CYBERSECURITY


We’ve all heard the “you can never be too careful these days” comments floating around about cyber-security, however now they come with some potential penalties for non-compliance. With organisations storing more and more data, it’s essential to have a plan in place around Cyber Security. There’s no business that wouldn’t be impacted by loss of access or disruption to their data.

Furthermore, “gun-for-hire” attacks are becoming more commonplace as hackers offer their services to an open market. Would a competitor pay $5,000 for access  to your business plans, financials, sales & customer data or even worse, sensitive client information? That’s as little as some of these parties can be engaged for. As the price of attacks drop, luckily so has the cost of protecting your organisation. Once an very expensive process involving multiple experts, Slant’s security platform can detect, inform, manage & mitigate threats for an extremely competitive price.


In 2019 Moody’s Rating Agency announced that they would be implementing a score on “business ending hacks” against business credit files. This topic has since been discussed locally amongst financial institutions and insurers. Slant can work with you to undertake security audits, advise of best practices, and deploy our team of security experts in our 24x7 Security Operations Centre to respond to real-time threats, ensuring your business is as secure as it can be.

ACORN’s latest available quarterly report above shows there is a continued trend of fraud. As organisations expand further into online business, the opportunity for fraud increases exponentially.

Contact us to ensure your organisation is proactively protected from threats, and has the procedures in place to minimise risk of loss of revenue and intellectual property through cyber breaches.

Contact Us today for a Comprehensive Security Audit & Action Plan

Slant can undertake a comprehensive inspection of your organisational systems & infrastructure, and provide an easy to understand action plan to mitigate threats going forward. Pricing is calculated off the size of the audit / business exposure, we audit businesses as small as one user, to ensure peace of mind. 

UNIFIED THREAT MANAGEMENT & INTRUSION DETECTION

Maintaining control of your network and data is becoming an increasingly difficult process. With compliance being necessary for many businesses, it is important to have a Unified Threat Management firewall that can detect, defend and alert to threats and suspicious traffic.

In the event of intrusion, the loophole needs to be identified, closed and if necessary, reported on.

Our team can work to provide a solution capable of compliance with all necessary legislation as well as providing you with reports on your network traffic and data access.

Contact us today to discuss your options.

SECURITY ASSESSMENT & CYBER AUDITING

Information Security is only as good as it’s weakest link.

It’s important to look at your entire system end to end and identify any potential weaknesses, and implement action plans to respond to any emerging threats. Our team can assess your digital footprint, look at your infrastructure, identify any weak points and make solutions to resolve any issues.


We’re able to assist with business planning around information security, and assist you to implement best practice solutions into your business, to prevent any compliance issues, theft of confidential data & intellectual property or malicious destruction.

SECURITY AWARENESS TRAINING (SAT)

Security Awareness Training arms your team with the skills they’ll need to determine potential security threats before they open them.

In many cases, breaches are caused by people entering credentials into unsafe websites, or opening files sent to them by supposedly legitimate looking senders.

Slant’s Security Awareness Training will profile your staff ahead of time without their knowledge, so we can tailor training to meet the needs and gaps in your organisation.

Technology is only one half of the equation, we need to be vigilant as technology users in an increasingly dangerous online world.

DARK WEB SCANNING

Often when information is stolen, it’s for one of two reasons.

a) it was targeted
b) it was just there

In either event, the information can often end up for sale in an open marketplace, with purchasers hoping to be able to exploit and match stolen data with other leaked information for the purposes of identity theft & more.

Slant can scan the dark web for credentials, information & more relating to your organisation.

Once an initial scan is completed, we monitor ongoing to ensure that if any of your accounts are breached (not just internal accounts; we can actively search email addresses), you’ll know as soon as possible.

24 x 7 x 365 SECURITY OPERATIONS CENTRE (SOC)

Slant’s Security Operations Centre is constantly staffed with security experts monitoring your network & endpoints.

In the event of a breach, our SOC will respond by containing access, alerting us (and you) of the intrusion, and mitigating further threats. If necessary, environments can be restored from backups to confirm data integrity, and copies made of potentially breached infastructure to be sent for further analysis.

From here, we can discuss further requirements around breach reporting, and sit down and work out the best way to prevent this happening again.

Ensure your organisation is secure, and compliant with all relevant legislation. Let us take the stress out of managing your security.

PENETRATION TESTING

Our teams are able to conduct Penetration Testing on your network and applications to ensure that you’re ahead of any threat.

We work with a pretty good crowd of white-hat hackers who would be more than happy to pick apart whatever you throw at them, and show you any exploits.

After all, it’s probably better they find them than some of the less ethical guys out there.

Engagements vary on a case by case basis, from testing internal networks, infrastructure and systems through to public facing applications and appliances.

If you’ve got something you think needs a bit of a look, get in touch and we’ll chat.

ESSENTIAL EIGHT

The Australian Cyber Security Centre (ACSC) in conjunction with the Australian Signals Directorate have published a paper known as the “Essential Eight”. This is a mitigation strategy that will ensure increased resilience to cyber attacks and information leakage.

To quote the ACSC “While no single mitigation strategy is guaranteed to prevent cyber security incidents, organisations are recommended to implement eight essential mitigation strategies as a baseline.

This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems. Furthermore, implementing the Essential Eight pro-actively can be more cost-effective in terms of time, money and effort than having to respond to a large-scale cyber security incident.”

We can design and implement an Essential Eight model into your business using a variety of solutions to ensure compliance with the framework, and ultimately secure your business.

MANDATORY DATA BREACH REPORTING

On Feb 22 the Australian Government’s Notifiable Data Breach (NDB) Scheme came into effect. Under the NDB Scheme companies with a turnover exceeding $3m; that handle people’s personal data like bank account information, credit card details, medical records etc, are obliged to report data breaches to the Office of the Australian Information Commissioner (OAIC)They must also directly inform people whose information is exposed so they have the best possible opportunity to protect themselves from adverse effects.

The OAIC defines a data-breach this way:

“Unauthorised access (of data) by an employee of the entity, or an independent contractor, as well as unauthorised access by an external third party… For example; a computer network is compromised by an external attacker resulting in personal information being accessed without authority…”

This means businesses not only need to ensure that their data is secure; but they need to ensure they have the ability to monitor, investigate and report any intrusions.

SECURE YOUR BUSINESS TODAY - GET IN TOUCH - WE'RE HERE TO HELP