Visit the crayon.com enterprise site
Crayon Channel APAC
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login

Search

Become a Partner Partner Login
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • Docusign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • Senserva
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • Virtuozzo
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login
Crayon Channel APAC

Search

Home / Enablement Hub / Insights / Blogs / Ransomware attack explosion drives legislation review

Ransomware attack explosion drives legislation review

6th August 2024

Businesses urged to act ahead of zero tolerance policy shift

An explosion in ransomware attacks has fueled a nationwide review of the issue, as concern rises that secret payoffs add increased fuel to the cybercrime fire.

Ransomware attacks can destroy small and medium businesses (SMBs). So real is the threat, new legislation under consideration by the Australian federal government presents possible penalties for making payments.

There is increasing concern amongst policymakers that paying off ransomware attackers encourages ever bolder and more daring criminal behaviour. Recent media reports outline the Australian federal government is reviewing existing regulations as part of its “Ransomware Action Plan’.

New rules would introduce a ‘zero tolerance’ position on ransomware, making it mandatory for all companies with turnover of more than $10 million per annum to report ransomware attacks and disclose any associated payments made.

There is continued debate about the impact and efficacy of the proposed changes, but it is a clear signal the government intends to act. We encourage our partners to keep a close eye on this issue and raise awareness with their customers that ransomware attacks on small businesses are on the rise.

Ransomware is real and happening all over Australia

Let’s be honest, many SMB owners wrestle with prioritising cyber security. They’re focused on building their business, adding new clients, managing cash flow and keeping the lights on in their operation.

Time and resource are scarce and stretched across a myriad equal and competing business needs, such as customer service, sales, products, marketing. The focus is on activities and investments that grow the business, not so much the stuff that could derail it, like ransomware attacks.

One of the challenges for SMBs in accepting ransomware as a risk is the terminology sounds like something out of a spy movie – more like fiction than fact. There is also a common misconception that cybercriminals only target big business, as these stories are the ones that tend to make headlines.

In reality ransomware is a direct threat to SMBs in Australia and New Zealand, which are both in the top ten of nations targeted by this type of attack. Corewave also reports the average downtime caused by ransomware attacks due to recovery of data and restoring networks is 16.2 days – which would be devastating for most small businesses.

Ransomware statistics can be scary, but they don’t reveal the horror nor human suffering behind the numbers. The harsh reality is ransomware can send businesses to the wall, and more businesses are at an increased risk of this kind of attack than ever.

How SMBs can fight back against ransomware attacks

The good news is SMBs can minimise risk by adopting the Essential Eight cybersecurity framework. Devised by the Australian Cyber Security Centre (ACSC), adherence to the recommended controls in the framework massively reduces SMB exposure to ransomware attacks as well as other cybersecurity threats.

For SMBs at the start of their cyber security journey, the Essential Eight removes a lot of concern and complexity because ACSC cyber security experts have done most of the thinking and planning required to get cybersecurity measures right. They’ve identified the major threats and listed actions to mitigate them. It’s a joined-up cyber security action plan. For cost-conscious SMBs, the good news is the Essential Eight is free expert consultancy.

The following two mitigations from the Essential Eight provide an example of effective risk management that will give all SMBs a better chance of combating cybercriminals.

Regular backups

This mitigation action calls for regular data and systems backups (at least daily). Many online businesses need more frequent backups so they can restore systems and data to a very recent position. SMBs should implement a backup frequency that suits their specific conditions.

This mitigation also recommends regular testing of the recovery process. Testing proves that the backup solution works, and that data can be restored in the event of a ransomware or other attack.

Multi-factor authentication (MFA)

The ACSC says: “Multi-factor authentication is one of the most effective controls an organisation can implement to prevent an adversary from gaining access to a device or network and accessing sensitive information.”

MFA requires users (whether inside or outside the organisation) to provide two or more types of authentication (e.g. username and password, plus a finger or eye scan, or a PIN texted to their phone). MFA makes it much harder for hackers to get access to a system through stolen login credentials.

Get started and take action to stop ransomware

The Essential Eight is the outcome of some serious thinking by highly talented ACSC cyber security experts and provides a practical and realistic starting point for many SMBs to prevent ransomware and other attacks. The fact that it’s also free just makes it even more compelling.

For our partners, Crayon offers a service that can help you to assess the state of your customers Essential Eight maturity levels. It is a practical and effective way to identify where they have existing risk and get an actionable roadmap in place that will improve their cybersecurity posture.

Whether you have an existing security practice or need new ways to respond to your customers increased security needs, our Security Assessment services have you covered.

Learn More about how we can help.

