January: A Time to Get Cyber Wise

January: A Time to Get Cyber Wise Blog
By Tyler W
January 23, 2025

January: A Time to Get Cyber Wise

January is a busy month. Everyone is returning from leave, grappling with the realities of work, and promising that this year will be different—better! However, before we know it, life gets busy, and we fall back into old routines. This is normal, and it’s precisely the kind of behavior that cyber attackers exploit.

Each year, we connect more devices to our networks, often without realising that many of these new connections leave us with outdated and insecure legacy systems in our corporate and home infrastructures. These overlooked vulnerabilities are exactly what attackers seek to exploit.

To help mitigate these risks, the Australian Signals Directorate (ASD) provides valuable guidance on securing edge devices:
Mitigating Strategies for Edge Devices – Executive Guidance.

For small offices and home setups, there are immediate steps you can take to secure your device environment—steps that require little technical expertise. Let’s break it down into a manageable process.


Start with an Inventory

The thought of catalouging all devices connected to your network may seem daunting. But here’s a practical tip: let your devices do the work for you.

If your setup relies on WiFi connections, start by changing your WiFi password. This will prompt every device to attempt reconnection, effectively announcing themselves to you. Before allowing each device to reconnect, take this opportunity to review and secure them by following these steps:

1. Check the Operating System

  • Confirm that each device is running the most up-to-date operating system or firmware.
  • A quick Google search for your device model can reveal if it has any known vulnerabilities or patches available. Security issues are often publicized through CVE disclosures or media reports.
  • Update any outdated systems or firmware to their latest versions to ensure they’re vulnerability-free.

2. Update Login Credentials

  • Ensure default login credentials, such as admin/admin or admin/password, are not being used.
  • Use this opportunity to create unique, strong passwords for each device and save them in a password manager.

3. Adopt a Password Manager

  • If you’re not using a password manager already, now is the perfect time to start. A password manager ensures your credentials are secure and easily accessible.

4. Conduct a Physical Inspection

  • Cybersecurity isn’t just about software. Physically inspect your devices to ensure they’re functioning correctly and don’t have any unknown peripherals attached that could pose security risks. Even seemingly innocent devices, like old USB drives or outdated peripherals, can create unnecessary exposure.

Take Proactive Steps to Secure 2025

By following these simple steps, you’ll not only reduce potential cybersecurity risks but also improve your overall device management. Cyber attackers often target complacency and outdated systems, using legacy devices with known vulnerabilities as an entry point.

Starting 2025 with a renewed focus on cybersecurity doesn’t just protect you—it helps improve collective cybersecurity across the board. Cyber attackers are inherently opportunistic. Strengthening your defenses may discourage them from targeting you, effectively reducing overall risks.

Remember, this isn’t about wishing for your "neighbour" to fall victim instead; it’s about everyone improving their cybersecurity posture for the betterment of all.

Good luck, and let’s make 2025 the year we all become cyber wise!

Get our latest Media Releases & stay informed & up to date.
60ed82d99a91e_about-cta.png