Cybersecurity made simple for all business sizes.

Don't see a plan that fits your business? Call us and we'll create one.

Solo

Perfect for sole traders & SOHO

$390/yr

billed monthly
Complete protection for
you and your business
  • Risk Assessment & Cybersecurity Setup Fee - $199
  • Laptop, Desktop & Smartphone Protection
  • Email & Web Security
  • Ransomware Protection
  • Cloud Login Security
  • Data Encryption (optional extra)
  • Identity Theft Alert (optional extra)
  • Credit Score Alert (optional extra)
  • 24/7 Monitoring & Control Centre
  • 24/7 Cyber Response Team
  • Ongoing Advice & Support
  • Add Ons

  • Business Backup - $199/yr
  • Online Cyber Training - $69/yr
  • Cyber Insurance - $525/yr

Team

Great for small teams

$1290/yr

billed monthly
Protection for your business
and up to 5 staff
  • Risk Assessment & Cybersecurity Setup Fee - $490
  • Laptop, Desktop & Smartphone Protection
  • Email & Web Security
  • Ransomware Protection
  • Cloud Login Security
  • Business Website Protection
  • Home & Business Wifi/Internet Security
  • G-Suite/Office 365 Security Setup & Admin
  • Data Encryption (optional extra)
  • Identity Theft Alert (optional extra)
  • Credit Score Alert (optional extra)
  • 24/7 Monitoring & Control Centre
  • 24/7 Cyber Response Team
  • Ongoing Advice & Support
  • Add Ons

  • Business Backup - $199/yr
  • Online Cyber Training - $69/yr
  • Cyber Insurance - $525/yr

Business

Everything small business needs

$2290/yr

billed monthly
Protection for your business
and up to 10 staff
  • Risk Assessment & Cybersecurity Setup Fee - $790
  • Laptop, Desktop & Smartphone Protection
  • Email & Web Security
  • Ransomware Protection
  • Cloud Login Security
  • Business Website Protection
  • Home & Business Wifi/Internet Security
  • G-Suite/Office 365 Security Setup & Admin
  • Asset Vulnerability Checks
  • Brand Protection
  • Cybersecurity Compliance
  • Data Encryption (optional extra)
  • Identity Theft Alert (optional extra)
  • Credit Score Alert (optional extra)
  • 24/7 Monitoring & Control Centre
  • 24/7 Cyber Response Team
  • Ongoing Advice & Support
  • Add Ons

  • Business Backup - $199/yr
  • Online Cyber Training - 199/yr
  • Cyber Insurance - $525/yr

*All prices AUD + GST.

Trusted By

We help protect small businesses from around the globe.
We work with clients from Australia, US, UK, Europe, and New Zealand.

Small Businesses

Financial Firms

Healthcare

Law Firms

We protect your business with the latest & best tech

Frequently Asked Questions

Yes, because 60% of small businesses go broke within 6 months of a major cyber-attack. Without cybersecurity protection your business can be impacted 7 ways: financial loss (fraud), business disruption (lost sales), data loss, reputation damage, post-breach costs, and customer lawsuits. Anti-virus software is not enough anymore.

In addition, data privacy laws now require you protect customer data or face govt fines up to $2.1M. And if you’re self-employed or a company director your personal assets can also be at risk. This means fines and lawsuits can shut down your business permanently even if the hackers don’t.

Our cybersecurity service keeps your business protected from hackers using the latest and best tech adapting as your business and the world around you changes. We provide ongoing advice based on your specific needs, industry compliance requirements and legal obligations. In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it.

Anti-virus software covers less than 20% of the cybersecurity protection your business needs. Things have changed (and so have data privacy laws) which means anti-virus software is not enough anymore. You are now legally obligated to protect your customer’s data.

In addition, your IT support are not experts in cybersecurity. It’s like asking your doctor about a tooth cavity, instead of your dentist. They know a little but are not experts. The reality is, cybersecurity is too complex and time-consuming nowadays for your average IT team.

Our technical team includes highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA which means your business is always provided the very best expert advice.

In fact, we regularly work with IT support teams to ensure cybersecurity protections integrate seamlessly with their existing IT infrastructure.

No problem. If the plans above don't fit your business or situation we can create a custom plan for you. Just call us to discuss your needs and we'll quote you from there.

The first step is a discovery call so we can fully understand your specific situation and complete a needs analysis. This takes around 15-30 minutes and is free of charge.

 

From there we'll confirm which cybersecurity plan suits you best, or create a custom plan if you have different needs. We'll send you a quote for the plan detailing all the specifics and total setup and monthly fees.

 

Once you're happy to proceed we'll contact your existing IT team (if you have one) to obtain access to your systems and start the risk assessment work and report build. Once completed and any issues identified, we'll commence the setup and configuration work on your network and systems.

 

If you'd like to get started today call us on 1300 646 527 or click the chatbot below to book a call time that suits.

The risk assessment work takes us around 1-3 days. We only need about 1hr of your time during this period to discuss your situation, gather requirements and confirm relevant systems information.

You'll receive a written cyber-risk report along with our advice specific to your needs. From there it takes around 1-2 days to setup all your cybersecurity. It's all fairly painless.

