
Assess
Advise
Deploy
Cyber Services
Assess
Security Assessments
All engagements typically start with an appropriate security assessment which provides a holistic point-in-time view of your business security posture. The assessment will identify the digital assets which need to be protected, existing vulnerability and offer recommendation to address cyber risk.
We offer the following types of cyber security assessment
Essential Eight - Assessment
The Australian Cyber Security Centre (ACSC) produces the Information Security Manual (ISM) which is a comprehensive cyber security framework. The ACSC has developed a subset of prioritised mitigation strategies from the Information Security Manual (ISM) to help organisations protect themselves against cyber threat. The most effective of these mitigation strategies are the Essential Eight.
The Essential Eight comprise:
Application control
Patch applications
Configure Microsoft Office macro settings
User application hardening
Restrict administrative privileges
Patch operating systems
Multi-factor authentication
Regular backups
The Essential Eight outlines a minimum set of preventative measures which are assessed and scored as part of our engagement to emphasise the maturity level of an organisation.
Varonis Data Risk Assessment
Varonis protects sensitive files and emails, confidential customer, patient and employee data, financial records and other intellectual property. Sensitive information needs to be protected but it can be stored in many places with varying levels of access.
The Data Risk Assessment will provide a detailed report based on your company data, that reveals the vulnerabilities hackers will hunt for.
Use the report to generate a prioritised remediation plan, it will help engage your leadership teams, and map out what you need to do next to meet regulations.
Click the Download button to see a sample Data Risk Assessment.
(opens in a new window)
Advise
Cyber Consultancy
Mitigating cyber risk can be achieved in various ways, it may involve a change to process, a change to an information system, the introduction of a framework or a technology solution.
It is important to not only address immediate, short-term risk, but to adopt a solution which will accommodate your transformation and growth journey as well as protect against future threat.
We adopt a cooperative approach, taking into account our understanding of your business, the risk profile of your industry and the findings of our assessment to recommend a cyber security solution that best meets your need.
Deploy
Cyber Solutions
We architect, deploy and support cyber security solutions by Sophos and Varonis.
Our qualified consultants utilise the latest technology from industry-leading cybersecurity companies to help organisations implement the best possible solution delivering an enhanced cyber security posture.
Technology Services include:
Security Architecture & Design
Security Deployment
Security Configuration
Security Delivery & Support