As your business grows, so do the threats it faces. Cyber criminals are constantly developing more sophisticated methods to target businesses, making it essential to have robust security measures in place. The Cyber Essentials package from CISO Online™ provides comprehensive security solutions tailored for startups and small businesses.
Take your cyber security to the next level. Contact us to learn more about Cyber Essentials.
This initial phase focuses on enhancing your cyber security posture and raising awareness. This phase is a one-time implementation effort, typically taking between 2 and 5 months to complete, depending on the chosen package.
Identity Protection
Login details and passwords Protection, MFA
Standard
Email Protection
Anti-Spam, Anit-Malware, Anti-Phishing, Safe Link, Safe Attachment, SPF, DKIM
Standard
Computers, Laptops, Smartphones, tablets
Standard
Security Events Respond
Incident Response, Vulnerability Remediation and Threat Hunting
Standard
Security Awareness Training
5 licenses included
Standard
Suitable for but not subject to
Small Businesses with 1 to 9 users
Following the uplift, this phase centres on ongoing cyber security operations and defence. The objective is to maintain a secure environment and address your evolving security needs continuously. This phase involves a recurring monthly investment but is optional if you have an in-house team capable of managing these operations.
Security Events Response
Incident Response, Vulnerability Remediation and Threat Hunting
Standard
Ongoing Security Report
Quarterly
CISO as a Service Advisory
Quarterly
Fine-Tuning Identity Protection Policies
Login details and passwords Protection, MFA
Standard
Fine-Tuning Email Protection Policies
Anti-Spam, Anit-Malware, Anti-Phishing, Safe Link, Safe Attachment, SPF, DKIM
Standard
Fine-Tuning Device Protection Policies
Computers, Laptops, Smartphones and tablets
Standard
Security Awareness Training
Standard
Suitable for but not subject to
Small Businesses with 1 to 9 users
By choosing the Cyber Essentials package, you are taking a significant step towards enhancing your business’s cyber security. This package provides advanced protection that is both comprehensive and effective, ensuring your business can operate safely and securely as it grows. Get started with Cyber Essentials today!
Phase 1

Cyber Security starts with protecting your identity. Protecting your personal and business identity, preserving privacy, maintaining reputation, complying with Privacy ACT, and avoiding financial and legal consequences associated with identity theft and fraud
How is this achieved?

Email protection is essential for defending against phishing attacks, malware threats, Business Email Compromise (BEC) scams, maintaining business continuity, and preserving reputation and trust in today’s digital environment.
How is this achieved?

Protecting computers and laptops is essential for protecting data, defending against viruses & malware threats, ensuring business continuity in both personal and organisational contexts.
How is this achieved?

Incident Response is a critical process, involving the identification and resolution of security incidents within your M365 environment. This includes proactive response to the security events to prevent potential data breaches or system disruptions.
How is this achieved?

Vulnerability remediation is a critical process, involving the identification and resolution of security vulnerabilities within your M365 environment. This includes addressing weaknesses that could be exploited by cyber threats in software, systems, or cloud. The goal is to patch, block, or fix vulnerabilities to prevent potential data breaches or system disruptions.
How is this achieved?

Human error is how most organisations get compromised and hackers are always looking for new ways to exploit vulnerabilities and this include humans! To keep your employees educated on the latest tactics we offer one (1) year of a computer-based cybersecurity awareness training (incl. 5 free licenses)
How is this achieved?
Phase 2

Ongoing Incident Response is a critical process, involving the identification and resolution of security incidents within your M365 environment. This includes proactive response to the security events to prevent potential data breaches or system disruptions.
How is this achieved?

Ongoing Vulnerability remediation is a critical process, involving the identification and resolution of security vulnerabilities within your M365 environment. This includes addressing weaknesses that could be exploited by cyber threats in software, systems, or cloud. The goal is to patch, block, or fix vulnerabilities to prevent potential data breaches or system disruptions.
How is this achieved?

Ongoing operation leveraging M365 portal capabilities to maintain and improve your secure score. In addition, a monthly Ongoing Security Report is essential for continuous monitoring of emerging threats, proactive risk management, and ensuring regulatory compliance.
How is this achieved?

Cyber security policies defined in your M365 environment are safeguarding your data and systems from cyber threats. They provide a strategic framework for protecting sensitive information, ensuring operational continuity, maintaining trust, and complying with legal standards. Updating M365 policies is critical for your security posture and overall success
How is this achieved?

Cyber Security starts with protecting your identity. Ongoing protection of your business identity by provisioning new users and licenses and updating user credentials
How is this achieved?

Fine-tuning advanced email protection policies against the latest threat tactics such as phishing attacks, malware threats, Business Email Compromise (BEC) scams is crucial for maintaining business continuity, and preserving reputation and trust in today’s digital environment
How is this achieved?

Fine-tuning advanced computer & laptop protection policies are required for ongoing protection of computers and laptops are essential for protecting data, defending against viruses & malware threats, ensuring business continuity in both personal and organisational contexts.
How is this achieved?