Our setup fee covers 2 stages of the process: firstly a risk assessment and advice report, then your cybersecurity setup.

 

The risk assessment and advice report stage involves our cybersecurity engineers completing an in-depth internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues. 

 

We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile. This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations. 

 

The cybersecurity setup stage involves adding the security protections, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly.

 

The cybersecurity setup finishes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in.

Yes. You can add or subtract from your plan as your needs change or your business grows.

No. The service is provided monthly and you can cancel your subscription anytime without penalty or exit fees.

Unfortunately not. Our business is built on privacy and security so disclosing our client list increases their cybersecurity risk and ours too. (We don't even disclose the location of our network operations centre in New York).

 

We're happy to verify all our cybersecurity qualifications on request and provide samples of our work (sanitised case studies, risk assessment reports & scans, etc).

 

We'll even provide a free basic scan of your business to uncover any existing security issues.

Great. We'd be happy to answer them during a free no obligation discovery call.

 

Simply call us on 1300 646 527 or click the chatbot below to book a call time that suits.

Ready to protect your business?

Cybersecurity Plan Details

Feature

Description

Every business is unique with different needs. Only an expert assessment can properly identify all the risks your specific business faces. In addition, cybersecurity tools are complex and require experienced engineers to determine the right protection levels based on your business needs, industry standards, and legal requirements.

This means self-diagnosis can be dangerous, and DIY cybersecurity most often fails. Security gaps are invisible to the untrained eye. Without an in-depth gap analysis you risk being blind-sided by hackers, govt fines, and data loss.

Our cybersecurity engineers will complete an internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues. We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile.

This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations.

Our cybersecurity engineers will setup your protection, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly.

The cybersecurity setup completes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in.
Protection of your work computers is the key to great cybersecurity. The risks in not securing them are high given the numerous ways hackers can infiltrate your business systems: viruses, worms, trojans, adware, spyware, keyloggers, rootkits, spear phishing, etc.

Our protection includes tools powered by machine learning that proactively stop zero-day attacks carried out through evasive exploits. This technology captures the latest exploits in real-time and mitigates memory corruption vulnerabilities that can evade other security solutions. It protects the most commonly used applications, such as browsers, Microsoft Office, Adobe Reader, and other popular applications. It watches over system processes and protects against security breaches and hijacking of existing processes.

In addition, hardware device controls help prevent sensitive data leakage and malware infections via external devices such as USB flash drives, Bluetooth devices, CD/DVD players, network storage devices, etc.
Your smartphone is as important as your laptop/desktop when it comes to protection. Many people access work email and files via their phones so it’s essentially another computer in your business.

This means it needs the same protection as your laptop/desktop, especially as lost and stolen phones are so common these days. An employee losing their phone in the back of a taxi is like losing a company laptop allowing access to your business systems and files.

Our protection tools cover management and compliance control of iPhones, iPads and Android devices and allows for bring-your-own-device (BYOD) workplaces yet still enforcing consistent usage policies across your business.

Security features include screen lock, authentication control, device location, remote wipe, detection of rooted or jailbroken devices and security profiles. On Android devices the security level is enhanced with real-time scanning and removable media encryption. As a result, mobile devices are properly controlled and your sensitive business information stored on them is protected.
Email and website usage presents one of the largest risks to your business. Staff visiting hacked websites and infecting all your systems. Opening infected emails and file attachments, and clicking on hacker email links. Passwords stolen via keyloggers allowing access to all your online accounts.

Our protection tools include content control which enforces company policies for approved websites, data protection and software application control. This helps prevent ransomware, impersonation and fraud attempts, using multiple security engines and behavioral technologies to analyze incoming and outgoing email content, URLs, or attachments.

This means every link you click on is first checked before taking you to the website. Fake emails can be reported to others in a single-click with our alert tool. Data you’re inputting into web forms is protected by SSL and HTTPS validation checks.
Ransomware kills businesses, it’s that dangerous. It can shut down your business for good. It’s when hackers encrypt all your computer files then demand a ransom fee (usually in Bitcoin) to decrypt them.

Even worse, if you don’t pay the ransom because you have backup files they’ll just upload all your data onto the internet for your customers, suppliers, competitors, and the govt authorities to see.

It’s why 60% of small businesses go broke within 6 months of a major cyber-attack like ransomware given the 7 ways it impacts them: disruption to trading, data loss, financial loss, reputation damage, post-breach costs, lawsuits, govt fines.

Our protection tools detect advanced attacks and suspicious activities in the pre-execution stage. Using machine learning models and stealth attack detection technology against threats such as: ransomware, custom malware, zero-day attacks, advanced persistent threats (APT), obfuscated malware, fileless attacks, credential stealing, targeted attacks, script-based attacks, exploits, hacking tools, suspicious network traffic, and potentially unwanted applications.
Passwords are a pain, yet poor password management provides hackers one of the easiest ways to access your business systems.

Staff typically use the same or similar passwords for all their logins, both personal and work. Often the passwords are very weak. This means when a website is hacked and their password stolen, all other websites they log into are now at risk.

Our cloud login security tools include password management options (1P, LP), 2-step authentication (2FA/SSO) setup and admin, and password policy enforcement of cloud logins (including laptop, desktop and phone passwords).

