Complete Digital Security

Online threats and security risks are varied and highly impactful once they become active in your systems. Commonly, we find that clients had been oblivious to the risks before allocating resources towards repair, as opposed to the prevention methods which will safeguard against system interruptions and destruction.


Digital Systems Security & Continuity

Cyber hacking has ramped up significantly in the last decade, and continues to expand its range of possible threats to businesses as they rely more on digital and online systems.

We’re working with businesses to provide necessary protection and back end maintenance to ensure your online presence is secured. Your email, websites, and essential software are highly vulnerable. If one of these were compromised, how long would your business survive?

Internet Security

The web is a large pool of resources and tools, however it also presents the greatest risk to businesses. As the connection between so many systems used within business, it is the main channel that hackers and malicious software utilise to access your networks and data, and therefore requires the greatest of monitoring and support. 

Hardware Security

Hardware is often overlooked when it comes to security and protections. Commonly, our clients come to us with the knowledge that their systems are ‘protected’ with a basic antivirus or similar software. The realisation that these basic protections will not ensure effective cover of systems comes as a shock.

Staff and Systems Protection

We’re constantly repairing networks and systems that are damaged or misused by the staff and human resources that are assigned to utilise them. This is often due to lack of training and carries a costly impact on business, yet it is easily resolved with adequate admin privileges and training.


How It Works

We’ve made a simple evaluation tool for guests to quickly assess if, and where, there may be issues to resolve. 

Our simple evaluation tool is taken from our comprehensive tool of over 450 assessable elements. 

You can use the tool to check some of the basic elements of your digital ecosystem, and ensure you’re protected from malicious activity.  You will be provided a score that will show what percentage of risk your business structure is exposed to, while gaining insight into some popularly overlooked areas. 

Essential Digital Services - Self-Evaluation

This is our quick self-evaluation, to check how secure your business digital systems are. This will give you a preliminary view of how exposed your security is and what areas you need to concentrate on ensuring are secure and protected.

With twenty questions you will be able to quickly see which areas of your digital ecosystem are in need of further review, repair, monitoring or updating. We encourage all businesses to regularly use this tool so as to ascertain any weak points in your current IT systems.

1 / 20

Do you know what the costs for your business to respond to & recover from a serious cyber incident?

What is your cost to repair your online presence, or to replace your entire site or mobile app?

Or, what would be the cost to hire rapid resources at last minute to remedy your cyber incidents?

Do you know the cost involved? The time it may take? Or the other impacted facilities that could also be cost burdened?

2 / 20

Can your business survive without digital resources; internet, websites, email, apps, etc.?

If your systems were interrupted or shut down by intrusion or technical issues, how long could all/some of your business functions operate before your clients are affected?

Or the costs and resources of your business are affected?

Can you still operate with your website down, CRM intrusion, email hacked, or any of your digital systems affected?

3 / 20

Do you know what data and IT systems your business needs to keep operating if exposed to cyber breach?

Can you survive with a third party email account like Gmail?

What about your social media accounts and websites; what if they go down or are hijacked?

Do you know what you will need as a resource minimum for your business to continue operating and survive?

4 / 20

Do you know who has access to your business systems and data?

Are you aware of your personnel that has access to your systems and data?

What access do former staff or contractors have, or still have access to?

Are there any former staff that have access to your systems, and have they been removed from access privileges and their email accounts have forwards and allocation correctly?

5 / 20

Do you know how your digital assets are protected?

Are you, or your IT administrators able to understand your minimum security and protection systems for your digital assets?

It's a simple question, however should involve an informed answer.

6 / 20

Are all computers protected by a properly configured firewall?

Are firewalls configured correctly on your systems?

This includes PC's and devices connected to your network.

Have your firewalls ever been switched off to allow for applications and hardware to connect to your network?

7 / 20

Do you have policies in place to ensure safe and proper use of internet and email?

Are your staff aware of your operating procedures and practices for internet and email access and usage?

The majority of system issues can be contributed to staff opening malicious emails and attachments, as well as browsing non-work related sites and applications.

8 / 20

Are staff prevented from installing software without prior approval?

Many devices are not restricted from downloading software and applications automatically. Updates should only be on an automated schedule (outside of work hours) and device users, (staff & contractors) should be restricted from accessing and installing software without a network administrators assessment and approval.

We see large amounts of vulnerabilities and issues caused by staff installing software without proper knowledge of it and administrator permission.

9 / 20

Do you have controls in place to ensure authorised access only?

Are logins shared for some applications and software?

Are some staff or contractors granted access to systems with poor credential management?

Do you have 2FA (Two Factor Authorisation) on hardware and/or your key software and cloud storage?

