Build Policies & Education

Policies and procedures will contribute most to protecting your business and team.


Assess your risk

We can help you to create or improve your cybersecurity program and train your team how to protect your business, avoid cyber risks, and recover from any incidents that may occur.

Cybersecurity programs are built upon several key documents to guide you and your team. These documents outline how to protect your network and data – what to do and how to do it. These documents provide needed guidance to your most valuable resource – your team. By educating your team you help to protect not only your business, but them as well.

We can help you to develop the policies and procedures that will contribute most to protecting your business and team. We can help you to create or improve your cybersecurity program and train your team how to protect your business, avoid cyber risks, and recover from any incidents that may occur.

risk Assessment

Key Cyber Security Policies:

  • Acceptable Use Policy (AUP):
    Defines acceptable behaviours for employees when using company technology, including internet usage, software installation, and personal use restrictions. 
  • Data Security Policy:
    Outlines guidelines for handling and protecting sensitive data, including encryption standards, data classification, and retention policies. 
  • Incident Response Plan:
    Defines procedures to be followed in case of a security breach, including steps for detection, containment, remediation, and post-incident analysis. 
  • Remote Access Policy:
    Sets guidelines for employees accessing company networks from remote locations, including required security protocols and device management. 
  • Access Control Policy:
    Determines who can access specific data and systems based on their role and need-to-know principle, managing user permissions and privileges. 
  • Password Management Policy:
    Establishes requirements for creating strong passwords, including length, complexity, and regular password changes. 
  • Security Awareness Training Policy:
    Mandates regular employee training on cybersecurity best practices, phishing awareness, and password hygiene. 
  • Identity and Access Management (IAM) Policy:
    Manages user identities and access rights across different systems, ensuring only authorised users can access sensitive data. 

We can help you to define your legal obligations and build a program tailored to your business needs, resources, and risks. A quick survey to identify your industry and your cybersecurity readiness is the first step in protecting your business – your reputation

Benjii Creevey
LinkedIn Profile

Benjii Creevey

Decades of experience across telecoms, IT and GRC - Benjii brings extensive experience in risk management, cybersecurity and complaince across multiple industries.

Thomas Schultz
LinkedIn Profile

Thomas Schultz

30 year career as an accountant, lawyer and former FBI agent focussing on risk management, cybersecurity and forensics.

Benjamin Shapira
LinkedIn Profile

Benjamin Shapira

30 years in the digital advertising, marketing and product development space, Ben is a tech founder, brand expert, UX/UI specialist and an Adjunct Professor at Swinburne University of Technology.

Michael Brooks
LinkedIn Profile

Michael Brooks

40+ years in imaging technologies, Michael is retired FBI scientific support bringing extensive technical skills in forensic, training and business sectors.

Jason Durrant
LinkedIn Profile

Jason Durrant

20 years of experience in the IT industry focussing on providing insights across various levels of business solutions. With a background in software development and business analysis Jason understands the challenges as well as clearly identify proposed solutions.

Steve Duckworth
LinkedIn Profile

Steve Duckworth

Steve’s real world business roots guide our obsession with delivering value and efficiency for the small and medium sized business. With 30+ years of experience in the construction and restoration industry, Steve has built a reputation for integrity, quality craftsmanship, and rapid response in times of crisis.