These tools greatly reduce the ability of your logins being hacked and increase the security level of all passwords in your business. In fact, Google data has shown 2-step authentication blocked 100% of automated attacks, 96% of bulk phishing attacks, and 76% of direct targeted attacks.
Your company website is your shop front on the internet. It’s a key digital asset in your business that needs protection. If your website is down your business is invisible on the internet.

Nowadays customers expect 24/7 access to your business website to find the information they need, place orders, make sales inquiries, or even just locate your contact details. A hacked website taken offline means lost sales and frustrated customers.

Our website protection tools include security and firewall plugins, uptime monitoring, and cloud based always-on distributed denial-of-service (DDoS) protection. Powered by the global network of our website technology partner currently protecting over 27 million websites. This network spans 200 cities, 194 data centres processing 1 billion IPs addresses every 24hrs, and operates within 100 milliseconds of 99% of the Internet-connected population.

This includes daily backups and uptime monitoring for your website so you’ll always know it’s working status, and be notified by email or SMS within 60 seconds of any issues arising.
The new-normal means many staff are now working from home, often using unsecured wifi/internet connections. If staff are working from a local cafe, friends house or travelling then security of their wifi is critical.

If your home wifi is hacked anyone nearby can see and access your company files. Friends visiting your staff at home also pose a risk when connecting to the same wifi your company is now using.

In addition, rogue access points (fake wifi) are commonly found near hotels, airports, shopping malls, cafes and any place where free wifi is offered.

Our internet and wifi protection tools mean you and your staff are protected whether working from home, the office and when travelling. Connections are constantly monitored to prevent access to rogue access points (fake wifi), only allowing approved wifi connections. Internet and wifi traffic streams are analysed for any malicious behavior and malware, in both directions, unlike traditional network security tools which generally scan inbound traffic only (via sandbox, firewalls, antivirus and so on).

In addition, if staff are connecting to the office from home (eg; to a remote server, or their office computer, etc) then a secure internet connection (Business VPN) is paramount. This optional protection tool creates a secure connection between your home and the office that greatly reduces the risk of security breaches and cyber-attacks.

The public internet is not highly secure or encrypted. Business VPN provides end-to-end encryption of all data passing through it and ensures safe and secure data sharing between staff. It provides a secured web connection to all company devices, no matter where staff connect to the internet, protecting them from fake wifi and hackers.
G-Suite and Office365 provide some great security tools however they’re complex and difficult to setup. In addition, managing the security settings for each user is a hassle and time consuming.

However with staff using personal phones for work you lose control over business email and file security. In addition, staff installing suspicious phone apps further increases the risk of your business being hacked.

Our cybersecurity service includes setup and management of your G-Suite/Office 365 security centre to save you time and hassles. Activating these tools provides your business added layers of protection such as better password security, login authentication (2FA/SSO), control of app connections, and enhanced fake/spam email scanning and suspicious web link detection.
Cybersecurity risks will change over time. As threats evolve your digital assets become exposed to new vulnerabilities (weak spots in your defence). This means new ways hackers can attack you and your business.

Some examples are: connecting a new printer to your network with poor security settings, staff connecting new phones to your business wifi, your web designer editing the company website making it less secure, staff installing unauthorised software, etc.

In addition, staff working from home with partners, children and visiting friends regularly connect to the same wifi your staff are using for work. This combined with new toys constantly added to their home wifi network (baby monitors, wifi cameras, games consoles, smart TVs, media players, ipads, etc) means a small army of security changes and potential threats to your business.

Our cybersecurity team regularly scans your external facing (public IP addresses) and internal digital assets checking for any changes or new security issues (such as devices trying to connect or scan ports). This includes insecure authentication, weak login credentials, critical software updates, hidden backdoors, etc.

This means your business stays protected whatever the operating environment or changes it presents. New assets, new babies or new friends are all managed with ease.
Hackers impersonating your business, website, and social media accounts to defraud your staff, customers, and suppliers can create long term brand damage and increases your risk of being hacked.

In addition, studies have found 65% of customers lose trust in a brand, and 80% of consumers stop buying a brand if their information is compromised. Most tell others about their bad experience, with one third sharing on social media.

Our brand protection service continually monitors threats to your brand across social media, mobile apps, websites, and other external sources. We monitor the surface web, deep web, and dark web for company mentions and keywords including all your staff email accounts.

These real-time alerts warn you of possible breaches not only in your business, but other businesses that may hold your data (suppliers, vendors, 3rd parties, etc) to help protect your brand from long term damage.
Data security and privacy is a legal requirement for most businesses nowadays. You are legally obligated to protect your customer’s information. In addition, reporting of data breaches to the govt and your customers is now compulsory as of 2014. Yet compliance is ever more complex and constantly changing with multiple laws, standards and regulations to understand: Privacy Act, NBD Scheme, AML/CTF Act, GDPR, APP, ISM, ASD8, NIST, PCI DSS, ISO27001, ISO31000, etc.

However the risks of non-compliance are high: govt fines up to $2.1M, customer lawsuits, higher insurance costs, reputation damage, and greater risk of your business being hacked. In addition, if you’re self-employed or a company director your personal assets can also be at risk.

