Solo
$19/mo
you and your business
-
Add Ons
-
Business Backup - $29/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Team
$29/mo
and up to 10 staff
-
Add Ons
-
Business Backup - $39/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Business
$39/mo
and more than 10 staff
-
Add Ons
-
Business Backup - $59/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Solo
$19/mo
you and your business
-
Risk Assessment & Cybersecurity
Setup Fee - $995 -
Laptop, Desktop & Smartphone Protection
-
Email & Web Security
-
Ransomware Protection
-
Cloud Login Security
-
Data Encryption (optional extra)
-
Identity Theft Alert (optional extra)
-
Credit Score Alert (optional extra)
-
24/7 Monitoring & Control Centre
-
24/7 Cyber Response Team
-
Ongoing Advice & Support
-
Add Ons
-
Business Backup - $29/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Team
$29/mo
and up to 10 staff
-
Risk Assessment & Cybersecurity
Setup Fee - $395 per person -
Laptop, Desktop & Smartphone Protection
-
Email & Web Security
-
Ransomware Protection
-
Cloud Login Security
-
Business Website Protection
-
Home & Business Wifi/Internet Security
-
G-Suite/Office 365 Security Setup & Admin
-
Data Encryption (optional extra)
-
Identity Theft Alert (optional extra)
-
Credit Score Alert (optional extra)
-
24/7 Monitoring & Control Centre
-
24/7 Cyber Response Team
-
Ongoing Advice & Support
-
Add Ons
-
Business Backup - $39/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Business
$39/mo
and more than 10 staff
-
Risk Assessment & Cybersecurity
Setup Fee - $295 per person -
Laptop, Desktop & Smartphone Protection
-
Email & Web Security
-
Ransomware Protection
-
Cloud Login Security
-
Business Website Protection
-
Home & Business Wifi/Internet Security
-
G-Suite/Office 365 Security Setup & Admin
-
Asset Vulnerability Checks
-
Brand Protection
-
Cybersecurity Compliance
-
Data Encryption (optional extra)
-
Identity Theft Alert (optional extra)
-
Credit Score Alert (optional extra)
-
24/7 Monitoring & Control Centre
-
24/7 Cyber Response Team
-
Ongoing Advice & Support
-
Add Ons
-
Business Backup - $59/mo
-
Online Cyber Training - $11/mo
-
Cyber Insurance - $POA
Trusted By
We work with clients from Australia, NZ, UK, Europe, and Singapore.
Mortgage Brokers
Financial Planners
Accountants
Insurance Brokers
Real Estate Agents
Property Managers
Award-Winning Cybersecurity
At the 2023 Australian Cybersecurity Awards we were short-listed from over 200 nominations nationally.
Nominated in 5 categories, finalists in 3 and overall winner of the Cyber Security Professional of the Year (Financial Services).
- Winner: Cybersecurity Professional of the Year (Financial Services)
- Finalist: Cybersecurity Excellence Award (Best of the Best)
- Finalist: Cybersecurity Consultant of the Year
Including category nominations for Cybersecurity Consulting Company of the Year, and Cybersecurity Professional of the Year (Professional Services).
Cybersecurity is not our work life, it's our life’s work.As Featured In
Client Reviews
It has always been a constant worry, given how clever criminals are becoming each day and it completely blew my mind when you showed us just how easily it would be for us to be hacked.
I love that you provide not only an outstanding service, but you also provide us with relevant updates and clearly explain the importance of Cyber Security.
I wish more people knew about Kaesim - I tell everyone I know now about the importance of keep their business safe, especially in the Mortgage Broking Industry. Keep up the awesome work and thank you for always being so readily available and responsive.
We lead a very privileged position working with our client's most valuable & personal data. With our biggest threat of disruption to business & to our clients' lives, being a cyber attack, knowing we have Kaesim in our corner is priceless.
They have implemented policies, programs and tools into our systems, that our previous IT provider never ever mentioned to me. Their care factor, quick response and proactive monitoring and testing is superb.
When speaking with fellow colleagues in my industry, I am consistently highly recommending Kaesim Security.
Thank you for your amazing customer service and advice and for enabling me to sleep at night 🙂
They have tailored solutions that suit perfectly with our needs and are constantly updating us with information and system requirements to best protect our business.
The team are very patient in answering all our questions. Explaining all the associated risks, how to mitigate against these threats and what systems to have in place in order to protect ourselves thoroughly.
With the team working with us and monitoring our business 24/07, we are able to have a peace of mind to work freely and focus on our core business.
I was given Kaesim’s details as I had no idea where to start. From the moment I spoke to them I felt confident that we would be protected. Kaesim are incredibly knowledgeable, professional and nothing has ever been too much trouble.
I couldn’t recommend them more highly, truly experts in their field.
The team are always there to help with prompt responses. Kaesim is a business genuinely committed to helping protect small businesses thrive knowing that their client's data are protected.
Not only do we have peace of mind that we are protected from attacks, we are also confident that we are supported by a very knowledgeable team.
Being regularly updated on industry standards, local attacks and all things cyber-security has been invaluable, particularly with the recent large-scale attacks across Optus and Medibank.
The team always go above and beyond to ensure the security of our business and our team.
Having a trusted partner in Kaesim who can provide their expertise and assistance allows us to focus on what we need to do to grow our business effectively. It also shows our clients that we care about them and their privacy and security, which is front of mind for more and more people given the media exposure and growing awareness of cyber security risks in the general population.
Thanks to Kaesim's excellent work, I feel confident in the security and integrity of my business's IT systems and client data. I am grateful for their professionalism, expertise, and dedication to ensuring the safety of their clients' assets.
I am one of thousands of small businesses that rely on Cybersecurity professionals to ensure that they are protected against threats that we know very little about until it is too late.
Being in financial services it is so important to protect ourselves and our customers, Kaesim makes that easy!
