Cyber incidents can have a significant impact on businesses and their customers, from business disruption to financial loss and reputational damage. This impact is compounded when business only address cyber risks after an incident.
The Planet Cyber Security Health Check Service helps businesses to better understand their cyber risk.
This consulting-led assessment is undertaken by industry experts using best practices according to the Australian Signals Directorate (ASD) Essential 8.
As part of this service, we provide businesses with a report assessing their maturity level alongside recommendations to mitigate identified risks. The report will assist in guiding future investment decisions the business may undertake to enhance their cyber security maturity.
This service is powered by Fortian: A leader in cyber security, privacy and risk service.
The service takes 3.5 days (7.5 hrs/day) and is ideal for businesses willing to invest in enhancing their cyber security preparedness.
This service is delivered in the following stages:
Stage 1:
2 days – Assessment of current cyber security posture via consultant-driven workshops
Stage 2:
1 day – Clarification, report and recommendations compilation and qualification with channel partner.
Stage 3:
0.5 day – Report presentation with customer.
Basic scope
Overview to gather context of the business
Interviews with key personnel
Report Preparation
REPORT PREPARATION
Executive overview of key outcomes of the review
Assessment/responses
Recommendations
Report presentation and Q&A (up to 1 hour)
ADDITIONAL SERVICES
ASSUMPTIONS
ENGAGEMENT PLANNING AND MANAGEMENT
The following planning tasks will be performed:
OUT OF SCOPE
ITEM(S) PROVIDED
Contact list for personal details and hours of availability
Requirements gathering:
ADDITIONAL TERMS AND CONDITIONS
Any sale of services is subject to Planet’s standard Terms and Conditions of Sale or a Services Agreement as negotiated between the parties.
Planet ADD-ON EXTENSION SERVICES FOR CYBER SECURITY HEALTH CHECK
Additional remote 4-hour block during business hours ACS-CSHCS-REM4HR
Additional remote 4-hour block after business hours ACS-CSHCS-REM4AH
Additional remote 1-day block during business hours ACS-CSHCS-REM1DY
While no set of mitigation strategies are guaranteed to protect against all cyber threats, organisations are recommended to implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a baseline. This baseline, known as the Essential Eight, makes it much harder for adversaries to compromise systems.
Cyber Security Services • Cloud Services • Data Solutions • Unified Communications & Office Telephone Systems • Office Relocations • IT Services • Project Management