia during the 2020/21 financial year. This increase in cybercrime activity has been accredited to remote working conditions and an uptick in home internet usage, due to the pandemic environment. There were 1,500 reported attacks related to the coronavirus pandemic, which is about 4 per day. Cybercrime has cost Australian businesses $33 billion in the past year.

Many businesses know the current cybercrime statistics but don’t know how to respond to the threats. What will they do if their business is affected? How will they prevent cybercrime from happening? At Crayon, we have listened to the concerns of Australian businesses and IT providers and want to share key solutions to alleviate them.

How to Assist your Clients

How to Assist your Clients

IT professionals are aware of the increase in cyber threats over the past few years. However, reports demonstrate that while IT professionals request an increase in security, some businesses have cut their security budgets by up to 33%.

The unfortunate truth of cyber security is that when it is working, cybercrime threats seem diminished. By providing businesses with information about cybercrime using data and talking points, you can keep businesses informed about why they need these vital systems.

The Three Layers of Security

The Three Layers of Security

Investigations show that users are the weak link of any security system. The majority of attacks occur due to people downloading and deploying malicious software on their systems. Cybercriminals are very adept at creating emails, websites, and links that appear genuine but will trick people into making mistakes.

In the 2020/21 financial year, ACSC noted that 83% of reported cybercrime was attributed, either entirely or partly, to what is known as the ‘people factor’. In these reported cyberattacks, approximately 50% were ranked as Category 4 (i.e., they had a profound impact on victims). This fact demonstrates an increase in the effectiveness of cyberattacks.

At Crayon, we’ve devised the three layers of security to help explain how businesses can limit their exposure to cybercrime. Protect, Limit, and Recover.

The Three Layers of Security

The Three Layers of Security

Protect

With appropriate protection systems in place, many threats do not make it through to the end-user and can never be activated. Using dedicated applications, you can stop malicious email attachments, viruses, and ransomware from causing issues for businesses and employees.

Limit

If a threat makes it past the protection and secure strategies, you need appropriate defence mechanisms to limit your risk. A defence network will work before an attack occurs and monitor systems for potential problems. When an attack occurs, a good security system will work to isolate and remove the malicious files, applications, and code.

Securing your systems through appropriate password usage and including multi-factor authentication will provide an additional layer of security. Emails and attachments can be encrypted, and forwarding is limited to make sure only the recipient can read messages.

Recover

Ensure that suitable procedures are in place to recover quickly from any attack. Your systems will need to identify what is lost and the extent of the damage. This level will include data storage and backup systems. It may also be required that your systems be examined for potential security gaps and how these can be addressed and improved.

Using Microsoft 365 to Protect Business Systems

Using Microsoft 365 to Protect Business Systems

When using cloud security solutions for small and medium enterprises, research conducted by Forrester found benefits of an ‘improved risk identification/mitigation (53%), enhanced encryption (49%), improved regulatory compliance (47%)’.[1]

Using Microsoft 365 to Protect Business Systems

Using Microsoft 365 to Protect Business Systems

Microsoft 365 is a proven application suite for protecting businesses from cybercrime threats. In this solution, you’ll find many applications that will allow any IT professional to protect data and secure sensitive information.

Using the integrated tools that come with a Microsoft 365 subscription, IT professionals can see at a glance where problems may occur. The built in compliance manager can highlight concerns and present a compliance score, and provide recommendations to improve it.

A Microsoft 365 subscription is a valuable security asset for any business as it provides superior protection against costly cyber-attacks. The applications provided in the subscription can be used for any device that connects directly to a business and supports employees in a hybrid working environment.

 

 

[1]Source: The Future Of Operations Hinges On A Cloud Foundation; a commissioned study conducted by Forrester Consulting, May 2021

Related tags:
ProductivityRisk and ResilienceMicrosoft
SHARE
Visit the crayon.com enterprise site

Subscribe to Crayon Channel APAC news

Receive the latest updates, industry insights and technology developments from around the world, and across the Asia Pacific region.

Thank you for subscribing!

  • Become a Partner
    • Partner Value Guide
    • Sign Me up
  • Solutions
    • Business Applications
    • Business Continuity
    • Cloud Infrastructure
    • Productivity
    • Security
  • Community
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • PAC
    • Community Events
  • About
    • Careers
    • Contact Us
    • APAC Leadership
    • Visit Crayon Japan
  • Platforms
    • PRISM
    • Cloud-iQ
  • Services
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Access4
  • Acronis
  • Airlock Digital
  • Automox
  • AvePoint
  • Backup365
  • ConnectWise
  • ContraForce
  • CoreView
  • Cytrack
  • Delinea
  • DNSFilter
  • DocuSign
  • ESET
  • Hornetsecurity
  • invicti
  • Layer 8 Security
  • Microsoft
  • Nerdio
  • Netwrix
  • NinjaOne
  • Octopus Cloud
  • Probax
  • Runecast
  • SigniFlow
  • SmartEncrypt
  • SMX
  • Swoosh.Cloud
  • Trend Micro
  • usecure
  • Veeam
  • VIPRE
  • VMware by Broadcom
  • Wasabi
  • Zimbra
  • ZIRILIO
  • Zoom
  • View All
Crayon Channel APAC Contact us today
  • Privacy
  • Terms & Conditions

© 2025 Crayon LTD

back to top

Get ready to ride the SMB ERP demand wave

If you want to learn more about emerging ERP opportunities, download Crayon’s eBook

Read more

Front cover and interior page view of Forrester SMB market study reportch report

Future of Operations 2025

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Download the study

Download Our Partner Value Guide

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.

Download Value Guide