Related Resources

Data Protection for Business Leadership

Sales and Marketing

Data Protection for Business Leadership

Business leaders don't live in the tools. They live in the outcomes. The metrics they care about most are not always limited to compliance and risk. So how do you connect data protection to the big-ticket objectives, when they're less obvious? Our in-house pre-sales expert, Michael Brooke explains.

Read more
Data Protection Playbook #3

Guides and eBooks

Data Protection Playbook #3

As SMBs mature in the Data Protection lifecycle, they need help to optimise spend, reduce the compliance burden and ensure results align to business objectives. The third installment of our Data Protection Playbook series provides practical guidance for partners on how to address emerging pressure and connect ongoing investment to measurable business value.

Read more
Copilot Agents: Level up from chatbots

Training

Copilot Agents: Level up from chatbots

Copilot Agents: what are they and how do they differ from AI assistants and chatbots? Our in-house Copilot expert Ksenia Turner explains the use cases and service opportunities for partners.

Read more
Proving Data Protection Compliance

Blogs

Proving Data Protection Compliance

Fragmented data protection systems and processes create compliance proof-gaps for SMB customers. Scott Hagenus, Director, Cybersecurity here at Crayon explains.

Read more
Data Protection Sales

Sales and Marketing

Data Protection Sales

Ever wonder why a pitch has some IT Managers leaning forward, while others glaze over? Michael Brooke, Cybersecurity Pre-Sales Lead offers some insight on how to tune your approach to chime with different technical mindsets.

Read more
Data Protection Playbook #2

Guides and eBooks

Data Protection Playbook #2

How can partners help their SMB customers to move from silos of security and continuity to a more cohesive, measurable and insurable data protection framework? The second edition in our Data Protection Playbook series maps out their journey, and yours.

Read more
Copilot for Business

Vendor Announcements

Copilot for Business

Copilot for Business has landed at Microsoft Ignite 2025, levelling the GenAI playing field for SMB customers. Learn all about it from our man on the ground, Andreas Bergman.

Read more
Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award

Press Release

Crayon recognized as the winner of the 2025 Microsoft Asia Partner of the Year Award

Read more
Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award

Press Release

Crayon recognized as the winner of the 2025 Microsoft Malaysia Partner of the Year Award

Read more
Data Protection Partner Playbooks for SMB Customers

Blogs

Data Protection Partner Playbooks for SMB Customers

As cybersecurity and continuity converge in platforms and in practice, partners need new playbooks to address modern Data Protection standards. Our in-house cybersecurity pre-sales lead, Michael Brooke explains why.

Read more
Data Protection Playbook #1

Guides and eBooks

Data Protection Playbook #1

What triggers an SMB customer to begin exploring their need for better Data Protection? The first of our four Data Protection Playbooks for partners breaks down how to position and win in the Pre-Adoption and Exploration stage.

Read more
Data Protection Resource Round-Up

Insights

Data Protection Resource Round-Up

Data Protection priorities are shifting for SMBs. Ramp up your ability to respond with curated insights, articles and resources to help you guide every customer conversation with confidence.

Read more
The strong, supportive partnership driving Acceltech’s growth

Partner Spotlight

The strong, supportive partnership driving Acceltech’s growth

In this Partner Spotlight, Acceltech Managing Director Ivy Tarrobago shares how Crayon’s responsive support enhances client outcomes and business growth.

Read more
Strengthening Data Protection for SMBs

Whitepapers

Strengthening Data Protection for SMBs

Data Protection is a must for all SMBs but how can partners align solution investment with critical business objectives? Our latest paper shows you how.

Read more
Crayon wins at CRN Channel Awards Asia 2025

Press Release

Crayon wins at CRN Channel Awards Asia 2025

Crayon has been recognised with a huge double win at the CRN Channel Asia awards ceremony.

Read more
M365 Copilot Hub

Insights

M365 Copilot Hub

All the latest insights, articles and resources on M365 Copilot, curated into one place.

Read more
Secure Backup and Recovery

Insights

Secure Backup and Recovery

SMB customers are storing greater volumes of sensitive data in more places than ever. Secure backup and recovery practices are essential to how they protect it.

Read more
Crayon Expertise: Why Bigfish is hooked

Partner Spotlight

Crayon Expertise: Why Bigfish is hooked

Bigfish Technology saved AU$20,000 on its annual Microsoft licensing after one call with Crayon and has since built a strong partnership that enabled Bigfish to get access to Crayon’s expertise and vendor ecosystem.

Read more
Insider Risk: SMB data and the threat within

Insights

Insider Risk: SMB data and the threat within

Insider risk is a subtle and continuous challenge for SMB customers. Turn it into a manageable and quantifiable aspect of their Data Protection strategy.

