A One-Page Cyber Checklist for Small Accounting Firms

January 18, 2026

A One-Page Cyber Checklist for Small Accounting Firms

I get it, you’re swamped with billable work.

Clients are breathing down your neck and the ATO is putting you on hold for the millionth time. Things get rushed and cyber security is the last thing on your mind.

In the fog of accounting war, it’s easy for your firm to get complacent and relax on simple things because you just need to get the work out the door.

However, the last thing you want is for your firm to be hacked and the first result in Google when you search your firm’s name will let everyone know.

If you didn’t know this is a thing, try googling “Accounting firm hacked Australia” and you’ll get a nice list.

Now that I’ve set the tone, it’s not all panic.

There is a lot you can do, and many of the most important things are quite easy. I suggest taking some time every year to do a quick review and cover the basics.

Here is a checklist to help make sure your firm is safe.

If you follow all of this, you will already be well ahead of most accounting firms.


Cyber Security Checklist for Accounting Firms

AreaCheckYesNoNot sureWhy this matters
Email & identityMFA is enforced on every mailbox, including partners and shared mailboxesA single mailbox compromise enables impersonation, password resets, and fraud
Legacy email access (POP/IMAP without MFA) is disabledAttackers bypass MFA using older protocols
External email forwarding is disabled or tightly restrictedForwarding and inbox rules let attackers stay hidden
Staff do not share email or system loginsShared logins remove accountability and delay response
Access & permissionsDay-to-day accounts do not have admin accessExcess privilege turns small incidents into firm-wide breaches
Admin access is temporary and reviewedStanding admin access is a high-value target
Access is removed or reviewed when roles change or staff leaveOld access is routinely abused in real incidents
Devices & dataFull disk encryption is enabled on all laptops and mobilesLost devices expose data without any hacking
Screen locks and strong device passwords are enforcedPrevents casual access to sensitive data
Lost or stolen devices can be remotely wipedLimits damage after physical loss
Backups & recoveryAt least one backup is offline or immutableOnline backups are often deleted by attackers
Backup restores have been tested, not just configuredUntested backups fail under pressure
Recovery time is known and realisticUnrealistic expectations delay decisions
Payments & fraudBank detail changes are never accepted by email aloneEmail impersonation enables direct theft
Verification uses a known phone numberAttackers control contact details in emails
The verification process is written and followedAd-hoc checks fail under urgency
Incident readinessThere is a one-page incident response planThe first hour determines the outcome
Roles are clear for IT, clients, insurers, and regulatorsConfusion wastes time attackers use
The plan is accessible if systems are downMany plans are unreachable during incidents

Now, this is just a starter and if you follow all of this you will be way ahead of most accounting firms.

Ready to see LedgerOptic in action?

Book a personalised walkthrough to learn how LedgerOptic streamlines compliance reviews, surfaces ledger risks, and saves your firm hours each week.