Our cybersecurity compliance program provides your business with the advice you need to minimise these risks. We can create a custom NIST based cybersecurity plan (RTP, SoA, IRP) for your business with advice modelled on the ASD8 strategies recommended by the Australian government cybersecurity agencies (ACSC & ASD).

We help your business stay compliant with industry and legal requirements, now and in the future. We continuously track changes in data privacy laws, standards and regulations to keep you compliant and on the right side of customer expectations.

This includes compliance guidelines, procedures, templates, checklists and security policy advice combined with our one-page cybersecurity action plan that simplifies responding to cyber incidents. This makes getting and staying complaint easy and helps your business avoid the chaos and panic a cyber-attack can cause.
A stolen laptop or lost smartphone with unprotected data presents a serious risk to your business. If the data becomes public it can mean your suppliers, vendors and competitors having access to your sensitive business information.

In addition, the costs of losing unprotected data can be high: govt fines, reputation damage, customer lawsuits, lost trade secrets, etc. A lost device can be replaced, but not the data it holds.

Our encryption tools protect your laptop, desktop and smartphone data so when lost or stolen no one can access your sensitive business information.

This protection uses information about your computer (make, model, internal serial numbers, etc) matched with your hard drive to prevent data access by anyone but you. Your files are encrypted at rest (always encrypted) whenever you’re logged out of the computer.

This added security layer provides full disk encryption for both Windows and macOS computers, leveraging native technologies for optimum performance, and using central key management and recovery via the cloud.
Identity theft is stressful, time-consuming and costly. More than 1 in 5 Australians have been impacted by identity theft. Every 20 seconds an Australian has their identity stolen.

This means hackers using your name to commit fraud including: opening credit card accounts, applying for loans, renting or buying property, falsely claiming govt benefits, creating fake identity documents, etc.

In addition, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data.

Our identity theft alerts help protect your business and staff from the long term damage identity theft can cause. These alerts warn you whenever details of your identity are stolen by hackers and posted on the internet (eg; staff emails and passwords, company domain breaches, etc).

This means you can change staff passwords, restrict bank account access, place a temporary ban on your credit file to prevent fraud attempts, and most importantly prevent your identity suffering long term damage.
Damage to your credit score through fraud can prevent you being approved for credit cards or loans in the future. In addition, it can take months or even years to repair the damage done to your score.

Furthermore, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data.

Here’s an example: You’re holidaying in Bali, and the hotel photocopies your passport on checking in. They also have your credit card details from the online booking. Unfortunately their computers are hacked and your identify is now stolen (without you or them knowing). The thief uses this personal information to apply for a $10,000 holiday loan through an online lender. You only learn about this fraud months later when debt collectors start calling for repayments on the $10,000 debt now in your name.

Credit score alerts warn you if certain changes have been made to your credit file, eg; someone applying for a loan or credit card in your name. Over 20 million individual credit files across Australia and New Zealand are monitored by our credit technology partner.

These alerts can help protect you from financial fraud. Whenever your credit file is accessed, you’ll receive an alert email within 24hrs of the activity. This means you can contact the lender to stop any credit being issued, place a temporary ban on your file to prevent further fraud attempts, and most importantly prevent your credit score being damaged.

In addition, the alert service includes $15,000 of insurance cover for any identify theft. (Terms and conditions, exclusions and limitations apply > Identity Guard Insurance).

The service only costs $60/yr per person so it’s great value. (We’ve been using this service personally ourselves for over 10 years now protecting our business and family members so highly recommend it).
Do you know what’s happening on your systems day and night? Will you know if you’re business is attacked at 3am? What if your staff lose their phone in a taxi at 10pm on a Saturday night? Would you know if staff are connecting unauthorised devices to your systems or wifi?

Cybersecurity has little value if no one is actively monitoring your security.

We monitor the security of your digital assets from a secure control room 24/7, so you don’t have to. Our control centre staff can isolate and disconnect any user, device, or activity from your business systems the moment they pose a threat, even at 3am.

This real-time security monitoring means attacks on your business can be stopped early before they cause major damage. You’ll have peace of mind knowing someone is always watching over your business.

Our security operations centre (SOC) is staffed 24/7 by cybersecurity engineers with years of experience (many hold masters degrees in cybersecurity). The SOC provides real-time data and critical security event notifications, remediation services, unified threat management reporting and response, security policy tuning and advice, 24/7 on-call assistance and incident response, and security information and event management (SIEM) systems.
What happens if your business gets hacked? Who do you call, and what should you do next? Every minute is critical when you're systems are under attack.

If a laptop is stolen what should you do? If ransomware locks down your entire business who should you call first? If staff click on an infected email attachment what next? If client data leaks how should you respond?

Our cybersecurity response team provides 24/7 support whenever you need it. At the click of a button you can connect to support via phone, email, and live chat. The response team will contain and eradicate any threats, restore your systems to normal, and minimise the damage to your business.

Our response team includes highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA. Cybersecurity is not our work life, it's our life’s work.

This means you’ll always have someone to help you 24/7 with any cybersecurity event. You’ll have peace of mind knowing someone is always watching over your business.

