Protect Your Digital Assets,
and Your Reputation

Data is the lifeblood of an organisation, but SMEs rarely have the understanding, tools and protections to adequately manage it.


Cyber Essentials Programs > Maturity Levels 1-3

Every business needs to identify, protect, detect, respond and recover from a cyber breach, but most wouldn’t know where to start.

In Australia the ACSC recommend the Essential 8 Mitigation Strategies, and in the UK the NCSC recommend their Cyber Essentials program. In the US CISA provides a Cyber Essential Toolkit to help businesses in need, as we could go around the world with other similar standards. 

Whilst the delivery mechanisms may differ, the fundamentals are widely agreed.

Modelled on the “Essential 8 Framework“, our Cyber Essentials Maturity Level 1 (ML1)  Program provides the way to measure your business against the known essential and best practice standards to Maturity Level 1, and learn (and return to re-learn) the parameters to measure cyber posture, performance and improvement.

The essential first step of assessing oneself against the ACSC’s Essential 8, and a paythway to Maturity Level 2 and Maturity Level 3 Programs… for businesses seeking a higher level of compliance visibility and / or a pathway to physical audit and certification. 

Up to three Programs for One Price

Start with Maturity
Proceed with Maturity
Elevate with Maturity

Virtual Audit > ML 1 - 3

How it Works

🔥   ALL PROGRAMS include access to a digital library of amazing tools & resources   🔥

This Program Includes:

  • Smart Self Assessment
  • Risk Report: High-Med-Low
  • Improvement Report
  • Digital Library of Resources​
  • 24/7 Access: Mobile & TV

Optional: Virtual Audit & Certificate of Assessment​

Program Components

Application control​

Prevent execution of unapproved / malicious programs.​

Patch Application

Prevent ‘extreme risk’ vulnerabilities within 48 hours.

Application Hardening​​

Configure web browsers and features.


Block macros from the internet.​

Admin Previleges

Assess, assign and monitor user privileges.

Patch Updates​

Mitigate ‘extreme risk’ vulnerabilities of computers and network devices within 48 hours.

Multi Factor Authentication​

For all users when they perform a privileged action.

Daily Backups

Daily Backups of important data, software and configuration settings.

Awaiting Completion

Previous slide
Next slide

How To Videos

Start a Program

Complete a Program

Use the Digital Library