Assess

Advise

Deploy

Cyber Services

Assess

Security Assessments

All engagements typically start with an appropriate security assessment which provides a holistic point-in-time view of your business security posture. The assessment will identify the digital assets which need to be protected, existing vulnerability and offer recommendation to address cyber risk.

We offer the following types of cyber security assessment

Essential Eight - Assessment

The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM) which is a comprehensive cyber security framework. The ACSC has developed a subset of prioritised mitigation strategies from the Information Security Manual (ISM) to help organisations protect themselves against cyber threat. The most effective of these mitigation strategies are the Essential Eight.

The Essential Eight comprise:

  1. Application control

  2. Patch applications

  3. Configure Microsoft Office macro settings

  4. User application hardening

  5. Restrict administrative privileges

  6. Patch operating systems

  7. Multi-factor authentication

  8. Regular backups

The Essential Eight outlines a minimum set of preventative measures which are assessed and scored as part of our engagement to emphasise the maturity level of an organisation.

Varonis Data Risk Assessment

Varonis protects sensitive files and emails, confidential customer, patient and employee data, financial records and other intellectual property. Sensitive information needs to be protected but it can be stored in many places with varying levels of access.

The Data Risk Assessment will provide a detailed report based on your company data, that reveals the vulnerabilities hackers will hunt for.

Use the report to generate a prioritised remediation plan, it will help engage your leadership teams, and map out what you need to do next to meet regulations.

Click the Download button to see a sample Data Risk Assessment.

(opens in a new window)


Advise

Cyber Consultancy

Mitigating cyber risk can be achieved in various ways, it may involve a change to process, a change to an information system, the introduction of a framework or a technology solution.

It is important to not only address immediate, short-term risk, but to adopt a solution which will accommodate your transformation and growth journey as well as protect against future threat.

We adopt a cooperative approach, taking into account our understanding of your business, the risk profile of your industry and the findings of our assessment to recommend a cyber security solution that best meets your need.


Deploy

Cyber Solutions

We architect, deploy and support cyber security solutions by Sophos and Varonis.

Our qualified consultants utilise the latest technology from industry-leading cybersecurity companies to help organisations implement the best possible solution delivering an enhanced cyber security posture.

Technology Services include:

  • Security Architecture & Design

  • Security Deployment

  • Security Configuration

  • Security Delivery & Support