The three services packages detailed below are designed to identify if key systems have already been breached, identify the risk of an organisation being breached and provide assurance that the external network is secured.
Breach Assessment: State of the art monitoring for Indicators of Compromise (IoCs) to identify potential existing intrusion and/or breach of data
Risk Assessment: Identify the cyber security gaps that may expose an organisation to a data breach in the future
Penetration Test Assessment: Simulation of attacks to locate weaknesses in the external network which an attacker could exploit
Each of the service packages provide actionable remediation advice to contain and remediate existing threats, close security gaps and strengthen an organisations security posture.
Although applicable to all organisations impacted by the NDB, the services packages have been created with small businesses and not-for-profit (NFP) organisations in mind, to ensure they have access to vital services at an economical cost.
Raymond Simpson, Managing Director for APAC, explains:
“Since the Notifiable Data Breaches Scheme finally took effect in February, we have witnessed a significant number of “notifications”, causing great anxiety to those involved - as well as those looking on from the sidelines. This is particularly the case for small businesses and NFP’s, as these organisations are mostly unaware of their security posture and, therefore, the degree to which they may be subject to the NDB reporting regulations and associated fines.
At Foregenix we take pride in being part of the small business community and want to assist in securing such organisations, without the need for a disproportionate investment from them.
Based on feedback from Australian small businesses and NFP’s who are unsure whether they have already been breached, what their risks are of being breached and how secure they are from external attack, we are pleased to offer these 3 service packages to the market.”
Foregenix also offers the following services to further bolster cyber security programs:
If you have any questions or would like to talk to us further about any of the services mentioned in this blog post, please fill out the following contact us form and we’ll get right back to you!