The good news: the defences work
AI has made cyber attacks faster and more accessible. But the fundamental defences haven't changed — they've just become more urgent. The businesses that take these steps now will be protected against the vast majority of AI-powered attacks. The ones that don't will learn the hard way.
Here's exactly what to do, in order of priority.
1. Get a real security assessment
This is step one because everything else depends on it. You can't protect what you haven't measured.
A vulnerability assessment and penetration test (VAPT) combines automated scanning with manual testing by security professionals who think like attackers. They don't just find individual vulnerabilities — they chain them together, exactly the way AI-powered attackers do.
What a proper VAPT covers:
- External testing: What an attacker can see and reach from the internet — your website, email servers, VPN, cloud services
- Web application testing: Injection flaws, authentication bypasses, session management, API security
- Configuration review: Server hardening, SSL/TLS configuration, security headers, access controls
- Vulnerability chaining: Connecting multiple findings into realistic attack paths — the exact methodology AI attackers use
An automated scan is not a VAPT. Automated scans miss the kind of chained, context-dependent vulnerabilities that AI attackers exploit. If your last "penetration test" was someone running Nessus and sending you a PDF, you have a false sense of security.
2. Implement the Essential Eight
The Australian Signals Directorate developed the Essential Eight framework specifically to counter the most common attack vectors. It's the baseline security standard recommended for every Australian business — and in an AI-accelerated threat landscape, it's not optional.
The eight controls:
- Application control — Only approved software runs on your systems
- Patch applications — Critical patches applied within 48 hours (not weeks)
- Configure Microsoft Office macros — Block macros from the internet
- User application hardening — Disable Flash, ads, Java in browsers
- Restrict administrative privileges — Least privilege access for all users
- Patch operating systems — Critical OS patches within 48 hours
- Multi-factor authentication — MFA on all remote access and privileged accounts
- Regular backups — Tested, offline, and recoverable
In the context of AI threats, patching speed is now the most critical control. When the gap between vulnerability disclosure and AI-automated exploitation is measured in hours, a 30-day patch cycle is a 30-day open window.
An Essential Eight gap assessment tells you exactly where you stand — which controls are in place, which have gaps, and what maturity level you're operating at.
3. Secure your code
If your business runs a custom website, web application, customer portal, or internal tool — the code itself is an attack surface.
A secure code review examines your source code line by line for:
- SQL injection and other injection flaws
- Cross-site scripting (XSS) vulnerabilities
- Broken authentication and session management
- Insecure direct object references
- Security misconfiguration
- Sensitive data exposure
- Missing access controls
External penetration testing attacks your application from the outside. Secure code review examines it from the inside. You need both — because AI attackers will probe both.
4. Protect customer data — it's the law
Under the Australian Privacy Act 1988, your business has legal obligations to protect personal information. If you hold customer names, emails, phone numbers, addresses, or financial details — you're bound by the Australian Privacy Principles (APPs).
The Notifiable Data Breaches (NDB) scheme requires you to notify the Office of the Australian Information Commissioner (OAIC) and affected individuals when a data breach is likely to cause serious harm.
In an AI-accelerated threat environment, this matters because:
- Breaches will happen faster — your detection and notification processes need to match
- Regulatory scrutiny is increasing — the OAIC is actively investigating businesses that fail to implement reasonable security measures
- Customer trust is fragile — one breach can permanently damage your reputation
A privacy and NDB readiness assessment ensures you know what data you hold, where it's stored, how it's protected, and what your obligations are if it's compromised.
5. Harden your email and identity systems
AI-powered phishing is the #1 threat in 2026. Your defences need to match:
- Multi-factor authentication (MFA) on every account — email, cloud services, banking, admin panels. Not SMS-based — use authenticator apps or hardware keys
- Email authentication protocols: SPF, DKIM, and DMARC configured and enforced. These prevent attackers from spoofing your domain
- Security awareness training: Your team needs to recognise AI-generated phishing. The old "look for spelling mistakes" advice is useless — AI writes flawless English
- Conditional access policies: Block sign-ins from unusual locations, unmanaged devices, or impossible travel patterns
6. Build an incident response plan
With AI accelerating the frequency and severity of attacks, the question is no longer "will we be breached?" but "when we're breached, how fast can we respond?"
An incident response plan covers:
- Detection: How will you know when a breach occurs? (Most businesses discover breaches months after they happen)
- Containment: What's the first action to limit damage?
- Eradication: How do you remove the attacker's access?
- Recovery: How do you restore systems and data?
- Notification: Who needs to know, and how quickly? (NDB scheme: "as soon as practicable")
- Post-incident review: What failed, and how do you prevent it next time?
If you don't have a written, tested incident response plan — you don't have a plan. You have a panic.
7. Get cyber insurance — but earn it first
Cyber insurance is increasingly difficult to obtain without demonstrating security controls. Australian insurers now routinely require:
- Evidence of MFA implementation
- Recent penetration testing results
- Endpoint detection and response (EDR) tools
- Email security controls
- Regular backup testing
- Essential Eight alignment
Implementing the steps above doesn't just protect your business — it qualifies you for better insurance terms and lower premiums.
The cost of inaction vs the cost of action
Let's put this in perspective:
- A professional VAPT for a growing business: $2,000–$8,000 (one-off)
- An Essential Eight gap assessment: $1,500–$4,000 (one-off)
- A privacy and NDB readiness review: $2,000–$5,000 (one-off)
- The average cost of a data breach in Australia: $4.26 million
- The cost of regulatory non-compliance: up to $50 million per contravention under the Privacy Act
The maths is not complicated. The businesses that invest in prevention now will save orders of magnitude more than those that wait for an incident.
Start with a free assessment
RabbiiCo Studio offers free entry-point assessments across cybersecurity, compliance, and privacy. No obligation, no sales pitch — just a clear picture of where your business stands and what to prioritise.