In addition, our digital forensics team will complete a post-incident review to provide you a report on how and why the incident occurred, along with advice and recommendations to help prevent the situation repeating again in the future.
Change is constant in business. As your business grows and changes so will your cybersecurity needs. Changes outside your business mean evolving your cybersecurity is even more important: changing technology, changing hacker threats, changing govt laws and industry standards, and changing consumer expectations.

If your cybersecurity doesn’t change with the times you risk: being hacked more easily and more often, govt fines for non-compliance, customer lawsuits, lost sales and reputation damage from data breaches, and putting your personal assets at risk.

This makes ongoing cybersecurity advice and support critical to keeping your business protected long term.

Our cybersecurity engineers keep your protection updated using the latest and best tech adapting it as your business and the world around you evolves. We provide ongoing advice as your situation changes so you don’t fall behind and increase your risks. This includes monthly reports, quarterly check-ins and annual reviews.

In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it.
Around 91% of cyber-attacks begin with human involvement, which means your staff are the front line defence in protecting your business. If staff keep clicking on anything and everything your cybersecurity will continually fail.

Let’s be honest, most training is dead boring. Like visiting the dentist or doing your taxes. Cybersecurity training traditionally has been no different, boring lectures in tech-speak that puts you to sleep.

Our cybersecurity awareness program provides online training for your staff that’s different (ie; not boring). It starts with baseline testing on their email behaviour, continues with fun training (eg; interactive modules, videos, games, etc) and ends with re-testing them to check for improvements so you know it’s worked.

We have access to the world’s largest library of security awareness training through our cybersecurity education partner educating over 30,000 customers ensuring there’s lots of variety to suit your needs.

We provide you on-demand interactive and engaging training course online combined with unlimited social engineering attack simulations via email, phone and text.
Lost, deleted or hacked data can cause major headaches. Ransomware that kidnaps your files can shut down your business overnight. If you lose customer data you risk govt fines, reputation damage and potential lawsuits. Unfortunately no thinks about backup until it’s too late.

Good cybersecurity means having a robust backup strategy. It’s the key to recovering from a ransomware attack.

Our backup solutions can be simple or complex depending on your needs. We can customise a backup and disaster recovery plan to best suit your business demands. From simple cloud storage like G-Suite and One Drive to fully redundant Veeam managed 3:2:1 backup systems using on-premises NAS drives combined with offline AWS Glacier and offsite cold storage tapes.

This means you’re business and customer data is protected from being lost, deleted or hacked and can be recovered with ease to save you time, money and headaches.
Our experience shows the average cost for a small business to repair the damage caused by hackers is around $20,000. Most businesses cannot afford this upfront cost.

In addition, even larger costs you could face are: income losses from disruption of business operations, losses via fraud, customers suing you, govt fines, legal fees and compliance costs.

It’s why 60% of small businesses go broke within 6 months of a major cyber-attack.

This is where cyber insurance can help. It’s designed to protect small businesses with essential coverage against cyber threats and data breaches.

Typically cyber insurance covers the following: income losses from disruption of business operations, cost of data recovery, financial losses from cyber fraud, ransomware payments, legals costs, client law suit damages, govt fines, public relations expenses for minimising reputation and brand damage, etc.

Insurance cover of $250,000 can cost as little as $575/yr depending on your situation.

Note: This information is general in nature and does not take into account your personal objectives, financial situation or needs. You should seek financial advice from a licenced adviser and read the relevant product disclosure statement (PDS) before making any decisions.

Cybersecurity Plan Details

Feature & Description

Every business is unique with different needs. Only an expert assessment can properly identify all the risks your specific business faces. In addition, cybersecurity tools are complex and require experienced engineers to determine the right protection levels based on your business needs, industry standards, and legal requirements.

This means self-diagnosis can be dangerous, and DIY cybersecurity most often fails. Security gaps are invisible to the untrained eye. Without an in-depth gap analysis you risk being blind-sided by hackers, govt fines, and data loss.

Our cybersecurity engineers will complete an internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues. We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile.

This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations.

Our cybersecurity engineers will setup your protection, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly.

The cybersecurity setup completes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in.
Protection of your work computers is the key to great cybersecurity. The risks in not securing them are high given the numerous ways hackers can infiltrate your business systems: viruses, worms, trojans, adware, spyware, keyloggers, rootkits, spear phishing, etc.

Our protection includes tools powered by machine learning that proactively stop zero-day attacks carried out through evasive exploits. This technology captures the latest exploits in real-time and mitigates memory corruption vulnerabilities that can evade other security solutions. It protects the most commonly used applications, such as browsers, Microsoft Office, Adobe Reader, and other popular applications. It watches over system processes and protects against security breaches and hijacking of existing processes.

In addition, hardware device controls help prevent sensitive data leakage and malware infections via external devices such as USB flash drives, Bluetooth devices, CD/DVD players, network storage devices, etc.
Email and website usage presents one of the largest risks to your business. Staff visiting hacked websites and infecting all your systems. Opening infected emails and file attachments, and clicking on hacker email links. Passwords stolen via keyloggers allowing access to all your online accounts.

Our protection tools include content control which enforces company policies for approved websites, data protection and software application control. This helps prevent ransomware, impersonation and fraud attempts, using multiple security engines and behavioral technologies to analyze incoming and outgoing email content, URLs, or attachments.

