Australian based Managed IT support offices in Melbourne, Sydney and Brisbane
powernet favicon

Cyber Security Services

Let’s keep your business cyber safe

As cyber-attacks continue to increase in complexity and sophistication, the requirements for cybersecurity are rapidly increasing.

Powernet can help you become cyber secure by providing tailored cyber security services, focusing on your business and technical demands, regulatory requirements and industry specific vulnerabilities. We can help you understand the cyber risks for your business and implement cyber resilience strategies to minimise the impact of a cyber-attack.

Our Cyber Security Team have a diverse range of experience, including IT, operations, data privacy, and forensic technology.

We operate under the latest government guidelines and industry leading security methodologies including, the Australian government’s Essential 8 and NIST framework.

Powernet’s Managed Cyber Security Bundles

Let’s get you cyber secure

Essentials

Our basic bundle to get you to today’s minimum cybersecurity standard.

This includes:

  • Next Gen Anti-Virus/Anti-Ransomware with EDR
  • Advanced Email Filtering
  • Microsoft 365 Cloud Backups
  • Cyber Security Staff Training Program
  • 3rd Party Patching
  • Multi-Factor Authentication (MFA)
  • Automated SaaS Security
Enquire about this package

Advanced

Taking your business to the next level of security, adding that extra layer against today’s cyber threats.

This includes all of the Essentials bundle, plus:

  • DKIM/SPF Records Review
  • Dark Web Monitoring
  • SOC – Monitoring, Alerting & Remediation
  • Application Whitelisting
  • Microsoft 365 Backup Integrity Check (annual)
Enquire about this package

Resilience

The best level of protection for your business.

This includes all of the Advanced bundle, plus:

  • DMARC Records Review
  • Real-Time & Automated Penetration Testing
  • Vulnerability Reporting
  • Restrict & Review Admin Privileges
  • Azure Active Directory Password Complexity
  • Endpoint Management & Drive Encryption
  • Disable Macros
  • File Backup Integrity Test (annual)
Enquire about this package
Find out more

What are the Essential 8?

The Australian Government released advice containing a prioritised list of mitigation strategies to help businesses in protecting their systems against a range of adversaries. The mitigation strategies can be customised based on each businesses risk profile and the adversaries they are most concerned about.

While no single mitigation strategy is guaranteed to prevent cyber security incidents, businesses are recommended to implement all of the Essential Eight mitigation strategies as a baseline. The Essential 8 baseline makes it harder for adversaries to compromise systems. Also, it can work out to be more cost effective in terms of time, money and effort than responding to a large scale cyber security incident.

Application control

(Mitigation Strategies to Prevent Malware Delivery and Execution) to prevent execution of unapproved/malicious programs including .exe, DLL, scripts (e.g. Windows Script Host, PowerShell and HTA) and installers.

Why: All non-approved applications (including malicious code) are prevented from executing.

Patch applications

(Mitigation Strategies to Prevent Malware Delivery and Execution) e.g. Flash, web browsers, Microsoft Office, Java and PDF viewers. Patch/mitigate computers with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest version of applications.

Why: Security vulnerabilities in applications can be used to execute malicious code on systems.

Configure Microsoft Office macro settings

(Mitigation Strategies to Prevent Malware Delivery and Execution) to block macros from the internet, and only allow vetted macros either in ‘trusted locations’ with limited write access or digitally signed with a trusted certificate.

Why: Microsoft Office macros can be used to deliver and execute malicious code on systems.

Use application hardening

(Mitigation Strategies to Prevent Malware Delivery and Execution) Configure web browsers to block Flash (ideally uninstall it), ads and Java on the internet. Disable unneeded features in Microsoft Office (e.g. OLE), web browsers and PDF viewers.

Why: Flash, ads and Java are popular ways to deliver and execute malicious code on systems.

Restrict administrative privileges

(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) to operating systems and applications based on user duties. Regularly revalidate the need for privileges. Don’t use privileged accounts for reading email and web browsing.

Why: Admin accounts are the ‘keys to the kingdom’. Adversaries use these accounts to gain full access to information and systems.

Patch operating system

(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) Patch/mitigate computers (including network devices) with ‘extreme risk’ vulnerabilities within 48 hours. Use the latest operating system version. Don't use unsupported versions.

