Cyber Essentials Baseline Cyber Security for Micro Businesses

As your business grows, so do the threats it faces. Cyber criminals are constantly developing more sophisticated methods to target businesses, making it essential to have robust security measures in place. The Cyber Essentials package from CISO Online™ provides comprehensive security solutions tailored for startups and small businesses.

Take your cyber security to the next level. Contact us to learn more about Cyber Essentials.

Explore our Cyber Essentials Package
to find the right fit for your organisation

Prevention is better than cure. Be proactive, not reactive!
Each package consists of two phases

Your CYBER SECURITY journey

Security Uplift

phase 1

SECURITY Operation

phase 2

Explore our Cyber Essentials Package
to find the right fit for your organisation

By choosing the Cyber Essentials package, you are taking a significant step towards enhancing your business’s cyber security. This package provides advanced protection that is both comprehensive and effective, ensuring your business can operate safely and securely as it grows. Get started with Cyber Essentials today!

Security Uplift in details

Phase 1

Ultra advanced protection of your identity, login details and credentials

Cyber Security starts with protecting your identity. Protecting your personal and business identity, preserving privacy, maintaining reputation, complying with Privacy ACT, and avoiding financial and legal consequences associated with identity theft and fraud 

How is this achieved?

Advanced email protection against next-gen threats

Email protection is essential for defending against phishing attacks, malware threats, Business Email Compromise (BEC) scams, maintaining business continuity, and preserving reputation and trust in today’s digital environment. 

How is this achieved?

Advanced computer & laptop protection against viruses, malware and ransomware

Protecting computers and laptops is essential for protecting data, defending against viruses & malware threats, ensuring business continuity in both personal and organisational contexts.

How is this achieved?

Standard vulnerability remediation

Incident Response is a critical process, involving the identification and resolution of security incidents within your M365 environment. This includes proactive response to the security events to prevent potential data breaches or system disruptions. 

How is this achieved?

Vulnerability remediation

Vulnerability remediation is a critical process, involving the identification and resolution of security vulnerabilities within your M365 environment. This includes addressing weaknesses that could be exploited by cyber threats in software, systems, or cloud. The goal is to patch, block, or fix vulnerabilities to prevent potential data breaches or system disruptions.

How is this achieved?

Security Awareness Training

Human error is how most organisations get compromised and hackers are always looking for new ways to exploit vulnerabilities and this include humans! To keep your employees educated on the latest tactics we offer one (1) year of a computer-based cybersecurity awareness training (incl. 5 free licenses) 

How is this achieved?

SECURITY opertion in details

Phase 2

Incident Response

Ongoing Incident Response is a critical process, involving the identification and resolution of security incidents within your M365 environment. This includes proactive response to the security events to prevent potential data breaches or system disruptions.

How is this achieved?

Vulnerability remediation

Ongoing Vulnerability remediation is a critical process, involving the identification and resolution of security vulnerabilities within your M365 environment. This includes addressing weaknesses that could be exploited by cyber threats in software, systems, or cloud. The goal is to patch, block, or fix vulnerabilities to prevent potential data breaches or system disruptions. 

How is this achieved?

Ongoing Secure Score monitoring and improvement with adaptive AI security

Ongoing operation leveraging M365 portal capabilities to maintain and improve your secure score. In addition, a monthly Ongoing Security Report is essential for continuous monitoring of emerging threats, proactive risk management, and ensuring regulatory compliance.

How is this achieved?

CISOaaS advisory and ongoing review of the policies - Quarterly

Cyber security policies defined in your M365 environment are safeguarding your data and systems from cyber threats. They provide a strategic framework for protecting sensitive information, ensuring operational continuity, maintaining trust, and complying with legal standards. Updating M365 policies is critical for your security posture and overall success 

How is this achieved?

Ongoing support for provisioning new users/licenses and updating user credentials

Cyber Security starts with protecting your identity. Ongoing protection of your business identity by provisioning new users and licenses and updating user credentials

How is this achieved?

Fine-tuning advanced emai lprotection policies against the latest threat tactics

Fine-tuning advanced email protection policies against the latest threat tactics such as phishing attacks, malware threats, Business Email Compromise (BEC) scams is crucial for maintaining business continuity, and preserving reputation and trust in today’s digital environment

How is this achieved?

Fine-tuning advanced computer & laptop protection policies

Fine-tuning advanced computer & laptop protection policies are required for ongoing protection of computers and laptops are essential for protecting data, defending against viruses & malware threats, ensuring business continuity in both personal and organisational contexts.

How is this achieved?

Ongoing Security Awareness Training

Human error is how most organisations get compromised and hackers are always looking for new ways to exploit vulnerabilities and this include humans! To keep your employees educated on the latest tactics we offer one (1) year of a computer-based cybersecurity awareness training

How is this achieved?