This means every link you click on is first checked before taking you to the website. Fake emails can be reported to others in a single-click with our alert tool. Data you’re inputting into web forms is protected by SSL and HTTPS validation checks.
Ransomware kills businesses, it’s that dangerous. It can shut down your business for good. It’s when hackers encrypt all your computer files then demand a ransom fee (usually in Bitcoin) to decrypt them.

Even worse, if you don’t pay the ransom because you have backup files they’ll just upload all your data onto the internet for your customers, suppliers, competitors, and the govt authorities to see.

It’s why 60% of small businesses go broke within 6 months of a major cyber-attack like ransomware given the 7 ways it impacts them: disruption to trading, data loss, financial loss, reputation damage, post-breach costs, lawsuits, govt fines.

Our protection tools detect advanced attacks and suspicious activities in the pre-execution stage. Using machine learning models and stealth attack detection technology against threats such as: ransomware, custom malware, zero-day attacks, advanced persistent threats (APT), obfuscated malware, fileless attacks, credential stealing, targeted attacks, script-based attacks, exploits, hacking tools, suspicious network traffic, and potentially unwanted applications.
Passwords are a pain, yet poor password management provides hackers one of the easiest ways to access your business systems.

Staff typically use the same or similar passwords for all their logins, both personal and work. Often the passwords are very weak. This means when a website is hacked and their password stolen, all other websites they log into are now at risk.

Our cloud login security tools include password management options (1P, LP), 2-step authentication (2FA/SSO) setup and admin, and password policy enforcement of cloud logins (including laptop, desktop and phone passwords).

These tools greatly reduce the ability of your logins being hacked and increase the security level of all passwords in your business. In fact, Google data has shown 2-step authentication blocked 100% of automated attacks, 96% of bulk phishing attacks, and 76% of direct targeted attacks.
Your company website is your shop front on the internet. It’s a key digital asset in your business that needs protection. If your website is down your business is invisible on the internet.

Nowadays customers expect 24/7 access to your business website to find the information they need, place orders, make sales inquiries, or even just locate your contact details. A hacked website taken offline means lost sales and frustrated customers.

Our website protection tools include security and firewall plugins, uptime monitoring, and cloud based always-on distributed denial-of-service (DDoS) protection. Powered by the global network of our website technology partner currently protecting over 27 million websites. This network spans 200 cities, 194 data centres processing 1 billion IPs addresses every 24hrs, and operates within 100 milliseconds of 99% of the Internet-connected population.

This includes daily backups and uptime monitoring for your website so you’ll always know it’s working status, and be notified by email or SMS within 60 seconds of any issues arising.
The new-normal means many staff are now working from home, often using unsecured wifi/internet connections. If staff are working from a local cafe, friends house or travelling then security of their wifi is critical.

If your home wifi is hacked anyone nearby can see and access your company files. Friends visiting your staff at home also pose a risk when connecting to the same wifi your company is now using.

In addition, rogue access points (fake wifi) are commonly found near hotels, airports, shopping malls, cafes and any place where free wifi is offered.

Our internet and wifi protection tools mean you and your staff are protected whether working from home, the office and when travelling. Connections are constantly monitored to prevent access to rogue access points (fake wifi), only allowing approved wifi connections. Internet and wifi traffic streams are analysed for any malicious behavior and malware, in both directions, unlike traditional network security tools which generally scan inbound traffic only (via sandbox, firewalls, antivirus and so on).

In addition, if staff are connecting to the office from home (eg; to a remote server, or their office computer, etc) then a secure internet connection (Business VPN) is paramount. This optional protection tool creates a secure connection between your home and the office that greatly reduces the risk of security breaches and cyber-attacks.

The public internet is not highly secure or encrypted. Business VPN provides end-to-end encryption of all data passing through it and ensures safe and secure data sharing between staff. It provides a secured web connection to all company devices, no matter where staff connect to the internet, protecting them from fake wifi and hackers.
G-Suite and Office365 provide some great security tools however they’re complex and difficult to setup. In addition, managing the security settings for each user is a hassle and time consuming.

However with staff using personal phones for work you lose control over business email and file security. In addition, staff installing suspicious phone apps further increases the risk of your business being hacked.

Our cybersecurity service includes setup and management of your G-Suite/Office 365 security centre to save you time and hassles. Activating these tools provides your business added layers of protection such as better password security, login authentication (2FA/SSO), control of app connections, and enhanced fake/spam email scanning and suspicious web link detection.
Cybersecurity risks will change over time. As threats evolve your digital assets become exposed to new vulnerabilities (weak spots in your defence). This means new ways hackers can attack you and your business.

Some examples are: connecting a new printer to your network with poor security settings, staff connecting new phones to your business wifi, your web designer editing the company website making it less secure, staff installing unauthorised software, etc.

In addition, staff working from home with partners, children and visiting friends regularly connect to the same wifi your staff are using for work. This combined with new toys constantly added to their home wifi network (baby monitors, wifi cameras, games consoles, smart TVs, media players, ipads, etc) means a small army of security changes and potential threats to your business.

Our cybersecurity team regularly scans your external facing (public IP addresses) and internal digital assets checking for any changes or new security issues (such as devices trying to connect or scan ports). This includes insecure authentication, weak login credentials, critical software updates, hidden backdoors, etc.