Human error is how most organisations get compromised and hackers are always looking for new ways to exploit vulnerabilities and this include humans! To keep your employees educated on the latest tactics we offer one (1) year of a computer-based cybersecurity awareness training
How is this achieved?
In today’s digital landscape, technology plays a critical role in nearly every aspect of your business, offering simple ways to collaborate with your team and engage with customers and drive revenue. This ease of collaboration also increases the risk of cyber attacks. With the recent surge in remote work, the potential for both internal and external security breaches have significantly escalated, heightening the overall risk to your business.
Recognising the budget constraints faced by SMBs, our partnership with Microsoft as a Cloud Solution Provider (CSP) enables us to offer advanced and scalable cloud-based cyber security solutions and ongoing operations, so SMBs can focus on their core business rather than cyber security challenges.
We have designed Cyber Essentials Package tailored to meet the unique needs of micro and small businesses. Our scalable solutions are crafted to fortify your digital environment, enhance your cyber security posture and behaviour, and establish a secure collaboration space, allowing you to focus on what you do best.
Secure Score is a measurement of your organisation’s security posture within your digital working environment. It is available for free in your Microsoft 365 tenancy under Microsoft Secure Score. Secure Score measures your Microsoft 365 security posture and provides recommendations to improve it, helping your organisation understand the safety of your collaboration environment. It provides an overview of your current risk level while working in a digital environment.
Get your current cyber security risk score for free!
Based on your secure score, you will understand how vulnerable your business is to being compromised. So, before a breach happens, contact us and let us strengthen your cyber security position.
Our cyber security team is made up of highly skilled professionals, all certified by leading companies like Microsoft, CISCO, F5, Juniper, and IQS. They stay up to date with the latest industry standards and technologies to ensure your business is protected against the ever-evolving threats in the digital world. With our team on your side, you can trust that your cyber security is in expert hands.
We are backed by leading security vendors and reputable associations to strengthen your cyber security. Our team of experts shares their knowledge and experience to provide you with the best solutions.
Understanding the unique cyber security needs and budget constraints of SMB, we offer tailored packages that provide a solid baseline of protection. These packages are designed to ensure you receive the right coverage to safeguard your business while collaborating in a digital environment.
Our packages offer exceptional value for your money. We begin with a free security assessment, eliminating the need for costly penetration testing. Our pre-designed solutions further reduce expenses by removing the need for custom solution design, and our clearly defined deliverables ensure a cost-effective implementation.
Our strategic partnerships with ACSC (Australian Cyber Security Centre), Microsoft, KnowBe4, and NINJIO enable us to deliver comprehensive cyber security packages tailored to the needs of SMB.
As a proud partner of the ACSC, we are trusted and supported by the Australian Government to help uplift the nation’s cyber security posture. Through this partnership, we contribute to Australia’s cyber defense and share our expertise, experience, skills, and capabilities with other security professionals. Our collective goal is to make Australian cyberspace secure for all users.
Our partnership with Microsoft as a Cloud Solution Provider (CSP) enables us to offer advanced and scalable cloud-based cyber security packages backed by the latest technologies and processes from Microsoft Cloud.
We also understand that cyber security is about more than just technology and processes; it’s about people. With over 85% of organisational breaches occurring due to human error, security awareness training is more crucial than ever. In collaboration with industry leaders KnowBe4 and NINJIO, we help protect your digital life by empowering you with the knowledge to establish a human firewall.
Each package is delivered by a dedicated team of four professionals:
Our team members are highly educated, hold the latest industry certifications, and bring extensive experience from working with large and high-end enterprises, applying this knowledge to benefit SMB.
Each package consists of two phases:
Recommended for micro businesses with 1 to 10 users. This package is also suitable for small businesses as a baseline option, particularly if budget constraints are a concern.
Our packages are designed to meet the needs of all industries, including but not limited to the financial sector, healthcare, legal services, technology, manufacturing, retail, education, government, telecommunications, energy, transportation, and hospitality. No matter your industry, our cyber security solutions provide comprehensive protection tailored to SMB specific needs.
The Cyber Essentials package is focused on essential cyber security measures, including:
Yes, you can upgrade from one package to another as your business needs change. Contact our support team to discuss the best upgrade options for your organisation.
Security awareness training includes monthly animated videos followed by quizzes to reinforce learning, reminders of key lessons, posters for your office, and simulated phishing attacks to test and improve your employees' ability to recognise and respond to phishing attempts.
CISO team recommends using a Windows based machine running on the latest Windows 11 Pro update. For maximum security, we also recommend using a Microsoft Surface laptop for enhanced stability and portability. Find more information here
The security log reports provide a comprehensive view of identity-related activity, detect potential risks, and offer insights into the security health of your environment. They help mitigate vulnerabilities and ensure compliance with security standards.
Yes, our cyber security packages are designed to help businesses comply with various regulatory requirements such as ACSC Essential 8 and ISO 27001 by providing comprehensive security measures and detailed security log reports.
Protecting Office 365 apps on desktop computers, laptops and mobile devices is crucial for safeguarding data security, preserving privacy, ensuring secure communication, enabling confidentiality and integrity, and maintaining business continuity in today's mobile-centric environment.
Supported devices include iPhones, iPads, and Android phones. The devices must run supported versions of iOS and Android.
Yes, you can remotely wipe sensitive organisational information from Office 365 apps on a lost or stolen device to prevent unauthorised access.
When an employee leaves the company, you can remotely wipe their device or revoke access to Office 365 apps to ensure they no longer have access to company data.
Yes, you can protect company data on personal devices through mobile device management policies that enforce security settings and control access to organisational information.
MDM policies help ensure compliance with data protection regulations by enforcing security standards, controlling access to sensitive information, and providing the ability to audit and monitor device usage.
Recommended authentication methods include multi-factor authentication (MFA), single sign-on (SSO), and strong password policies.
If a mobile device is compromised, immediately revoke access to Office 365 apps, remotely wipe the device if necessary, and investigate the incident to prevent future occurrences.
Mobile devices should be updated regularly, ideally as soon as new updates are available, to ensure they have the latest security patches and features.
Employees should receive ongoing security awareness training on the importance of mobile device security, how to use security features, how to recognise potential threats, and best practices for keeping their devices secure.