Why: Security vulnerabilities in operating systems can be used to further the compromise of systems.

Multi-factor authentication

(Mitigation Strategies to Limit the Extent of Cyber Security Incidents) including for VPNs, RDP, SSH and other remote access, and for all users when they perform a privileged action or access an important (sensitive/high-availability) data repository.

Why: Stronger user authentication makes it harder for adversaries to access sensitive information and systems.

Daily backups

(Mitigation Strategies to Recover Data and System Availability) of important new/changed data, software and configuration settings, stored disconnected, retained for at least three months. Test restoration initially, annually and when IT infrastructure changes.

Why: To ensure information can be accessed following a cyber security incident (e.g. a ransomware incident).

Why is the ASD 8 so important?

As the business landscape becomes increasingly digital, cybersecurity has emerged as a critical concern for businesses of all sizes. Protecting sensitive information, safeguarding customer data, and ensuring business continuity are top priorities for businesses across Australia. In this context, the Australian Signals Directorate (ASD) has developed the ASD 8 Strategies to Mitigate Cyber Security Incidents, which outlines a set of essential guidelines for businesses to enhance their cybersecurity posture. Let’s explore why implementing the ASD 8 is vital for all businesses.
Cyber threats are constantly evolving, and businesses need a comprehensive defense strategy to protect their assets. The ASD 8 provides practical and actionable strategies that are aligned with the current threat landscape, enabling businesses to implement effective cybersecurity measures. By following the ASD 8 guidelines, businesses can establish strong defenses against cyber threats, such as malware, ransomware, phishing attacks, and other cyber incidents, safeguarding their critical data and systems.
The ASD 8 emphasises a proactive approach to cybersecurity, focusing on mitigating risks before they turn into security incidents. It encourages businesses to implement measures such as regular patching, network segmentation, application whitelisting, and multi-factor authentication to reduce the attack surface and minimise the risk of cyber incidents. By adopting a proactive risk management approach outlined in the ASD 8, businesses can significantly reduce the likelihood and impact of cybersecurity breaches, protecting their reputation and avoiding costly data breaches.
Many businesses are subject to industry regulations and compliance requirements, which mandate robust cybersecurity practices. The ASD 8 provides a comprehensive framework that aligns with various industry standards and guidelines, including the Essential Eight, NIST Cybersecurity Framework, and ISO 27001, among others. Implementing the ASD 8 not only helps businesses comply with regulatory requirements but also demonstrates their commitment to cybersecurity best practices, building trust with customers, partners, and stakeholders.
Cybersecurity incidents can disrupt business operations, leading to financial losses, reputational damage, and legal liabilities. The ASD 8 emphasizes the need for business continuity and resilience, providing strategies such as data backups, incident response plans, and system monitoring to ensure that businesses can quickly detect, respond to, and recover from cybersecurity incidents. By implementing the ASD 8, businesses can minimize downtime, maintain operations, and quickly bounce back from cyber incidents, safeguarding their business continuity and reputation.
Cybersecurity is a key factor in building trust with customers, partners, and stakeholders. By implementing the ASD 8, businesses can demonstrate their commitment to protecting sensitive information, ensuring data privacy, and safeguarding critical systems. This builds trust among customers and partners, enhancing the reputation of the business and providing a competitive advantage. Additionally, businesses that can showcase compliance with the ASD 8 guidelines may also be eligible for government contracts and partnerships, further bolstering their market position.

Reach our team

We’re always happy to help you find the right solutions to your IT and technology needs. Here are some ways to contact us.

Give us a call

Chat with our team to discover the best IT solutions for your organisation.
1300 892 692

Our locations

Melbourne CBD

Level 15 / 565 Bourke Street, Melbourne VIC 3000

Eastern Melbourne

Level 2 / 74 Doncaster Road, Balwyn North VIC 3104

Geelong Region

East 4/13-35 Mackey Street, North Geelong VIC 3215

Sydney

U18 / 23-31 Bowden Street,
Alexandria NSW 2015
(02) 8214 8855

Brisbane

7/9 Archimedes Place, Murarrie QLD 4172

Send us an enquiry

cross