This means your business stays protected whatever the operating environment or changes it presents. New assets, new babies or new friends are all managed with ease.
Hackers impersonating your business, website, and social media accounts to defraud your staff, customers, and suppliers can create long term brand damage and increases your risk of being hacked.

In addition, studies have found 65% of customers lose trust in a brand, and and 80% of consumers stop buying a brand if their information is compromised. Most tell others about their bad experience, with one third sharing on social media.

Our brand protection service continually monitors threats to your brand across social media, mobile apps, websites, and other external sources. We monitor the surface web, deep web, and dark web for company mentions and keywords including all your staff email accounts.

These real-time alerts warn you of possible breaches not only in your business, but other businesses that may hold your data (suppliers, vendors, 3rd parties, etc) to help protect your brand from long term damage.
Data security and privacy is a legal requirement for most businesses nowadays. You are legally obligated to protect your customer’s information. In addition, reporting of data breaches to the govt and your customers is now compulsory as of 2014. Yet compliance is ever more complex and constantly changing with multiple laws, standards and regulations to understand: Privacy Act, NBD Scheme, AML/CTF Act, GDPR, APP, ISM, ASD8, NIST, PCI DSS, ISO27001, ISO31000, etc.

However the risks of non-compliance are high: govt fines up to $2.1M, customer lawsuits, higher insurance costs, reputation damage, and greater risk of your business being hacked. In addition, if you’re self-employed or a company director your personal assets can also be at risk.

Our cybersecurity compliance program provides your business with the advice you need to minimise these risks. We can create a custom NIST based cybersecurity plan (RTP, SoA, IRP) for your business with advice modelled on the ASD8 strategies recommended by the Australian government cybersecurity agencies (ACSC & ASD).

We help your business stay compliant with industry and legal requirements, now and in the future. We continuously track changes in data privacy laws, standards and regulations to keep you compliant and on the right side of customer expectations.

This includes compliance guidelines, procedures, templates, checklists and security policy advice combined with our one-page cybersecurity action plan that simplifies responding to cyber incidents. This makes getting and staying complaint easy and helps your business avoid the chaos and panic a cyber-attack can cause.
A lost or stolen laptop, desktop or smart phone with unprotected data presents a serious risk to your business. If the data becomes public it can mean your suppliers, vendors and competitors having access to your sensitive business information.

In addition, the costs of losing unprotected data can be high: govt fines, reputation damage, customer lawsuits, lost trade secrets, etc. A lost device can be replaced, but not the data it holds.

Our encryption tools protect your laptop, desktop and smartphone data so when lost or stolen no one can access your sensitive business information.

This protection uses information about your computer (make, model, internal serial numbers, etc) matched with your hard drive to prevent data access by anyone but you. Your files are encrypted at rest (always encrypted) whenever you’re logged out of the computer.

This added security layer provides full disk encryption for both Windows and macOS computers, leveraging native technologies for optimum performance, and using central key management and recovery via the cloud.
Identity theft is stressful, time-consuming and costly. More than 1 in 5 Australians have been impacted by identity theft. Every 20 seconds an Australian has their identity stolen.

This means hackers using your name to commit fraud including: opening credit card accounts, applying for loans, renting or buying property, falsely claiming govt benefits, creating fake identity documents, etc.

In addition, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data.

Our identity theft alerts help protect your business and staff from the long term damage identity theft can cause. These alerts warn you whenever details of your identity are stolen by hackers and posted on the internet (eg; staff emails and passwords, company domain breaches, etc).

This means you can change staff passwords, restrict bank account access, place a temporary ban on your credit file to prevent fraud attempts, and most importantly prevent your identity suffering long term damage.
Damage to your credit score through fraud can prevent you being approved for credit cards or loans in the future. In addition, it can take months or even years to repair the damage done to your score.

Furthermore, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data.

Here’s an example: You’re holidaying in Bali, and the hotel photocopies your passport on checking in. They also have your credit card details from the online booking. Unfortunately their computers are hacked and your identify is now stolen (without you or them knowing). The thief uses this personal information to apply for a $10,000 holiday loan through an online lender. You only learn about this fraud months later when debt collectors start calling for repayments on the $10,000 debt now in your name.

Credit score alerts warn you if certain changes have been made to your credit file, eg; someone applying for a loan or credit card in your name. Over 20 million individual credit files across Australia and New Zealand are monitored by our credit technology partner.

These alerts can help protect you from financial fraud. Whenever your credit file is accessed, you’ll receive an alert email within 24hrs of the activity. This means you can contact the lender to stop any credit being issued, place a temporary ban on your file to prevent further fraud attempts, and most importantly prevent your credit score being damaged.

In addition, the alert service includes $15,000 of insurance cover for any identify theft. (Terms and conditions, exclusions and limitations apply > Identity Guard Insurance).

The service only costs $60/yr per person so it’s great value. (We’ve been using this service personally ourselves for over 10 years now protecting our business and family members so highly recommend it).
Do you know what’s happening on your systems day and night? Will you know if you’re business is attacked at 3am? What if your staff lose their phone in a taxi at 10pm on a Saturday night? Would you know if staff are connecting unauthorised devices to your systems or wifi?

