Why a Cyber Audit Before Summer is More Than Just a Good Idea

As we approach the mid-year mark, June is the perfect time to take stock of your organisation’s cybersecurity posture. Our key recommendation? Conduct a comprehensive annual review with your internal IT team or external consultants. This isn’t just a box-ticking exercise—it’s a strategic opportunity to identify gaps, reinforce best practices, and prepare for emerging threats.

It may sound obvious, but here’s the reality: most of the cybersecurity improvements we’re seeing this year are simply last year’s best practices finally being implemented. By acting now, you’re not just catching up—you’re getting ahead. A proactive audit helps ensure your systems are resilient, your team is aligned, and your business is ready for whatever the second half of the year brings.

Importance of doing a cyber audit before the summer.

Our key tip is to complete an annual review of your cybersecurity with your internal team and/or consultant with a view of addressing current and likely future enhancements. This may sound obvious, but we find that almost all cybersecurity enhancements we’re seeing in the current year are simply best practices from the previous year.

------------------------

Best Practices for Cybersecurity While Travelling

With summer holidays fast approaching, it’s important to remember that cybersecurity doesn’t take a break just because your team does. Before users start logging in from unfamiliar locations (where suspicious activity might not be suspicious), it’s worth taking a moment to prepare. We recommend these actions are taken in June, ready for the July/August holidays.

Remote logins from overseas can trigger security alerts, especially if your systems are configured to flag unusual access patterns. But more importantly, travelling users are often at higher risk of cyber threats due to public Wi-Fi, unsecured devices, and relaxed vigilance.

Here are a few practical tips to help your team stay secure while abroad:

Use a VPN: Ensure all staff are equipped with and trained to use a Virtual Private Network when accessing company systems from outside the office. This encrypts their connection and reduces exposure on public networks.

Disable auto-connect: Encourage users to turn off automatic Wi-Fi and Bluetooth connections. These features can expose devices to rogue access points.

Limit device access: If possible, travel with minimal tech. Leave unnecessary devices at home and ensure those taken are encrypted and password-protected.

Update before departure: All devices should be patched and updated before travel. Outdated software is a common entry point for attackers .

Educate your team: A quick refresher on phishing, physical device security, and what to do if something goes wrong can go a long way

By proactively addressing these risks, you not only reduce the chance of a breach but also give your team the confidence to work securely—wherever they are.

Jordan Gall

Jordan Gall is a passionate technologist with extensive experience supporting businesses across Europe, Asia, and Australasia. He has a strong foundation in cybersecurity, holding a Bachelor of Information Technology from Griffith University in Australia. Jordan has dedicated his career to bridging the gap between technology and business efficiency.

In 2020, Jordan joined Buchanan Technology, a global cybersecurity firm, where he serves as Head of Cyber. His vision is to establish Buchanan Technology as a worldwide leader in accessible cybersecurity services for small and medium businesses.

Jordan recently relocated back to Australia in 2024 to get away from the hustle-and-bustle city lifestyle, allowing him to focus on some personal goals (a lot of which will be immortalised in LinkedIn) and spend time with his family.

When he's not leading cybersecurity initiatives, Jordan engages in emerging innovations and eagerly awaits a contact lens version of the Apple Vision Pro. Outside of tech, you can find him on the tennis court, cricket field or playing the drums and composing music.

Previous
Previous

How to prevent the most common cybersecurity breaches

Next
Next

How to Stay Ahead of Cybersecurity Changes from Financial Regulators in 2025 and 2026