Visit the crayon.com enterprise site
Crayon Channel APAC
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • DocuSign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login

Search

Become a Partner Partner Login
  • CommunityConnecting partners to even greater value.
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • Partner Advisory Committee
    • Community Events
  • ServicesLeverage Crayon’s expertise to expand your service catalogue and create new revenue streams.
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Enablement
  • VendorsWith a vendor-agnostic approach, we are committed to ensuring our partners have access to the latest industry-leading solutions that solve real business challenges.
    • Access4
    • Acronis
    • Airlock Digital
    • Automox
    • AvePoint
    • Backup365
    • ConnectWise
    • ContraForce
    • CoreView
    • Cytrack
    • Delinea
    • DNSFilter
    • DocuSign
    • ESET
    • Hornetsecurity
    • invicti
    • Layer 8 Security
    • Microsoft
    • Nerdio
    • Netwrix
    • NinjaOne
    • Octopus Cloud
    • Probax
    • Runecast
    • SigniFlow
    • SmartEncrypt
    • SMX
    • Swoosh.Cloud
    • Trend Micro
    • usecure
    • Veeam
    • VIPRE
    • VMware by Broadcom
    • Wasabi
    • Zimbra
    • ZIRILIO
    • Zoom
  • Platforms
  • About CrayonCrayon helps its partners, and their customers, build the commercial and technical foundation for a successful and secure cloud-first, digital transformation journey.
    • Careers
    • Contact us
    • APAC Leadership
    • Visit Crayon Japan
  • Become a Partner
  • Partner Login
Crayon Channel APAC

Search

Home / What to consider when building a Security Practice

What to consider when building a Security Practice

As modern workplaces decentralise and move to hybrid models, it has become more important to tighten security gaps and reduce the opportunities for cybercriminals to exploit and extort Australian businesses. Partners that know how to leverage the advanced security features in their customers productivity platforms and applications have a growing opportunity to respond.

 

 

How Real is the Problem?

With so much data flooding the market on cybersecurity issues, it is easy to become hardened or cynical about how much is hype, designed to drive vendor sales agendas.

 

Real Big and Getting Bigger

The Australian Cyber Security Centre (ACSC) received some 76,000 reports of cybercrime in the 2022 financial year. That is an average of 208 cybercrimes committed every day, but the real number of cybercrimes is probably much higher. Leading Australian cybersecurity expert, Nigel Phair estimates that only one-fifth of online crime against businesses is detected and reported, meaning an estimated 300,000 actually took place in 2022. That is a real and significant problem for a country of just over $2.5 million registered businesses.

 

Cybercrime reports to ACSC 2020-2022

Australia: number of cybercrimes reported to the ACSC FY 2022 | Statista
Image source: https://www.statista.com/statistics/1343645/australia-number-of-cybercrimes-reports-acsc/

 

Employee vulnerability is real

Small to medium sized businesses (SMBs) are highly vulnerable to cybercrime. Less security technology and in-house technical skills contribute to this, but the ‘people factor’ creates the biggest weak spot. Exploiting a lack of cybersecurity awareness amongst SMB employees is how most cybercriminals succeed.

Cybercriminals are very adept at creating emails, websites, and links that appear genuine but will trick people into making mistakes. ACSC found that 83% of reported cybercrime in the 2020/2021 financial year could be partly or entirely attributed to users. The majority involved people downloading and deploying malicious software on their systems after being targeted with these tactics.

Training can mitigate the people factor over time. SMBs clearly need immediate countermeasures to ensure continuous productivity, even in the event of a cyberattack. Engaging external expertise is the most effective way to achieve this important aim.

 

The financial impact is real

Nigel Phair estimates the total cost to the Australian economy to be $43 billion per annum. The ACSC’s Annual Cyber Threat Report 2022 identifies the average cost to SMBs as $63,000 per cybercrime, with businesses of between 20-199 employees sustaining the highest financial losses.

SMBs also face the potential of stiff financial penalties for non-compliance with data breach notification and data privacy protection laws. This means when cybercriminals successfully steal personally identifiable information from a business and use it to extort money, it results in a triple threat; financial loss, losing customers due to data breach notifications and significant fines. Many SMBs would struggle to keep the doors open if hit with one of these, let alone three.

 

Steering the Customer Conversation

The connection between business productivity and security is not always obvious to SMB customers. Taking your customer conversations gradually through the following three stages can help them make sense of the different security layers they need.