1) My clients have confidence in me that I am protecting their private information, they don't usually ask me if I have cyber security but I do deliberately convey this.
2) I also have confidence that I can continue in my everyday work without the worry that there will be a breach.
3) I can easily get in contact with the team to ask any questions or look for guidance if I think something is suspicious.
They also provide me the capability to employ staff directly overseas (saving on employment expense and opening the world up as a potential employment market).
I am able to consult with the team at Kaesim whenever issues arise, allowing me the opportunity to concentrate on my core business, finance. And they are a friendly and knowledgeable team.
I feel much safer knowing that Kaesim have systems and monitoring in place to minimise the effects of any breach of our IT systems.
I have no hesitation in recommending Kaesim Cybersecurity to any business needing to manage this significant area of risk.
The team at Kaesim have been excellent to deal with and I now have someone to turn to whenever I have cyber security related questions.
Ever since we've worked with them, we have felt peace of mind and assured that our customers, staff and business data is protected to the highest standards. Everyone at Kaesim is a pleasure to deal with and we are grateful to have them on our team!
They are very knowledgeable and skilled and always goes the extra mile to assist us particularly with setting up our office IT security including protecting our staff working overseas.
In addition to this they have helped advise some of our clients on how to deal with cyber attacks which is above and beyond our expectations. Kaesim’s communication and follow up care has been exceptional.
With the threat of cyber attacks increasing constantly and my finance business being heavily reliant on data security, this service is critical.
The team are extremely knowledgeable, professional and thorough with their advice and management of my business cyber security.
I can’t recommend them highly enough.
We protect your business with the latest & best tech
Frequently Asked Questions
Without cybersecurity protection your business can be impacted 7 ways: financial loss (fraud), business disruption (lost sales), data loss, reputation damage, post-breach costs, and customer lawsuits. Anti-virus software is not enough anymore.
In addition, data privacy laws now require you protect customer data or face govt fines up to $2.1M. And if you’re self-employed or a company director your personal assets can also be at risk. This means fines and lawsuits can shut down your business permanently even if the hackers don’t.
Our cybersecurity service keeps your business protected from hackers using the latest and best tech adapting as your business and the world around you changes. We provide ongoing advice based on your specific needs, industry compliance requirements and legal obligations.
In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it.
In addition, your IT support are not experts in cybersecurity. It’s like asking your doctor about a tooth cavity, instead of your dentist. They know a little but are not experts. The reality is, cybersecurity is too complex and time-consuming nowadays for your average IT team.
Our technical team includes highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA which means your business is always provided the very best expert advice.
In fact, we regularly work with IT support teams to ensure cybersecurity protections integrate seamlessly with their existing IT infrastructure.
From there we'll confirm which cybersecurity plan suits you best, or create a custom plan if you have different needs. We'll send you a quote for the plan detailing all the specifics and total setup and monthly fees.
Once you're happy to proceed we'll contact your existing IT team (if you have one) to obtain access to your systems and start the risk assessment work and report build. Once completed and any issues identified, we'll commence the setup and configuration work on your network and systems.
If you'd like to get started today call us on 1300 523 746 or click the chatbot below to book a call time that suits.
You'll receive a written cyber-risk report along with our advice specific to your needs. From there it takes around 1-2 days to setup all your cybersecurity. It's all fairly painless.
Our setup fee covers 2 stages of the process: firstly a risk assessment and advice report, then your cybersecurity setup.
The risk assessment and advice report stage involves our cybersecurity engineers completing an in-depth internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues.
We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile. This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations.
The cybersecurity setup stage involves adding the security protections, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly.
The cybersecurity setup finishes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in.
No. The service is provided monthly and you can cancel your subscription anytime without penalty or exit fees.
In addition, we sign non-disclosure and confidentiality agreements with all clients.
We're happy to verify all our cybersecurity qualifications on request and provide samples of our work (sanitised case studies, risk assessment reports & scans, etc).
We'll even provide a free basic scan of your business to uncover any existing security issues.
Great. We'd be happy to answer them during a free no obligation discovery call.
Simply call us on 1300 523 746 or click the chatbot below to book a call time that suits.
Ready to protect your business?
Cybersecurity Plan Details
Feature |
Description |
---|---|
Risk Assessment & Cybersecurity Setup |
Every business is unique with different needs. Only an expert assessment can properly identify all the risks your specific business faces. In addition, cybersecurity tools are complex and require experienced engineers to determine the right protection levels based on your business needs, industry standards, and legal requirements.
This means self-diagnosis can be dangerous, and DIY cybersecurity most often fails. Security gaps are invisible to the untrained eye. Without an in-depth gap analysis you risk being blind-sided by hackers, govt fines, and data loss. Our cybersecurity engineers will complete an internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues. We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile. This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations. Our cybersecurity engineers will setup your protection, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly. The cybersecurity setup completes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in. |
Laptop, Desktop & Server Protection |
Protection of your work computers is the key to great cybersecurity. The risks in not securing them are high given the numerous ways hackers can infiltrate your business systems: viruses, worms, trojans, adware, spyware, keyloggers, rootkits, spear phishing, etc.
Our protection includes tools powered by machine learning that proactively stop zero-day attacks carried out through evasive exploits. This technology captures the latest exploits in real-time and mitigates memory corruption vulnerabilities that can evade other security solutions. It protects the most commonly used applications, such as browsers, Microsoft Office, Adobe Reader, and other popular applications. It watches over system processes and protects against security breaches and hijacking of existing processes. In addition, hardware device controls help prevent sensitive data leakage and malware infections via external devices such as USB flash drives, Bluetooth devices, CD/DVD players, network storage devices, etc. |
Smartphone Protection |
Your smartphone is as important as your laptop/desktop when it comes to protection. Many people access work email and files via their phones so it’s essentially another computer in your business.