It’s not a matter of if you face a cyber attack; it’s when!

In today’s digital landscape, technology plays a critical role in nearly every aspect of your business, offering simple ways to collaborate with your team and engage with customers and drive revenue. This ease of collaboration also increases the risk of cyber attacks. With the recent surge in remote work, the potential for both internal and external security breaches have significantly escalated, heightening the overall risk to your business.

CYBER SECURITY IS CRUCIAL FOR EVERY SIZE AND INDUSTRY!

Recognising the budget constraints faced by SMBs, our partnership with Microsoft as a Cloud Solution Provider (CSP) enables us to offer advanced and scalable cloud-based cyber security solutions and ongoing operations, so SMBs can focus on their core business rather than cyber security challenges.

We have designed Cyber Essentials Package tailored to meet the unique needs of micro and small businesses. Our scalable solutions are crafted to fortify your digital environment, enhance your cyber security posture and behaviour, and establish a secure collaboration space, allowing you to focus on what you do best.

BE CYBER SMART, NOT CYBER SORRY!

Secure Score is a measurement of your organisation’s security posture within your digital working environment. It is available for free in your Microsoft 365 tenancy under Microsoft Secure Score.  Secure Score measures your Microsoft 365 security posture and provides recommendations to improve it, helping your organisation understand the safety of your collaboration environment. It provides an overview of your current risk level while working in a digital environment.

Get your current cyber security risk score for free!

Improve your Microsoft 365 secure score

Based on your secure score, you will understand how vulnerable your business is to being compromised. So, before a breach happens, contact us and let us strengthen your cyber security position.

our Certificates

Our cyber security team is made up of highly skilled professionals, all certified by leading companies like Microsoft, CISCO, F5, Juniper, and IQS. They stay up to date with the latest industry standards and technologies to ensure your business is protected against the ever-evolving threats in the digital world. With our team on your side, you can trust that your cyber security is in expert hands.

our trusted partners

We are backed by leading security vendors and reputable associations to strengthen your cyber security. Our team of experts shares their knowledge and experience to provide you with the best solutions.

ninjio logo black ciso online
microsoft csp partner logo ciso online black
cyber security acsc partnership logo black ciso online
knowbe4 logo ciso online
ninjio logo black ciso online

other cyber security services offered by CISO ONLINE™

FAQ

ABOUT ’’Cyber Essentials’’ ciso online’s EXPERT ANSWERS

Why choose our SMB packages?

Understanding the unique cyber security needs and budget constraints of SMB, we offer tailored packages that provide a solid baseline of protection. These packages are designed to ensure you receive the right coverage to safeguard your business while collaborating in a digital environment.

Our packages offer exceptional value for your money. We begin with a free security assessment, eliminating the need for costly penetration testing. Our pre-designed solutions further reduce expenses by removing the need for custom solution design, and our clearly defined deliverables ensure a cost-effective implementation.

Who are our Strategic partners delivering these packages?

Our strategic partnerships with ACSC (Australian Cyber Security Centre), Microsoft, KnowBe4, and NINJIO enable us to deliver comprehensive cyber security packages tailored to the needs of SMB.

As a proud partner of the ACSC, we are trusted and supported by the Australian Government to help uplift the nation’s cyber security posture. Through this partnership, we contribute to Australia’s cyber defense and share our expertise, experience, skills, and capabilities with other security professionals. Our collective goal is to make Australian cyberspace secure for all users.

Our partnership with Microsoft as a Cloud Solution Provider (CSP) enables us to offer advanced and scalable cloud-based cyber security packages backed by the latest technologies and processes from Microsoft Cloud.

We also understand that cyber security is about more than just technology and processes; it’s about people. With over 85% of organisational breaches occurring due to human error, security awareness training is more crucial than ever. In collaboration with industry leaders KnowBe4 and NINJIO, we help protect your digital life by empowering you with the knowledge to establish a human firewall.

Who are our team delivering these packages?

Each package is delivered by a dedicated team of four professionals:

  • Principal Security Consultant: Provides strategic oversight and ensures that the security measures align with your business objectives.
  • Senior Security Consultant: Brings in-depth expertise and leads the technical implementation of advanced security solutions.
  • Security Engineer: Handles the technical execution, ensuring that all security features and configurations are effectively deployed and maintained.
  • Project Manager: Manages the project timeline, coordinates the team's efforts, and ensures smooth communication with your organization.

Our team members are highly educated, hold the latest industry certifications, and bring extensive experience from working with large and high-end enterprises, applying this knowledge to benefit SMB.

What are the phases in Cyber Essentials?