Cybersecurity is little value if no one is actively monitoring the security.

We monitor the security of your digital assets from a secure control room 24/7, so you don’t have to. Our control centre staff can isolate and disconnect any user, device, or activity from your business systems the moment they pose a threat, even at 3am.

This real-time security monitoring means attacks on your business can be stopped early before they cause major damage. You’ll have peace of mind knowing someone is always watching over your business.

Our security operations centre (SOC) is staffed 24/7 by cybersecurity engineers with years of experience (many hold masters degrees in cybersecurity). The SOC provides real-time data and critical security event notifications, remediation services, unified threat management reporting and response, security policy tuning and advice, 24/7 on-call assistance and incident response, and security information and event management (SIEM) systems.
What happens if your business gets hacked? Who do you call, and what should you do next? Every minute is critical when you're systems are under attack.

If a laptop is stolen what should you do? If ransomware locks down your entire business who should you call first? If staff click on an infected email attachment what next? If client data leaks how should you respond?

Our cybersecurity response team provides 24/7 support whenever you need it. At the click of a button you can connect to support via phone, email, and live chat. The response team will contain and eradicate any threats, restore your systems to normal, and minimise the damage to your business.

Our response team comprises highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA. Cybersecurity is not our work life, it's our life’s work.

This means you’ll always have someone to help you 24/7 with any cybersecurity event. You’ll have peace of mind knowing someone is always watching over your business.

In addition, our digital forensics team will complete a post-incident review to provide you a report on how and why the incident occurred, along with advice and recommendations to help prevent the situation repeating again in the future.
Change is constant in business. As your business grows and changes so will your cybersecurity needs. Changes outside your business mean evolving your cybersecurity is even more important: changing technology, changing hacker threats, changing govt laws and industry standards, and changing consumer expectations.

If your cybersecurity doesn’t change with the times you risk: being hacked more easily and more often, govt fines for non-compliance, customer lawsuits, lost sales and reputation damage from data breaches, and putting your personal assets at risk.

This makes ongoing cybersecurity advice and support critical to keeping your business protected long term.

Our cybersecurity engineers keep your protection updated using the latest and best tech adapting it as your business and the world around you evolves. We provide ongoing advice as your situation changes so you don’t fall behind and increase your risks. This includes monthly reports, quarterly check-ins and annual reviews.

In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it.
Around 91% of cyber-attacks begin with human involvement, which means your staff are the front line defence in protecting your business. If staff keep clicking on anything and everything your cybersecurity will continually fail.

Let’s be honest, most training is dead boring. Like visiting the dentist or doing your taxes. Cybersecurity training traditionally has been no different, boring lectures in tech-speak that puts you to sleep.

Our cybersecurity awareness program provides online training for your staff that’s different (ie; not boring). It starts with baseline testing on their email behaviour, continues with fun training (eg; interactive modules, videos, games, etc) and ends with re-testing them to check for improvements so you know it’s worked.

We have access to the world’s largest library of security awareness training through our cybersecurity education partner educating over 30,000 customers ensuring there’s lots of variety to suit your needs.

We provide get on-demand interactive and engaging training course online combined with unlimited social engineering attack simulations via email, phone and text.
Lost, deleted or hacked data can cause major headaches. Ransomware that kidnaps your files can shut your business down overnight. If you lose customer data you risk govt fines, reputation damage and potential lawsuits. Unfortunately no thinks about backup until it’s too late.

Good cybersecurity means having a robust backup strategy. It’s the key to recovering from a ransomware attack.

Our backup solutions can be simple or complex depending on your needs. We can customise a backup and disaster recovery plan to best suit your business demands. From simple cloud storage like G-Suite and One Drive to fully redundant Veeam managed 3:2:1 backup systems using on-premises NAS drives combined with offline AWS Glacier and offsite cold storage tapes.

This means you’re business and customer data is protected from being lost, deleted or hacked and can be recovered with ease to save you time, money and headaches.
Our experience shows the average cost for a small business to repair the damage caused by hackers is around $20,000. Most businesses cannot afford this upfront cost.

In addition, even larger costs you could face are: income losses from disruption of business operations, losses via fraud, customers suing you, govt fines, legal fees and compliance costs.

It’s why 60% of small businesses go broke within 6 months of a major cyber-attack.

This is where cyber insurance can help. It’s designed to protect small businesses with essential coverage against cyber threats and data breaches.

Typically cyber insurance covers the following: income losses from disruption of business operations, cost of data recovery, financial losses from cyber fraud, ransomware payments, legals costs, client law suit damages, govt fines, public relations expenses for minimising reputation and brand damage, etc.

Insurance cover of $250,000 can cost as little as $575/yr depending on your situation.

Note: This information is general in nature and does not take into account your personal objectives, financial situation or needs. You should seek financial advice from a licenced adviser and read the relevant product disclosure statement (PDS) before making any decisions.

Ready to protect your business?

Talk with us today.
We help simplify cybersecurity for small business.
We'll save you time, money and stress in getting your business and data protected. All our advice is plain english and jargon free. We promise no cyber-tech speak. Contact us today.

Call us today on 1300 646 527

Website Contact Form
Scroll to Top