This means it needs the same protection as your laptop/desktop, especially as lost and stolen phones are so common these days. An employee losing their phone in the back of a taxi is like losing a company laptop allowing access to your business systems and files. Our protection tools cover management and compliance control of iPhones, iPads and Android devices and allows for bring-your-own-device (BYOD) workplaces yet still enforcing consistent usage policies across your business. Security features include screen lock, authentication control, device location, remote wipe, detection of rooted or jailbroken devices and security profiles. On Android devices the security level is enhanced with real-time scanning and removable media encryption. As a result, mobile devices are properly controlled and your sensitive business information stored on them is protected. |
Email & Web Security |
Email and website usage presents one of the largest risks to your business. Staff visiting hacked websites and infecting all your systems. Opening infected emails and file attachments, and clicking on hacker email links. Passwords stolen via keyloggers allowing access to all your online accounts.
Our protection tools include content control which enforces company policies for approved websites, data protection and software application control. This helps prevent ransomware, impersonation and fraud attempts, using multiple security engines and behavioral technologies to analyze incoming and outgoing email content, URLs, or attachments. This means every link you click on is first checked before taking you to the website. Fake emails can be reported to others in a single-click with our alert tool. Data you’re inputting into web forms is protected by SSL and HTTPS validation checks. |
Ransomware Protection |
Ransomware kills businesses, it’s that dangerous. It can shut down your business for good. It’s when hackers encrypt all your computer files then demand a ransom fee (usually in Bitcoin) to decrypt them.
Even worse, if you don’t pay the ransom because you have backup files they’ll just upload all your data onto the internet for your customers, suppliers, competitors, and the govt authorities to see. It’s why 60% of small businesses go broke within 6 months of a major cyber-attack like ransomware given the 7 ways it impacts them: disruption to trading, data loss, financial loss, reputation damage, post-breach costs, lawsuits, govt fines. Our protection tools detect advanced attacks and suspicious activities in the pre-execution stage. Using machine learning models and stealth attack detection technology against threats such as: ransomware, custom malware, zero-day attacks, advanced persistent threats (APT), obfuscated malware, fileless attacks, credential stealing, targeted attacks, script-based attacks, exploits, hacking tools, suspicious network traffic, and potentially unwanted applications. |
Cloud Login Security |
Passwords are a pain, yet poor password management provides hackers one of the easiest ways to access your business systems.
Staff typically use the same or similar passwords for all their logins, both personal and work. Often the passwords are very weak. This means when a website is hacked and their password stolen, all other websites they log into are now at risk. Our cloud login security tools include password management options (1P, LP), 2-step authentication (2FA/SSO) setup and admin, and password policy enforcement of cloud logins (including laptop, desktop and phone passwords). These tools greatly reduce the ability of your logins being hacked and increase the security level of all passwords in your business. In fact, Google data has shown 2-step authentication blocked 100% of automated attacks, 96% of bulk phishing attacks, and 76% of direct targeted attacks. |
Business Website Protection |
Your company website is your shop front on the internet. It’s a key digital asset in your business that needs protection. If your website is down your business is invisible on the internet.
Nowadays customers expect 24/7 access to your business website to find the information they need, place orders, make sales inquiries, or even just locate your contact details. A hacked website taken offline means lost sales and frustrated customers. Our website protection tools include security and firewall plugins, uptime monitoring, and cloud based always-on distributed denial-of-service (DDoS) protection. Powered by the global network of our website technology partner currently protecting over 27 million websites. This network spans 200 cities, 194 data centres processing 1 billion IPs addresses every 24hrs, and operates within 100 milliseconds of 99% of the Internet-connected population. This includes daily backups and uptime monitoring for your website so you’ll always know it’s working status, and be notified by email or SMS within 60 seconds of any issues arising. |
Home & Business Wifi/Internet Security |
The new-normal means many staff are now working from home, often using unsecured wifi/internet connections. If staff are working from a local cafe, friends house or travelling then security of their wifi is critical.
If your home wifi is hacked anyone nearby can see and access your company files. Friends visiting your staff at home also pose a risk when connecting to the same wifi your company is now using. In addition, rogue access points (fake wifi) are commonly found near hotels, airports, shopping malls, cafes and any place where free wifi is offered. Our internet and wifi protection tools mean you and your staff are protected whether working from home, the office and when travelling. Connections are constantly monitored to prevent access to rogue access points (fake wifi), only allowing approved wifi connections. Internet and wifi traffic streams are analysed for any malicious behavior and malware, in both directions, unlike traditional network security tools which generally scan inbound traffic only (via sandbox, firewalls, antivirus and so on). In addition, if staff are connecting to the office from home (eg; to a remote server, or their office computer, etc) then a secure internet connection (Business VPN) is paramount. This optional protection tool creates a secure connection between your home and the office that greatly reduces the risk of security breaches and cyber-attacks. The public internet is not highly secure or encrypted. Business VPN provides end-to-end encryption of all data passing through it and ensures safe and secure data sharing between staff. It provides a secured web connection to all company devices, no matter where staff connect to the internet, protecting them from fake wifi and hackers. |
Google Workspace/Office 365 Security Setup & Admin |
Google Workspace and Office365 provide some great security tools however they’re complex and difficult to setup. In addition, managing the security settings for each user is a hassle and time consuming.
However with staff using personal phones for work you lose control over business email and file security. In addition, staff installing suspicious phone apps further increases the risk of your business being hacked. Our cybersecurity service includes setup and management of your Google Workspace/Office 365 security centre to save you time and hassles. Activating these tools provides your business added layers of protection such as better password security, login authentication (2FA/SSO), control of app connections, and enhanced fake/spam email scanning and suspicious web link detection. |
Asset Vulnerability Checks |
Cybersecurity risks will change over time. As threats evolve your digital assets become exposed to new vulnerabilities (weak spots in your defence). This means new ways hackers can attack you and your business.
