Protect Your Digital Assets,
and Your Reputation - ML2
Data is the lifeblood of an organisation, but SMEs rarely have the understanding, tools and protections to adequately manage it.
applicationscontrolsconfigurationsprivilegespatchingmulti-factorbackups
Cyber Essentials Program - ML2
In Australia the ACSC recommend the Essential 8 Mitigation Strategies, and in the UK the NCSC recommend their Cyber Essentials program. In the US CISA provides a Cyber Essential Toolkit to help businesses in need, as we could go around the world with other similar standards.
Whilst the delivery mechanisms may differ, the fundamentals are widely agreed.
Modelled on the “Essential 8 Framework“, our Cyber Essentials ML2 Program provides an enhanced assessment in accordance with Maturity Level 2, for businesses seeking a higher level of compliance visibility and / or a pathway to physical audit and certification.
A comprehensive framework, this Lite Program provides the means to measure & certify to ACSC’s Cyber Essentials Maturity Level 2.
How it Works
REGISTER
Simply click the green Get Started button at the top of this page to start your program.
ASSESS
Each Program provides a smart self assessment with a range of (mostly multiple choice) questions.
Some questions require evidence be provided, IF you require a Program Review in order to receive a Certificate of Assessment. to evidence your results
CERTIFY
To evidence results a Program Review is conducted by an human account manager.
Once approved users are issued a Certificate of Assessment to provide relevant stakeholders: clients, insurers, investors, etc.
ALL PROGRAMS include access to a digital library of amazing tools & resources
This Program Includes:
-
Smart Self Assessment
-
Risk Report: High-Med-Low
-
Improvement Report
-
Digital Library of Resources
-
24/7 Access: Mobile & TV
Optional: Virtual Audit & Certificate of Assessment
Program Components
Application control
Prevent execution of unapproved / malicious programs.
Patch Application
Prevent ‘extreme risk’ vulnerabilities within 48 hours.
Application Hardening
Configure web browsers and features.
Configurations
Block macros from the internet.
Admin Previleges
Assess, assign and monitor user privileges.
Patch Updates
Mitigate ‘extreme risk’ vulnerabilities of computers and network devices within 48 hours.
Multi Factor Authentication
For all users when they perform a privileged action.
Daily Backups
Daily Backups of important data, software and configuration settings.
Awaiting Completion
How To Videos
Start a Program
Complete a Program
Use the Digital Library