Skip to content

Essential Eight Controls

Add‑Ons & ISM Coverage

Pricing Tier

Frequently Asked Questions

What is the Essential Eight?

The Essential Eight is the Australian Cyber Security Centre’s prioritised list of mitigation strategies designed to protect businesses from common cyber threats. It covers areas such as application control, patching, macro security and more.

How quickly can we implement the framework?

Implementation time varies depending on the size and maturity of your environment, but most SMEs reach Maturity Level 3 compliance within 4–6 weeks with our structured onboarding.

Do you provide on‑site support?

Yes. While most issues are resolved remotely, our Canberra‑based team can provide on‑site support for projects, installations and critical incidents.

How do backups work?

We start by protecting your data with daily automated backups to secure Australian-based cloud storage that meets data sovereignty and regulatory requirements. Your data is encrypted in transit and at rest, and stored in an isolated backup vault that cannot be tampered with, even in a ransomware attack. This provides reliable offsite protection and ensures your business can still recover even if your local systems are lost or compromised.

For businesses that need higher resilience, we offer upgrade paths. The first option adds local backup with Business Continuity and Disaster Recovery (BCDR) capability — this means if a server fails, we can boot a virtual copy of it locally and keep you working within minutes. The second option adds offsite disaster recovery with the ability to spin up your entire network in a secure cloud environment if your site becomes unavailable (fire, flood, cyberattack, etc). This creates a stand-up cloud network, allowing your team to continue operating remotely while your primary systems are restored.