Some examples are: connecting a new printer to your network with poor security settings, staff connecting new phones to your business wifi, your web designer editing the company website making it less secure, staff installing unauthorised software, etc. In addition, staff working from home with partners, children and visiting friends regularly connect to the same wifi your staff are using for work. This combined with new toys constantly added to their home wifi network (baby monitors, wifi cameras, games consoles, smart TVs, media players, ipads, etc) means a small army of security changes and potential threats to your business. Our cybersecurity team regularly scans your external facing (public IP addresses) and internal digital assets checking for any changes or new security issues (such as devices trying to connect or scan ports). This includes insecure authentication, weak login credentials, critical software updates, hidden backdoors, etc. This means your business stays protected whatever the operating environment or changes it presents. New assets, new babies or new friends are all managed with ease. |
Brand Protection |
Hackers impersonating your business, website, and social media accounts to defraud your staff, customers, and suppliers can create long term brand damage and increases your risk of being hacked.
In addition, studies have found 65% of customers lose trust in a brand, and 80% of consumers stop buying a brand if their information is compromised. Most tell others about their bad experience, with one third sharing on social media. Our brand protection service continually monitors threats to your brand across social media, mobile apps, websites, and other external sources. We monitor the surface web, deep web, and dark web for company mentions and keywords including all your staff email accounts. These real-time alerts warn you of possible breaches not only in your business, but other businesses that may hold your data (suppliers, vendors, 3rd parties, etc) to help protect your brand from long term damage. |
Cybersecurity Compliance |
Data security and privacy is a legal requirement for most businesses nowadays. You are legally obligated to protect your customer’s information. In addition, reporting of data breaches to the govt and your customers is now compulsory as of 2014. Yet compliance is ever more complex and constantly changing with multiple laws, standards and regulations to understand: Privacy Act, NBD Scheme, AML/CTF Act, GDPR, APP, ISM, ASD8, NIST, PCI DSS, ISO27001, ISO31000, VPDSS, PSPF, PDP, etc.
However the risks of non-compliance are high: govt fines up to $2.1M, customer lawsuits, higher insurance costs, reputation damage, and greater risk of your business being hacked. In addition, if you’re self-employed or a company director your personal assets can also be at risk. Our cybersecurity compliance program provides your business with the advice you need to minimise these risks. We can create a custom NIST based cybersecurity plan (RTP, SoA, IRP) for your business with advice modelled on the ASD8 strategies recommended by the Australian government cybersecurity agencies (ACSC & ASD). We help your business stay compliant with industry and legal requirements, now and in the future. We continuously track changes in data privacy laws, standards and regulations to keep you compliant and on the right side of customer expectations. This includes compliance guidelines, procedures, templates, checklists and security policy advice combined with our one-page cybersecurity action plan that simplifies responding to cyber incidents. This makes getting and staying complaint easy and helps your business avoid the chaos and panic a cyber-attack can cause. |
Data Encryption |
A stolen laptop or lost smartphone with unprotected data presents a serious risk to your business. If the data becomes public it can mean your suppliers, vendors and competitors having access to your sensitive business information.
In addition, the costs of losing unprotected data can be high: govt fines, reputation damage, customer lawsuits, lost trade secrets, etc. A lost device can be replaced, but not the data it holds. Our encryption tools protect your laptop, desktop and smartphone data so when lost or stolen no one can access your sensitive business information. This protection uses information about your computer (make, model, internal serial numbers, etc) matched with your hard drive to prevent data access by anyone but you. Your files are encrypted at rest (always encrypted) whenever you’re logged out of the computer. This added security layer provides full disk encryption for both Windows and macOS computers, leveraging native technologies for optimum performance, and using central key management and recovery via the cloud. |
Identity Theft Alerts |
Identity theft is stressful, time-consuming and costly. More than 1 in 5 Australians have been impacted by identity theft. Every 20 seconds an Australian has their identity stolen.
This means hackers using your name to commit fraud including: opening credit card accounts, applying for loans, renting or buying property, falsely claiming govt benefits, creating fake identity documents, etc. In addition, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data. Our identity theft alerts help protect your business and staff from the long term damage identity theft can cause. These alerts warn you whenever details of your identity are stolen by hackers and posted on the internet (eg; staff emails and passwords, company domain breaches, etc). This means you can change staff passwords, restrict bank account access, place a temporary ban on your credit file to prevent fraud attempts, and most importantly prevent your identity suffering long term damage. |
Credit Score Alerts |
Damage to your credit score through fraud can prevent you being approved for credit cards or loans in the future. In addition, it can take months or even years to repair the damage done to your score.
Furthermore, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data. Here’s an example: You’re holidaying in Bali, and the hotel photocopies your passport on checking in. They also have your credit card details from the online booking. Unfortunately their computers are hacked and your identify is now stolen (without you or them knowing). The thief uses this personal information to apply for a $10,000 holiday loan through an online lender. You only learn about this fraud months later when debt collectors start calling for repayments on the $10,000 debt now in your name. Credit score alerts warn you if certain changes have been made to your credit file, eg; someone applying for a loan or credit card in your name. Over 20 million individual credit files across Australia and New Zealand are monitored by our credit technology partner. These alerts can help protect you from financial fraud. Whenever your credit file is accessed, you’ll receive an alert email within 24hrs of the activity. This means you can contact the lender to stop any credit being issued, place a temporary ban on your file to prevent further fraud attempts, and most importantly prevent your credit score being damaged. In addition, the alert service includes $15,000 of insurance cover for any identify theft. (Terms and conditions, exclusions and limitations apply > Identity Guard Insurance). The service only costs $60/yr per person so it’s great value. (We’ve been using this service personally ourselves for over 10 years now protecting our business and family members so highly recommend it). |
24/7 Monitoring & Control Centre |
Do you know what’s happening on your systems day and night? Will you know if you’re business is attacked at 3am? What if your staff lose their phone in a taxi at 10pm on a Saturday night? Would you know if staff are connecting unauthorised devices to your systems or wifi?
