Cyber Security Services
Let's Keep Your Business Cyber Safe
As cyber-attacks continue to increase in complexity and sophistication, the requirements for cybersecurity are rapidly increasing.
Powernet can help you become cyber secure by providing tailored cyber security services, focusing on your business and technical demands, regulatory requirements and industry specific vulnerabilities. We can help you understand the cyber risks for your business and implement cyber resilience strategies to minimise the impact of a cyber-attack.
Our Cyber Security Team have a diverse range of experience, including IT, operations, data privacy, and forensic technology.
We operate under the latest government guidelines and industry leading security methodologies including, the Australian government’s Essential 8 and NIST framework.
Certified Cyber Security Consultants
Let's get you cyber secure
Essential 8
Our entry level coverage, to get you started and in compliance with the Australian Government’s Essential 8.
ESSENTIAL 8 plus
Our most popular plan, everything in the base plan plus extra services to keep your business cyber secure.
Comprehensive Customised plans
Our most comprehensive plan that can be customised based on your specific requirements.
what are the essential 8?
The Australian Government released advice containing a prioritised list of mitigation strategies to help businesses in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each businesses risk profile and the adversaries they are most concerned about.
While no single mitigation strategy is guaranteed to prevent cyber security incidents, businesses are recommended to implement all of the Essential Eight mitigation strategies as a baseline. The Essential 8 baseline makes it harder for adversaries to compromise systems. Also, it can work out to be more cost effective in terms of time, money and effort than responding to a large scale cyber security incident.
-
Application Control
(Mitigation Strategies to Prevent Malware Delivery and Execution) to prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers.
Why: All non-approved applications (including malicious code) are prevented from executing. -
Configure Microsoft Office Macro Settings
(Mitigation Strategies to Prevent Malware Delivery and Execution) to block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.
Why: Microsoft Office macros can be used to deliver and execute malicious code on systems. -
Restrict administrative privileges
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) to operating systems and applications based on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.
Why: Admin accounts are the ‘keys to the kingdom’. Adversaries use these accounts to gain full access to information and systems. -
Multi-factor authentication
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository.
Why: Stronger user authentication makes it harder for adversaries to access sensitive information and systems.
-
Patch applications
(Mitigation Strategies to Prevent Malware Delivery and Execution) e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers. Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.
Why: Security vulnerabilities in applications can be used to execute malicious code on systems. -
USER APPLICATION HARDENING
(Mitigation Strategies to Prevent Malware Delivery and Execution) Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.
Why: Flash, ads and Java are popular ways to deliver and execute malicious code on systems. -
Patch operating systems
(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don't use unsupported versions.
Why: Security vulnerabilities in operating systems can be used to further the compromise of systems. -
Daily backups
(Mitigation Strategies to Recover Data and System Availability) of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.
Why: To ensure information can be accessed following a cyber security incident (e.g. a ransomware incident).
Related Case Studies
Let our clients tell you why we’re great at Cyber Security
COMMERCIAL KITCHEN COMPANY
Powernet has been able to find solutions that worked really well for our business. Our Brisbane office is now secure and we no longer have dropouts.
MARSHALL DAY
Realising that their IT security systems were outdated and could, therefore, expose them to potential risks, Marshall Day implemented Powernet’s proactive Unlimited Support plan.
Glenco
Along with the Office 365 Upgrade, Glenco provisioned a new server, which allowed for scalability and efficiency gains, all while increasing the security of their overall environment.