top of page

Our Services

Cyber Security Roadmap

Security Uplift

Cyber Security is made up of People, Processes, and Technology. We can help you uplift security across all three areas.

Security Training

People

We offer training to educate your staff on security best practices. This is otherwise known as Security Awareness Training.
​
Given the high frequency of scams targeting small businesses, this training is paramount in reducing the likelihood of your business being impacted. 

Security Processes

Processes

Our Cyber Security Practitioners are well versed in setting up essential cyber security processes. These include:
​
Responding to Incidents
Third Party Due Diligence
Managing User Access
Managing Technological Assets

Updating Software and Hardware

Security Tools

Technology

We can help securely implement fundamental security tools. These include:

Regular Backups
Endpoint Protection
Multi-Factor Authentication
Email Security

Security Reviews

We'll provide both questionnaire based and hands on services to review your business's Cyber Security.

Re-Checkup

This will be an amended review of your initial checkup. As your security function improves, we will identify additional gaps and provide recommendations to ensure continuous improvement.

Penetration Testing

Penetration Tests are controlled cyber attacks on your business's systems.

We follow industry standards to test key areas, such as:

Websites

Wi-Fi 

Networks

Phishing Simulation

Once your staff are provided with Security Awareness Training, we will send mock phishing or scam emails. Findings will be displayed in a report that showcases the training's effectiveness. 

Vulnerability Assessment

Penetration tests are thorough and effective, but they're resource intensive and consequently more expensive.

​

Vulnerability Assessments are a cheaper alternative which identify weaknesses in the same key areas. 

Security Compliance Services

These services ensure your business meets industry standards and regulatory requirements.

We can prepare your business for ISO 27001 external audits and SOC 2 Observatory Periods.

We also prepare businesses for compliance with the ASD Essential Eight.

ISO 27001 Certificate

ISO 27001

ISO 27001 has many requirements and two main audits to become certified: Stage 1 and Stage 2.

Our services help you pass both Stage 1 and 2.

After certification, surveillance audits must be undertaken annually to verify compliance is maintained.

We can also help you prepare for these surveillance audits.

Australian Signals Directorate

Essential Eight

Unlike ISO 27001 and SOC 2, Essential Eight does not require external audits to verify compliance.

Therefore, we can prepare you for Essential Eight compliance. After our preparations, we can perform an audit to ensure you are fully compliant.

SOC 2 Report Logo

SOC 2

SOC 2 has many requirements and requires the passing of a 90 day observatory period to attain certification.

Our services help you prepare for this observatory period and any necessary requirements.

bottom of page