Cybersecurity has little value if no one is actively monitoring your security. We monitor the security of your digital assets from a secure control room 24/7, so you don’t have to. Our control centre staff can isolate and disconnect any user, device, or activity from your business systems the moment they pose a threat, even at 3am. This real-time security monitoring means attacks on your business can be stopped early before they cause major damage. You’ll have peace of mind knowing someone is always watching over your business. Our security operations centre (SOC) is staffed 24/7 by cybersecurity engineers with years of experience (many hold masters degrees in cybersecurity). The SOC provides real-time data and critical security event notifications, remediation services, unified threat management reporting and response, security policy tuning and advice, 24/7 on-call assistance and incident response, and security information and event management (SIEM) systems. |
24/7 Cyber Response Team |
What happens if your business gets hacked? Who do you call, and what should you do next? Every minute is critical when you're systems are under attack.
If a laptop is stolen what should you do? If ransomware locks down your entire business who should you call first? If staff click on an infected email attachment what next? If client data leaks how should you respond? Our cybersecurity response team provides 24/7 support whenever you need it. At the click of a button you can connect to support via phone, email, and live chat. The response team will contain and eradicate any threats, restore your systems to normal, and minimise the damage to your business. Our response team includes highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA. Cybersecurity is not our work life, it's our life’s work. This means you’ll always have someone to help you 24/7 with any cybersecurity event. You’ll have peace of mind knowing someone is always watching over your business. In addition, our digital forensics team will complete a post-incident review to provide you a report on how and why the incident occurred, along with advice and recommendations to help prevent the situation repeating again in the future. |
Ongoing Advice & Support |
Change is constant in business. As your business grows and changes so will your cybersecurity needs. Changes outside your business mean evolving your cybersecurity is even more important: changing technology, changing hacker threats, changing govt laws and industry standards, and changing consumer expectations.
If your cybersecurity doesn’t change with the times you risk: being hacked more easily and more often, govt fines for non-compliance, customer lawsuits, lost sales and reputation damage from data breaches, and putting your personal assets at risk. This makes ongoing cybersecurity advice and support critical to keeping your business protected long term. Our cybersecurity engineers keep your protection updated using the latest and best tech adapting it as your business and the world around you evolves. We provide ongoing advice as your situation changes so you don’t fall behind and increase your risks. This includes monthly reports, quarterly check-ins and annual reviews. In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it. |
Online Cyber Training |
Around 91% of cyber-attacks begin with human involvement, which means your staff are the front line defence in protecting your business. If staff keep clicking on anything and everything your cybersecurity will continually fail.
Let’s be honest, most training is dead boring. Like visiting the dentist or doing your taxes. Cybersecurity training traditionally has been no different, boring lectures in tech-speak that puts you to sleep. Our cybersecurity awareness program provides online training for your staff that’s different (ie; not boring). It starts with baseline testing on their email behaviour, continues with fun training (eg; interactive modules, videos, games, etc) and ends with re-testing them to check for improvements so you know it’s worked. We have access to the world’s largest library of security awareness training through our cybersecurity education partner educating over 30,000 customers ensuring there’s lots of variety to suit your needs. We provide on-demand interactive and engaging online training courses combined with unlimited social engineering attack simulations via email, phone and text. |
Business Backup |
Lost, deleted or hacked data can cause major headaches. Ransomware that kidnaps your files can shut down your business overnight. If you lose customer data you risk government fines, reputation damage and potential lawsuits. Unfortunately nobody thinks about backup until it’s too late.
Good cybersecurity means having a robust backup strategy. It’s the key to recovering from a ransomware attack. Our backup solutions can be simple or complex depending on your needs. We can customise a backup and disaster recovery plan to best suit your business demands. From simple cloud storage like Google and One Drive to fully redundant Veeam managed 3:2:1 backup systems using on-premises NAS drives combined with offline AWS Glacier and offsite cold storage tapes. This means you’re business and customer data is protected from being lost, deleted or hacked and can be recovered with ease to save you time, money and headaches. |
Cyber Insurance |
Our experience shows the average cost for a business to repair the damage caused by hackers is around $20,000. Most businesses cannot afford this upfront cost.