10 / 20

Do you have sufficient credential and password management?

Are your passwords multi character, symbol based, and more than 12 characters?

Are they based on best practices for strong authority protocols?

11 / 20

Do you know where your critical business information and data is stored?

On internal computer systems, Australian based data centres, international data centres or cloud based servers?

A lot of our newer clients are not aware that their sensitive company and client data is stored on adequate servers, however are in offshore locations. There are significant risks associated to poor server and traffic management protocols.

12 / 20

Do you understand the risks associated with data held by your third party suppliers?

Not all businesses are able to store and utilise data on premises. Using third part software providers may allow for them to use your data for their own purposes.

Are you protected against risk and intrusion by needlessly exposing your data or your clients data?

13 / 20

Do you have backup measures and disaster recovery plans in place?

Is your data and digital presence (Websites, portals, apps, etc.) automatically backed up at regular intervals? Are you able to access this data rapidly and without restrictions?

14 / 20

Do you have an independent mentor to discuss your IT needs from time to time?

Are your IT services audited by a third party to ensure you have the best practices in place and are operating efficiently whom can assess works done by your internal IT administrators, or any third party providers used?

15 / 20

Do you regularly evaluate the market to ensure that your IT services are still the best ‘fit’ for your business?

Prices for services and equipment change as often as the hardware and software itself is updated. It's important to ensure that evaluations are conducted to ensure that you're operating with the latest technology for the most economical prices.

16 / 20

Does your anti-virus software address viruses, trojans, spyware, key-logging software and warns against suspect web pages?

How often is updated? When does it run on your systems/devices? Who monitors and maintains these systems? Is it effective at removing threats from incoming emails? Can you guarantee that your messages and files sent to clients is not infected with any threats?

17 / 20

Is your data restricted to only those staff that require it and only when needed?

Is your data restricted to role specific tasks?

Are staff able to access your entire database/s?

Is the data accessible from outside the office or in remote working environments?

18 / 20

Is any critical business data stored on easily-lost USB sticks or external hard drives?

Are systems restricted from transferring client records, contracts, data, etc. to external drives and portable storage?

Can your customer list be copied onto a USB drive by staff or contractors?

19 / 20

Have you considered cyber insurance as part of your cyber risk management strategy?

Are you aware of cyber-insurance?

Are you currently covered under your existing business insurance for protection from digital threats?

Will your insurer cover you against hardware/software issues? Against hacking and hijacking? Will they cover your recovery and rebuild costs?

20 / 20

Have you established a working relationship with an external IT specialist who is familiar with your business?

It is essential that you are able to call on resources and support swiftly and deploy solutions quickly. A trusted resource will be a massive benefit in an emergency as well as with general consultation.

Specialists familiar with your server setup and digital ecosystem need to be available on short notice, to fix urgent server, website, software and hardware problems. Saving selection processes and further errors and issues with recovery or just updates.

Enter Your Details

We will send you your results to your email account.

Cyber Crime Increasing

Whether you realise it or not, you’re being attacked. How can we know that? We are working with many businesses to repair the damages.

Cyber crime isn’t a simple thing. It doesn’t have operating hours, or always leave visible traces of its impact, until it has impacted your systems and business flows, and therefore, revenues.

When completing the self-assessment for your Essential Digital Services, keep in mind that these are high level questions that are designed to give you an overview of some of the most common elements of vulnerability and restrictions that we find our newer clients encountering when they come to us. Your responses are not recorded on our servers nor retained for any purpose. 

Our full security audit is a complete and in-depth analysis of your business’s vulnerabilities and is designed as a launching point for further works and analysis into a more robust and effective digital ecosystem for your business. 

Your business has taken a holiday. What do you do when your business has taken a holiday? – Lock the doors, clean up, secure loose items, turn off non-essential services and utilities so as to save money and resources.  Lock the back door.

What are your vulnerabilities – that you’re aware of?

Keeping in mind, you don’t know what you don’t know.

Small business has completely devastated across Australia. We’re putting essential services, covid rescue services to help get you back on deck.

If you think you have been a victim of cyber security issues, you can contact us to assist in repairing the issues and ensure that you are properly protected for the future. 

You may need to disclose any data breaches to the federal privacy commissioner.

If you’ve been attacked or are impacted by cyber crime, we encourage you to contact us, as well as report it to the Australian Signals Directorate. If you’re based in Australia you can report a cyber crime here:

Contact Us

Go to our secure form and contact us to learn more and get answers

Get Started

For a full Digital Ecosystem Analysis
book an appointment now


Providing Information Technology Tools & Resources Since 2001