Cyber Security in 2022

Cyber Security in 2022

Protect

With appropriate protection systems in place, many threats do not make it through to the end-user and can never be activated. Using dedicated applications, you can stop malicious email attachments, viruses, and ransomware from causing issues for businesses and employees.

How to Assist your Clients

How to Assist your Clients

Limit

If a threat makes it past the protection and secure strategies, you need appropriate defence mechanisms to limit your risk. A defence network will work before an attack occurs and monitor systems for potential problems. When an attack occurs, a good security system will work to isolate and remove the malicious files, applications, and code.

Securing your systems through appropriate password usage and including multi-factor authentication will provide an additional layer of security. Emails and attachments can be encrypted, and forwarding is limited to make sure only the recipient can read messages.

The Three Layers of Security

The Three Layers of Security

Recover

Ensure that suitable procedures are in place to recover quickly from any attack. Your systems will need to identify what is lost and the extent of the damage. This level will include data storage and backup systems. It may also be required that your systems be examined for potential security gaps and how these can be addressed and improved.

A Critical Consideration for Partners

“In the unlikely event of a sudden loss of cabin pressure, oxygen masks will drop down from the panel above your head. Secure your own mask before helping others.” Sound familiar?

Before you can hit the runway to help your customers, it is imperative to ‘secure your own mask’. As part of the software and service supply chain for your customers, the last thing you’d want is for your business to be identified and exploited as a weak link. However, the potential for this to occur is increasing. The most recent annual cyber threat report from ACSC specifically noted that MSPs, CSPs and IT service providers were actively targeted by cybercriminal networks during 2021 and 2022 because they provide a single-entry point to a range of sectors. Attacks on MSPs/CSPs are undertaken with the aim to ‘breach one, damage many’.

Secure Productivity practice readiness is all about ‘securing your own mask.’ Our cybersecurity technical advisory team is experienced in working with partners on strategies and programs that get your business built for take off.

 

Ask your rhipe account manager to provide an introduction, and to let you know about relevant incentives and promotions that can benefit your customers and your bottom line.

Explore the Microsoft Add On Incentive

Earn $3 AUD per seat when you add Microsoft Defender for Business to your existing Microsoft 365 Business Basic or Microsoft 365 Business Standard Licenses.

Explore Promotion
Visit the crayon.com enterprise site

Subscribe to Crayon Channel APAC news

Receive the latest updates, industry insights and technology developments from around the world, and across the Asia Pacific region.

Thank you for subscribing!

  • Become a Partner
    • Partner Value Guide
    • Sign Me up
  • Solutions
    • Business Applications
    • Business Continuity
    • Cloud Infrastructure
    • Productivity
    • Security
  • Community
    • Partner Value
    • Tech For Good Program
    • ISV Innovation Hub
    • Partner Connections Program
    • PAC
    • Community Events
  • About
    • Careers
    • Contact Us
    • APAC Leadership
    • Visit Crayon Japan
  • Platforms
    • PRISM
    • Cloud-iQ
  • Services
    • Security Services
    • Cloud Migration
    • ERP Implementation
    • Managed Services
    • Support as a Service
    • Cloud Cost Optimisation
  • Access4
  • Acronis
  • Airlock Digital
  • Automox
  • AvePoint
  • Backup365
  • ConnectWise
  • ContraForce
  • CoreView
  • Cytrack
  • Delinea
  • DNSFilter
  • DocuSign
  • ESET
  • Hornetsecurity
  • invicti
  • Layer 8 Security
  • Microsoft
  • Nerdio
  • Netwrix
  • NinjaOne
  • Octopus Cloud
  • Probax
  • Runecast
  • SigniFlow
  • SmartEncrypt
  • SMX
  • Swoosh.Cloud
  • Trend Micro
  • usecure
  • Veeam
  • VIPRE
  • VMware by Broadcom
  • Wasabi
  • Zimbra
  • ZIRILIO
  • Zoom
  • View All
Crayon Channel APAC Contact us today
  • Privacy
  • Terms & Conditions

© 2025 Crayon LTD

back to top

Get ready to ride the SMB ERP demand wave

If you want to learn more about emerging ERP opportunities, download Crayon’s eBook

Read more

Front cover and interior page view of Forrester SMB market study reportch report

Future of Operations 2025

What are the most critical business objectives and solution adoption priorities for SMBs in our region? Download the latest Forrester study to find out!

Download the study

Download Our Partner Value Guide

Our APAC channel business is now part of a global organisation. That means there is a whole new world of value on offer for our partners. We can help you to tap into all of it.

Download Value Guide