In addition, even larger costs you could face are: income losses from disruption of business operations, losses via fraud, customers suing you, govt fines, legal fees and compliance costs. It’s why 60% of small businesses go broke within 6 months of a major cyber-attack. This is where cyber insurance can help. It’s designed to protect businesses with essential coverage against cyber threats and data breaches. Typically cyber insurance covers the following: income losses from disruption of business operations, cost of data recovery, financial losses from cyber fraud, ransomware payments, legals costs, client law suit damages, govt fines, public relations expenses for minimising reputation and brand damage, etc. Insurance cover of $250,000 can cost as little as $575/yr depending on your situation. Note: This information is general in nature and does not take into account your personal objectives, financial situation or needs. You should seek financial advice from a licenced adviser and read the relevant product disclosure statement (PDS) before making any decisions. |
Cybersecurity Plan Details
Feature & Description |
---|
Risk Assessment & Cybersecurity SetupEvery business is unique with different needs. Only an expert assessment can properly identify all the risks your specific business faces. In addition, cybersecurity tools are complex and require experienced engineers to determine the right protection levels based on your business needs, industry standards, and legal requirements.This means self-diagnosis can be dangerous, and DIY cybersecurity most often fails. Security gaps are invisible to the untrained eye. Without an in-depth gap analysis you risk being blind-sided by hackers, govt fines, and data loss. Our cybersecurity engineers will complete an internal and external vulnerability scan of your entire network and digital assets to identify any existing threats and security issues. We provide you a written report of the risk assessment and gap analysis to determine your cyber-risk profile. This report includes customised advice and recommendations based on your specific needs, industry compliance requirements and legal obligations. Our cybersecurity engineers will setup your protection, including removing any existing threats and plugging security gaps, working directly with you and your staff individually to ensure the security settings fit snugly. The cybersecurity setup completes with our engineers testing and checking your protection is in place and fully operational, including ironing out any wrinkles ensuring all staff are settled in. |
Laptop, Desktop & Smartphone ProtectionProtection of your work computers is the key to great cybersecurity. The risks in not securing them are high given the numerous ways hackers can infiltrate your business systems: viruses, worms, trojans, adware, spyware, keyloggers, rootkits, spear phishing, etc.Our protection includes tools powered by machine learning that proactively stop zero-day attacks carried out through evasive exploits. This technology captures the latest exploits in real-time and mitigates memory corruption vulnerabilities that can evade other security solutions. It protects the most commonly used applications, such as browsers, Microsoft Office, Adobe Reader, and other popular applications. It watches over system processes and protects against security breaches and hijacking of existing processes. In addition, hardware device controls help prevent sensitive data leakage and malware infections via external devices such as USB flash drives, Bluetooth devices, CD/DVD players, network storage devices, etc. |
Email & Web SecurityEmail and website usage presents one of the largest risks to your business. Staff visiting hacked websites and infecting all your systems. Opening infected emails and file attachments, and clicking on hacker email links. Passwords stolen via keyloggers allowing access to all your online accounts.Our protection tools include content control which enforces company policies for approved websites, data protection and software application control. This helps prevent ransomware, impersonation and fraud attempts, using multiple security engines and behavioral technologies to analyze incoming and outgoing email content, URLs, or attachments. This means every link you click on is first checked before taking you to the website. Fake emails can be reported to others in a single-click with our alert tool. Data you’re inputting into web forms is protected by SSL and HTTPS validation checks. |
Ransomware ProtectionRansomware kills businesses, it’s that dangerous. It can shut down your business for good. It’s when hackers encrypt all your computer files then demand a ransom fee (usually in Bitcoin) to decrypt them.Even worse, if you don’t pay the ransom because you have backup files they’ll just upload all your data onto the internet for your customers, suppliers, competitors, and the govt authorities to see. It’s why 60% of small businesses go broke within 6 months of a major cyber-attack like ransomware given the 7 ways it impacts them: disruption to trading, data loss, financial loss, reputation damage, post-breach costs, lawsuits, govt fines. Our protection tools detect advanced attacks and suspicious activities in the pre-execution stage. Using machine learning models and stealth attack detection technology against threats such as: ransomware, custom malware, zero-day attacks, advanced persistent threats (APT), obfuscated malware, fileless attacks, credential stealing, targeted attacks, script-based attacks, exploits, hacking tools, suspicious network traffic, and potentially unwanted applications. |
Cloud Login SecurityPasswords are a pain, yet poor password management provides hackers one of the easiest ways to access your business systems.Staff typically use the same or similar passwords for all their logins, both personal and work. Often the passwords are very weak. This means when a website is hacked and their password stolen, all other websites they log into are now at risk. Our cloud login security tools include password management options (1P, LP), 2-step authentication (2FA/SSO) setup and admin, and password policy enforcement of cloud logins (including laptop, desktop and phone passwords). These tools greatly reduce the ability of your logins being hacked and increase the security level of all passwords in your business. In fact, Google data has shown 2-step authentication blocked 100% of automated attacks, 96% of bulk phishing attacks, and 76% of direct targeted attacks. |
Business Website ProtectionYour company website is your shop front on the internet. It’s a key digital asset in your business that needs protection. If your website is down your business is invisible on the internet.Nowadays customers expect 24/7 access to your business website to find the information they need, place orders, make sales inquiries, or even just locate your contact details. A hacked website taken offline means lost sales and frustrated customers. Our website protection tools include security and firewall plugins, uptime monitoring, and cloud based always-on distributed denial-of-service (DDoS) protection. Powered by the global network of our website technology partner currently protecting over 27 million websites. This network spans 200 cities, 194 data centres processing 1 billion IPs addresses every 24hrs, and operates within 100 milliseconds of 99% of the Internet-connected population. This includes daily backups and uptime monitoring for your website so you’ll always know it’s working status, and be notified by email or SMS within 60 seconds of any issues arising. |