Each package consists of two phases:

  1. CISO Uplift: This initial phase focuses on enhancing your cyber security posture and raising awareness within your organisation. It is a one-time implementation effort.
  2. CISO Operation: Following the uplift, this phase centres on ongoing cyber security operations and defence. The goal is to maintain a secure environment and continuously address your evolving security needs. This phase is optional if you have an in-house team capable of managing these operations.
How long does each phase take for Cyber Essentials?
  • CISO Uplift: The uplift phase typically takes about 2 months to complete.
  • CISO Operation: The operation phase requires a recurring monthly investment and continues for as long as you need ongoing cyber security support.
What size businesses do we recommend Cyber Essentials for?

Recommended for micro businesses with 1 to 10 users. This package is also suitable for small businesses as a baseline option, particularly if budget constraints are a concern.

What Industries Do We Recommend Our Packages For?

Our packages are designed to meet the needs of all industries, including but not limited to the financial sector, healthcare, legal services, technology, manufacturing, retail, education, government, telecommunications, energy, transportation, and hospitality. No matter your industry, our cyber security solutions provide comprehensive protection tailored to SMB specific needs.

What Is the Cyber Essentials Package Focused on Protecting?

The Cyber Essentials package is focused on essential cyber security measures, including:

  • Standard Identity Protection: Cyber security begins with safeguarding your identity. Your login details and passwords (credentials) are your digital identity and must be properly protected.
  • Standard Email Protection: Emails are a primary channel for communication and are often targeted in Business Email Compromise attacks. This package ensures your email system is secure.
  • Standard Device Protection: This includes the protection of your desktop computers, laptops, smartphones, and tablets—key tools for collaborating in digital environments.
  • Standard Vulnerability Remediation: As the digital landscape evolves, new vulnerabilities emerge. This package addresses the need to identify and mitigate these vulnerabilities regularly.
  • Standard Security Awareness Training: With over 85% of organisational breaches occurring due to human error, security awareness training is crucial. This package provides essential training to help prevent such breaches.
Can I upgrade from one package to another?

Yes, you can upgrade from one package to another as your business needs change. Contact our support team to discuss the best upgrade options for your organisation.

What is included in the security awareness training?

Security awareness training includes monthly animated videos followed by quizzes to reinforce learning, reminders of key lessons, posters for your office, and simulated phishing attacks to test and improve your employees' ability to recognise and respond to phishing attempts.

What is the recommended computer for these packages?

CISO team recommends using a Windows based machine running on the latest Windows 11 Pro update. For maximum security, we also recommend using a Microsoft Surface laptop for enhanced stability and portability. Find more information here

What types of reports are included in the security log reports?

The security log reports provide a comprehensive view of identity-related activity, detect potential risks, and offer insights into the security health of your environment. They help mitigate vulnerabilities and ensure compliance with security standards.

Can these packages help with compliance requirements?

Yes, our cyber security packages are designed to help businesses comply with various regulatory requirements such as ACSC Essential 8 and ISO 27001 by providing comprehensive security measures and detailed security log reports.

Why is it important to protect Office 365 apps on mobile devices?

Protecting Office 365 apps on desktop computers, laptops and mobile devices is crucial for safeguarding data security, preserving privacy, ensuring secure communication, enabling confidentiality and integrity, and maintaining business continuity in today's mobile-centric environment.

What mobile devices are supported for managing Office 365 apps?

Supported devices include iPhones, iPads, and Android phones. The devices must run supported versions of iOS and Android.

Can I remotely wipe data from a lost or stolen device?

Yes, you can remotely wipe sensitive organisational information from Office 365 apps on a lost or stolen device to prevent unauthorised access.

What happens if an employee leaves the company?

When an employee leaves the company, you can remotely wipe their device or revoke access to Office 365 apps to ensure they no longer have access to company data.

Can I protect company data on personal (BYOD) devices?

Yes, you can protect company data on personal devices through mobile device management policies that enforce security settings and control access to organisational information.

How do mobile device management policies help with compliance?

MDM policies help ensure compliance with data protection regulations by enforcing security standards, controlling access to sensitive information, and providing the ability to audit and monitor device usage.

What authentication methods are recommended for securing Office 365 apps?

Recommended authentication methods include multi-factor authentication (MFA), single sign-on (SSO), and strong password policies.

What steps should I take if a mobile device is compromised?

If a mobile device is compromised, immediately revoke access to Office 365 apps, remotely wipe the device if necessary, and investigate the incident to prevent future occurrences.

How often should mobile devices be updated to maintain security?

Mobile devices should be updated regularly, ideally as soon as new updates are available, to ensure they have the latest security patches and features.

What training should employees receive regarding mobile device security?

Employees should receive ongoing security awareness training on the importance of mobile device security, how to use security features, how to recognise potential threats, and best practices for keeping their devices secure.

download datasheet

download datasheet

download datasheet