Read more
Data Protection for SMBs

Blogs

Data Protection for SMBs

From rethinking backup to governance frameworks and behavioural analytics, what's involved in building a complete Data Protection strategy for SMB customers?

Read more
Microsoft’s Channel Evolution

Insights

Microsoft’s Channel Evolution

We explore the evolution of Microsoft's channel strategy over the past ten years, and what can be learned by viewing it through a Value Cycle lens.

Read more
The Microsoft Fabric Partner Guide

Guides and eBooks

The Microsoft Fabric Partner Guide

The Microsoft Fabric Partner Guide curates our recent articles, videos and resources to accelerate Crayon partner learning.

Read more
Cybersecurity Resource Round-up

Insights

Cybersecurity Resource Round-up

Support your cybersecurity game plans with our top picks of new and updated risk and resilience resources.

Read more
The value of security assessments in the Age of AI.

Webinars Series

The value of security assessments in the Age of AI.

How do security assessments empower your cybersecurity practice to respond to the rise of AI? Find out!

Read more
Google’s Email Security Changes & Their Impact on Your Business

Webinars Series

Google’s Email Security Changes & Their Impact on Your Business

Read more
Essential Eight Compliance with Airlock

Case Studies

Essential Eight Compliance with Airlock

Essential Eight Compliance can be tough to maintain for partners and customers. Learn how Airlock simplified the challenge for one MSP, and delivered faster time to value.

Read more
Crayon/emt Distribution Strengthens Email Cloud Security for Partners in APAC with New Hornetsecurity Distri Agreement

Press Release

Crayon/emt Distribution Strengthens Email Cloud Security for Partners in APAC with New Hornetsecurity Distri Agreement

Read more
Crayon Cyber Chat: The Journey to Cyber Resilience

Podcast

Crayon Cyber Chat: The Journey to Cyber Resilience

Cybersecurity experts from Crayon, SMX and Red Sift cover the realities of the complex threat landscape and how partners can respond.

Read more
Crayon Fortifies ‘Journey to Value’ for Partners with Extended Cybersecurity Services

Company Announcements

Crayon Fortifies ‘Journey to Value’ for Partners with Extended Cybersecurity Services

Read more
Crayon welcomes DNSFilter to its cybersecurity solutions portfolio

Press Release

Crayon welcomes DNSFilter to its cybersecurity solutions portfolio

Empowering Partners, MSPs and ISVs with best-in-class protective DNS security solutions

Read more
Cloud Security Assessments are a Growth Opportunity

Blogs

Cloud Security Assessments are a Growth Opportunity

Crayon cloud security assessments help partners lock down M365 and Azure environments and build profitable cybersecurity practices. Learn how.

Read more
What to consider when building a Security Practice

Blogs

What to consider when building a Security Practice

Read more
Related tags:
ProductivityRisk and ResilienceMicrosoft
SHARE
Visit the crayon.com enterprise site

Subscribe to Crayon Channel APAC news

Receive the latest updates, industry insights and technology developments from around the world, and across the Asia Pacific region.

Thank you for subscribing!

  • Become a Partner
    • Partner Value Guide
  • Solutions
    • Business Applications
    • Business Continuity
    • Cloud Infrastructure
    • Productivity
    • Security
  • Community
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • PAC
    • Community Events
  • About
    • Careers
    • Contact Us
    • APAC Leadership
    • Visit Crayon Japan
  • Platforms
    • PRISM
    • Cloud-iQ
  • Services
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Access4
  • Acronis
  • Airlock Digital
  • Automox
  • AvePoint
  • Backup365
  • ConnectWise
  • ContraForce
  • CoreView
  • Cytrack
  • Delinea
  • DNSFilter
  • Docusign
  • ESET
  • Hornetsecurity
  • invicti
  • Layer 8 Security
  • Microsoft
  • Nerdio
  • Netwrix
  • NinjaOne
  • Octopus Cloud
  • Probax
  • Runecast
  • Senserva
  • SigniFlow
  • SmartEncrypt
  • SMX
  • Swoosh.Cloud
  • Trend Micro
  • usecure
  • Veeam
  • VIPRE
  • Virtuozzo
  • VMware by Broadcom
  • Wasabi
  • Zimbra
  • ZIRILIO
  • Zoom
  • View All
Crayon Channel APAC Contact us today
  • Privacy
  • Terms & Conditions
  • Human Rights Transparency Statement

© 2025 Crayon LTD

back to top

Strengthening Data Protection for SMBs

Connect Data Protection to strategic objectives via this Whitepaper

Learn More

Front cover and interior page view of Forrester SMB market study reportch report

Future of Operations 2025

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Download the study

Download Our Partner Value Guide

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.

Download Value Guide