Home & Business Wifi/Internet SecurityThe new-normal means many staff are now working from home, often using unsecured wifi/internet connections. If staff are working from a local cafe, friends house or travelling then security of their wifi is critical.If your home wifi is hacked anyone nearby can see and access your company files. Friends visiting your staff at home also pose a risk when connecting to the same wifi your company is now using. In addition, rogue access points (fake wifi) are commonly found near hotels, airports, shopping malls, cafes and any place where free wifi is offered. Our internet and wifi protection tools mean you and your staff are protected whether working from home, the office and when travelling. Connections are constantly monitored to prevent access to rogue access points (fake wifi), only allowing approved wifi connections. Internet and wifi traffic streams are analysed for any malicious behavior and malware, in both directions, unlike traditional network security tools which generally scan inbound traffic only (via sandbox, firewalls, antivirus and so on). In addition, if staff are connecting to the office from home (eg; to a remote server, or their office computer, etc) then a secure internet connection (Business VPN) is paramount. This optional protection tool creates a secure connection between your home and the office that greatly reduces the risk of security breaches and cyber-attacks. The public internet is not highly secure or encrypted. Business VPN provides end-to-end encryption of all data passing through it and ensures safe and secure data sharing between staff. It provides a secured web connection to all company devices, no matter where staff connect to the internet, protecting them from fake wifi and hackers. |
G-Suite/Office 365 Security Setup & AdminG-Suite and Office365 provide some great security tools however they’re complex and difficult to setup. In addition, managing the security settings for each user is a hassle and time consuming.However with staff using personal phones for work you lose control over business email and file security. In addition, staff installing suspicious phone apps further increases the risk of your business being hacked. Our cybersecurity service includes setup and management of your G-Suite/Office 365 security centre to save you time and hassles. Activating these tools provides your business added layers of protection such as better password security, login authentication (2FA/SSO), control of app connections, and enhanced fake/spam email scanning and suspicious web link detection. |
Asset Vulnerability ChecksCybersecurity risks will change over time. As threats evolve your digital assets become exposed to new vulnerabilities (weak spots in your defence). This means new ways hackers can attack you and your business.Some examples are: connecting a new printer to your network with poor security settings, staff connecting new phones to your business wifi, your web designer editing the company website making it less secure, staff installing unauthorised software, etc. In addition, staff working from home with partners, children and visiting friends regularly connect to the same wifi your staff are using for work. This combined with new toys constantly added to their home wifi network (baby monitors, wifi cameras, games consoles, smart TVs, media players, ipads, etc) means a small army of security changes and potential threats to your business. Our cybersecurity team regularly scans your external facing (public IP addresses) and internal digital assets checking for any changes or new security issues (such as devices trying to connect or scan ports). This includes insecure authentication, weak login credentials, critical software updates, hidden backdoors, etc. This means your business stays protected whatever the operating environment or changes it presents. New assets, new babies or new friends are all managed with ease. |
Brand ProtectionHackers impersonating your business, website, and social media accounts to defraud your staff, customers, and suppliers can create long term brand damage and increases your risk of being hacked.In addition, studies have found 65% of customers lose trust in a brand, and and 80% of consumers stop buying a brand if their information is compromised. Most tell others about their bad experience, with one third sharing on social media. Our brand protection service continually monitors threats to your brand across social media, mobile apps, websites, and other external sources. We monitor the surface web, deep web, and dark web for company mentions and keywords including all your staff email accounts. These real-time alerts warn you of possible breaches not only in your business, but other businesses that may hold your data (suppliers, vendors, 3rd parties, etc) to help protect your brand from long term damage. |
Cybersecurity ComplianceData security and privacy is a legal requirement for most businesses nowadays. You are legally obligated to protect your customer’s information. In addition, reporting of data breaches to the govt and your customers is now compulsory as of 2014. Yet compliance is ever more complex and constantly changing with multiple laws, standards and regulations to understand: Privacy Act, NBD Scheme, AML/CTF Act, GDPR, APP, ISM, ASD8, NIST, PCI DSS, ISO27001, ISO31000, etc.However the risks of non-compliance are high: govt fines up to $2.1M, customer lawsuits, higher insurance costs, reputation damage, and greater risk of your business being hacked. In addition, if you’re self-employed or a company director your personal assets can also be at risk. Our cybersecurity compliance program provides your business with the advice you need to minimise these risks. We can create a custom NIST based cybersecurity plan (RTP, SoA, IRP) for your business with advice modelled on the ASD8 strategies recommended by the Australian government cybersecurity agencies (ACSC & ASD). We help your business stay compliant with industry and legal requirements, now and in the future. We continuously track changes in data privacy laws, standards and regulations to keep you compliant and on the right side of customer expectations. This includes compliance guidelines, procedures, templates, checklists and security policy advice combined with our one-page cybersecurity action plan that simplifies responding to cyber incidents. This makes getting and staying complaint easy and helps your business avoid the chaos and panic a cyber-attack can cause. |
Data EncryptionA lost or stolen laptop, desktop or smart phone with unprotected data presents a serious risk to your business. If the data becomes public it can mean your suppliers, vendors and competitors having access to your sensitive business information.In addition, the costs of losing unprotected data can be high: govt fines, reputation damage, customer lawsuits, lost trade secrets, etc. A lost device can be replaced, but not the data it holds. Our encryption tools protect your laptop, desktop and smartphone data so when lost or stolen no one can access your sensitive business information. This protection uses information about your computer (make, model, internal serial numbers, etc) matched with your hard drive to prevent data access by anyone but you. Your files are encrypted at rest (always encrypted) whenever you’re logged out of the computer. This added security layer provides full disk encryption for both Windows and macOS computers, leveraging native technologies for optimum performance, and using central key management and recovery via the cloud. |
Identity Theft AlertsIdentity theft is stressful, time-consuming and costly. More than 1 in 5 Australians have been impacted by identity theft. Every 20 seconds an Australian has their identity stolen.This means hackers using your name to commit fraud including: opening credit card accounts, applying for loans, renting or buying property, falsely claiming govt benefits, creating fake identity documents, etc. In addition, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data. Our identity theft alerts help protect your business and staff from the long term damage identity theft can cause. These alerts warn you whenever details of your identity are stolen by hackers and posted on the internet (eg; staff emails and passwords, company domain breaches, etc). This means you can change staff passwords, restrict bank account access, place a temporary ban on your credit file to prevent fraud attempts, and most importantly prevent your identity suffering long term damage. |
