Our services
We carefully designed the portfolio of services to address specific requirements of small and medium-size enterprises. To make it simpler for you, we pre-packed some of them into fix-price bundles.
Express assessments
Give you a quick snapshot of the situation and assess if immediate actions are needed
Express Compromise Assessment
Are you being hacked right now?
Cyber attacks involve stages and can take from two to six months to execute, so the sooner you detect an issue, the quicker you can safeguard your system.
Regular and timely compromise assessments will identify if you are currently under attack and save your business from significant losses.
Express Industrial Control Systems (ICS) security assessment
Industrial control system (ICS) networks allow no room for technical error. But typical security solutions, such as antivirus products, often prove irrelevant for industrial equipment. Our Express ICS security assessment is a way to test the waters and gradually follow through on a protection strategy.
Dark Web screening
Dark Web is commonly defined as a part of the Internet that can be accessed only with specific software such as Tor browser. Its users enjoy a high level of anonymity as devices are untraceable by the design of the underlying network protocol. For obvious reasons, Dark Web and its marketplaces magnetically attract cybercriminals from all over the world. They are buying and selling a wide spectrum of stolen data, enjoying namelessness and impunity.
Using a suite of proven services and techniques we scan the dark web and identify the early signs of cyber attacks to your network or reputation.
Network Vulnerability assessment
What is the network threats level for your systems and infrastructure segments? What are the security vulnerabilities and loopholes in your network? How critical are they? What should be done and with what degree of urgency?
These are the main questions we will answer during the Network Vulnerability assessment. In addition to the business-level structured summary, you will receive a full set of technical details and scan reports.
Deep inspections
Thorough review and analysis of your protection from different angles
Comprehensive Cybersecurity Audit
To address the concerns of small and medium enterprises, we propose a comprehensive cyber security audit. It is a bundle designed as a set of assessments that cover different types of security threats. The services are pre-configured for a typical business with up to 100 computers and can be further tailored to your business needs.
Home Office Cybersecurity setup
As homes increasingly became an extension of your business environment, it’s become just
as critical to address the potential security vulnerabilities that stem from working at home.
We work with business leaders, who typically work with sensitive business information, to
protect both their business and household from the devastating effects cybercrimes can have
on their emotional, financial and working life.
Cyber compliance
Ensure the compliance of your cybersecurity processes to the key standards
Preparation for ISO 27001
Working with big clients, it’s not enough to just claim you are secure; enterprises, global corporations and financial institutions want proof.
Our experienced consultants will guide you through the process and will help you to design a set of controls appropriate for your business. We will prepare your organisation for ISO 27001:2013 certification and ensure all the requirements of auditors are met.
APRA CPS234 consulting
Important: as of 1 July 2020 not only APRA-regulated entities but also any third parties who manage information of an APRA-regulated entity must also adhere to CPS 234.
Good news: we are here to help! Depending on the nature of your business, we will identify the relevant requirements. Then using CyberSafe Toolkit CPS234, we will assess your compliance and define a pragmatic roadmap for you.
Secure Software Development
Application security can make or break entire companies these days. So how can you better secure your product?
One of the most recognised approaches is the Secure Software Development Framework (SSDF) by NIST. We will help you to integrate it with your software development lifecycle.
Australian Essential 8
"Essential 8" are the most effective strategies to mitigate cyber security incidents developed by the Australian Cyber Security Centre (ACSC). We will help you to efficiently measure your maturity level for each mitigation strategy and develop a pragmatic action plan to improve your posture.
NSW Mandatory 25
If you are an NSW government agency or closely work with them, you have to report your assessment against "25 Mandatory Requirements for Cyber Security". We can help you to align your cyber security policies and procedures and ensure you adhere to the NSW Cyber Security Policy.
Monitoring
Your peace of mind with on-going monitoring services
Industrial Control Systems (ICS) security monitoring
Corporate environments focus on protecting confidential data; when it comes to industrial systems, where every minute of downtime or error counts, uninterrupted operations are the ultimate priority. This is what distinguishes industrial cybersecurity from other domains – and makes working with the right security vendor so important.
Fault-tolerant and non-disruptive ICS monitoring protects your industrial environments from existing and emerging threats, including highly targeted attacks.
Dark Web monitoring
Dark Web is commonly defined as a part of the Internet that can be accessed only with specific software such as Tor browser. Its users enjoy a high level of anonymity as devices are untraceable by the design of the underlying network protocol. For obvious reasons, Dark Web and its marketplaces magnetically attract cybercriminals from all over the world. They are buying and selling a wide spectrum of stolen data, enjoying namelessness and impunity.
Using a suite of proven services and techniques will permanently monitor the Dark Web and identify the early signs of cyber attacks to your network or reputation.