CYBERSECURITY


We’ve all heard the “you can never be too careful these days” comments floating around about cyber-security, however now they come with some potential penalties for non-compliance. With organisations storing more and more data, it’s essential to have a plan in place around Cyber Security. There’s no business that wouldn’t be impacted by loss of access or disruption to their data.

Furthermore, “gun-for-hire” attacks are becoming more commonplace as hackers offer their services to an open market. Would a competitor pay $5,000 for access  to your business plans, financials, sales & customer data or even worse, sensitive client information? That’s as little as some of these parties can be engaged for. As the price of attacks drop, luckily so has the cost of protecting your organisation. Once an very expensive process involving multiple experts, ITSource’s security platform can detect, inform, manage & mitigate threats for an extremely competitive price.


In 2019 Moody’s Rating Agency announced that they would be implementing a score on “business ending hacks” against business credit files. This topic has since been discussed locally amongst financial institutions and insurers. ITSource can work with you to undertake security audits, advise of best practices, and deploy our team of security experts in our 24×7 Security Operations Centre to respond to real-time threats, ensuring your business is as secure as it can be.

ACORN’s latest available quarterly report above shows there is a continued trend of fraud. As organisations expand further into online business, the opportunity for fraud increases exponentially.

Contact us to ensure your organisation is proactively protected from threats, and has the procedures in place to minimise risk of loss of revenue and intellectual property through cyber breaches.

Contact Us today for a Comprehensive Security Audit & Action Plan

ITSource can undertake a comprehensive inspection of your organisational systems & infrastructure, and provide an easy to understand action plan to mitigate threats going forward. Pricing is calculated off the size of the audit / business exposure, we audit businesses as small as one user, to ensure peace of mind. 

On-site and Remote IT Services

ITSource is proud to be able to offer it’s entire suite of offerings on the Far South Coast.

Please check out our Managed Services, Casual Support and other offerings in the Services section

CCTV & Remote Monitoring

Whether you’re a business owner wanting to keep an eye on your business when you’re not around, or a property owner who travels to and from the area, keeping an eye on your assets is a smart idea.

ITSource can provide solutions for remotely accessible surveillance including iPhone and Android apps, and systems with motion detection so you can keep an eye on what’s important to you.

Security Awareness Training (SAT)

Security Awareness Training arms your team with the skills they’ll need to determine potential security threats before they open them.

In many cases, breaches are caused by people entering credentials into unsafe websites, or opening files sent to them by supposedly legitimate looking senders

ITSource’s Security Awareness Training will profile your staff ahead of time without their knowledge, so we can tailor training to meet the needs and gaps in your organisation.

Technology is only one half of the equation, we need to be vigilant as technology users in an increasingly dangerous online world.

Dark Web Scanning

Often when information is stolen, it’s for one of two reasons.

a) it was targeted
b) it was just there

In either event, the information can often end up for sale in an open marketplace, with purchasers hoping to be able to exploit and match stolen data with other leaked information for the purposes of identity theft & more.

ITSource can scan the dark web for credentials, information & more relating to your organisation.

Once an initial scan is completed, we monitor ongoing to ensure that if any of your accounts are breached (not just internal accounts; we can actively search email addresses), you’ll know as soon as possible.

On-site and Remote IT Services

ITSource is proud to be able to offer it’s entire suite of offerings on the Far South Coast.

Please check out our Managed Services, Casual Support and other offerings in the Services section

CCTV & Remote Monitoring

Whether you’re a business owner wanting to keep an eye on your business when you’re not around, or a property owner who travels to and from the area, keeping an eye on your assets is a smart idea.

ITSource can provide solutions for remotely accessible surveillance including iPhone and Android apps, and systems with motion detection so you can keep an eye on what’s important to you.

Essential Eight

The Australian Cyber Security Centre (ACSC) in conjunction with the Australian Signals Directorate have published a paper known as the “Essential Eight”. This is a mitigation strategy that will ensure increased resilience to cyber attacks and information leakage.

To quote the ACSC “While no single mitigation strategy is guaranteed to prevent cyber security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline.

This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems. Furthermore, implementing the Essential Eight pro-actively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber security incident.”

We can design and implement an Essential Eight model into your business using a variety of solutions to ensure compliance with the framework, and ultimately secure your business.

Mandatory Data Breach Reporting

On Feb 22 the Australian Government’s Notifiable Data Breach (NDB) Scheme came into effect. Under the NDB Scheme companies with a turnover exceeding $3m; that handle people’s personal data like bank account information, credit card details, medical records etc, are obliged to report data breaches to the Office of the Australian Information Commissioner (OAIC).They must also directly inform people whose information is exposed so they have the best possible opportunity to protect themselves from adverse effects.

The OAIC defines a data-breach this way:

“Unauthorised access (of data) by an employee of the entity, or an independent contractor, as well as unauthorised access by an external third party… For example; a computer network is compromised by an external attacker resulting in personal information being accessed without authority…”

This means businesses not only need to ensure that their data is secure; but they need to ensure they have the ability to monitor, investigate and report any intrusions.

SECURE YOUR BUSINESS TODAY - GET IN TOUCH - WE'RE HERE TO HELP