Credit Score AlertsDamage to your credit score through fraud can prevent you being approved for credit cards or loans in the future. In addition, it can take months or even years to repair the damage done to your score.Furthermore, many people only realise they’re a victim of identity theft after the damage has occurred and it’s too late. Especially given it’s usually 6 months or more before a business identifies it’s lost your data. Here’s an example: You’re holidaying in Bali, and the hotel photocopies your passport on checking in. They also have your credit card details from the online booking. Unfortunately their computers are hacked and your identify is now stolen (without you or them knowing). The thief uses this personal information to apply for a $10,000 holiday loan through an online lender. You only learn about this fraud months later when debt collectors start calling for repayments on the $10,000 debt now in your name. Credit score alerts warn you if certain changes have been made to your credit file, eg; someone applying for a loan or credit card in your name. Over 20 million individual credit files across Australia and New Zealand are monitored by our credit technology partner. These alerts can help protect you from financial fraud. Whenever your credit file is accessed, you’ll receive an alert email within 24hrs of the activity. This means you can contact the lender to stop any credit being issued, place a temporary ban on your file to prevent further fraud attempts, and most importantly prevent your credit score being damaged. In addition, the alert service includes $15,000 of insurance cover for any identify theft. (Terms and conditions, exclusions and limitations apply > Identity Guard Insurance). The service only costs $60/yr per person so it’s great value. (We’ve been using this service personally ourselves for over 10 years now protecting our business and family members so highly recommend it). |
24/7 Monitoring & Control CentreDo you know what’s happening on your systems day and night? Will you know if you’re business is attacked at 3am? What if your staff lose their phone in a taxi at 10pm on a Saturday night? Would you know if staff are connecting unauthorised devices to your systems or wifi?Cybersecurity is little value if no one is actively monitoring the security. We monitor the security of your digital assets from a secure control room 24/7, so you don’t have to. Our control centre staff can isolate and disconnect any user, device, or activity from your business systems the moment they pose a threat, even at 3am. This real-time security monitoring means attacks on your business can be stopped early before they cause major damage. You’ll have peace of mind knowing someone is always watching over your business. Our security operations centre (SOC) is staffed 24/7 by cybersecurity engineers with years of experience (many hold masters degrees in cybersecurity). The SOC provides real-time data and critical security event notifications, remediation services, unified threat management reporting and response, security policy tuning and advice, 24/7 on-call assistance and incident response, and security information and event management (SIEM) systems. |
24/7 Cyber Response TeamWhat happens if your business gets hacked? Who do you call, and what should you do next? Every minute is critical when you're systems are under attack.If a laptop is stolen what should you do? If ransomware locks down your entire business who should you call first? If staff click on an infected email attachment what next? If client data leaks how should you respond? Our cybersecurity response team provides 24/7 support whenever you need it. At the click of a button you can connect to support via phone, email, and live chat. The response team will contain and eradicate any threats, restore your systems to normal, and minimise the damage to your business. Our response team comprises highly trained degree qualified cybersecurity engineers with years of experience (many with masters degrees in cybersecurity). They hold industry leading certifications such as CISSP, CEH, CCNA, Security+, Network+ and CWNA. Cybersecurity is not our work life, it's our life’s work. This means you’ll always have someone to help you 24/7 with any cybersecurity event. You’ll have peace of mind knowing someone is always watching over your business. In addition, our digital forensics team will complete a post-incident review to provide you a report on how and why the incident occurred, along with advice and recommendations to help prevent the situation repeating again in the future. |
Ongoing Advice & SupportChange is constant in business. As your business grows and changes so will your cybersecurity needs. Changes outside your business mean evolving your cybersecurity is even more important: changing technology, changing hacker threats, changing govt laws and industry standards, and changing consumer expectations.If your cybersecurity doesn’t change with the times you risk: being hacked more easily and more often, govt fines for non-compliance, customer lawsuits, lost sales and reputation damage from data breaches, and putting your personal assets at risk. This makes ongoing cybersecurity advice and support critical to keeping your business protected long term. Our cybersecurity engineers keep your protection updated using the latest and best tech adapting it as your business and the world around you evolves. We provide ongoing advice as your situation changes so you don’t fall behind and increase your risks. This includes monthly reports, quarterly check-ins and annual reviews. In addition, our monitoring and control centre staff are available 24/7 to support you and your business whenever you need it. |
Online Cyber TrainingAround 91% of cyber-attacks begin with human involvement, which means your staff are the front line defence in protecting your business. If staff keep clicking on anything and everything your cybersecurity will continually fail.Let’s be honest, most training is dead boring. Like visiting the dentist or doing your taxes. Cybersecurity training traditionally has been no different, boring lectures in tech-speak that puts you to sleep. Our cybersecurity awareness program provides online training for your staff that’s different (ie; not boring). It starts with baseline testing on their email behaviour, continues with fun training (eg; interactive modules, videos, games, etc) and ends with re-testing them to check for improvements so you know it’s worked. We have access to the world’s largest library of security awareness training through our cybersecurity education partner educating over 30,000 customers ensuring there’s lots of variety to suit your needs. We provide on-demand interactive and engaging online training courses combined with unlimited social engineering attack simulations via email, phone and text. |
Business BackupLost, deleted or hacked data can cause major headaches. Ransomware that kidnaps your files can shut your business down overnight. If you lose customer data you risk govt fines, reputation damage and potential lawsuits. Unfortunately no thinks about backup until it’s too late.Good cybersecurity means having a robust backup strategy. It’s the key to recovering from a ransomware attack. Our backup solutions can be simple or complex depending on your needs. We can customise a backup and disaster recovery plan to best suit your business demands. From simple cloud storage like G-Suite and One Drive to fully redundant Veeam managed 3:2:1 backup systems using on-premises NAS drives combined with offline AWS Glacier and offsite cold storage tapes. This means you’re business and customer data is protected from being lost, deleted or hacked and can be recovered with ease to save you time, money and headaches. |
Cyber InsuranceOur experience shows the average cost for a small business to repair the damage caused by hackers is around $20,000. Most businesses cannot afford this upfront cost.In addition, even larger costs you could face are: income losses from disruption of business operations, losses via fraud, customers suing you, govt fines, legal fees and compliance costs. It’s why 60% of small businesses go broke within 6 months of a major cyber-attack. This is where cyber insurance can help. It’s designed to protect small businesses with essential coverage against cyber threats and data breaches. Typically cyber insurance covers the following: income losses from disruption of business operations, cost of data recovery, financial losses from cyber fraud, ransomware payments, legals costs, client law suit damages, govt fines, public relations expenses for minimising reputation and brand damage, etc. Insurance cover of $250,000 can cost as little as $575/yr depending on your situation. Note: This information is general in nature and does not take into account your personal objectives, financial situation or needs. You should seek financial advice from a licenced adviser and read the relevant product disclosure statement (PDS) before making any decisions. |
Ready to protect your business?
We'll save you time, money and stress in getting your business and data protected. All our advice is plain english and jargon free. We promise no cyber-tech speak. Contact us today.