Cybersecurity icon

Cyber security

Maintain the safety of your data and systems with robust security and device management

Challenged capability

Our approach to cybersecurity is reactive and lacks measures to prevent breaches.

  • We are largely unprepared for potential cybersecurity breaches.
  • Our organisation lacks proactive security measures.

Take category assessment

Basic capability

We have basic cybersecurity measures in place, including education and MFA for core systems.

  • Our devices and systems are secured with automatic patches. MFA is in place for core systems.
  • We run basic cybersecurity education for all staff.
  • Our staff induction covers cyber education, policies, and obligations.

Take category assessment

Intermediate capability

Rigorous cybersecurity measures protect our data, supported by effective risk management processes.

  • We have implemented rigorous cybersecurity measures.
  • To protect data, we have activated MFA for all online services.
  • We have effective risk management processes and technical controls in place.

Take category assessment

Advanced capability

We adhere to best-practice cybersecurity standards, with well-educated staff mitigating risks.

  • We employ best-practice cybersecurity protections (e.g., adhering to the ASD Essential Eight).
  • Our staff are well-educated in cybersecurity processes that mitigate risks.

Take category assessment

How ready are you?

Spend a few minutes to know how ready your organisation is to move to the cloud. This will help you understand what materials below will be on most valuable as you chart your own path to digital transformation.

Heart for kids

Hear how moving to the cloud has created more secure and efficient collaboration.

Learn more

Lessons learnt in cyber security

How one organisation became a victim of a sophisticated cyber-crime. Hear their lessons learnt to make sure you are not next.

Learn more

lightbulb
Guide
DIY ethical artificial intelligence (AI) policy
Download a high quality ethical AI policy template that you can adapt to your organisation's needs.
NEW
Man at laptop
Guide
Cyber Security Essentials
Cyber security can seem daunting, but if you consider it risk management rather than risk elimination, here are some effective first steps to reduce your exposure to cyber attacks.
Computer with VPN onscreen
Guide
The current cyber security threat landscape
A look at recent trends in the cyber security landscape reveals that the pandemic has exacerbated threats to organisations – and not-for-profits are not immune either. The cyber security landscape is constantly evolving, but some things never change.
Privacy is the foundation of trust
Guide
Privacy as the foundation of trust
Not-for-profits provide services to and assist those who are sometimes the most vulnerable members of our society and as such, have a profound duty of care to protect their information.
cyber
Guide
An overview of cyber security capabilities to protect your organisation’s information
Why it's so important to protect your organisation's information, and what you need to do it.
Why cyber security is so important
Guide
Why cyber security is so important
An overview of why cyber security protection is a must for every organisation.
Educating staff about cyber security
Guide
Educating staff about cyber security
Staff education is an essential part of cyber security. Take a look at our list of key staff education topics, aspects of cyber security policy and email protocols for your organisation.
woman logs into VPN on laptop
Training
Cyber security training
Investigate our training offerings to help improve the security of IT within your organisation.
woman in front of laptop with code on the screen
Guide
Understanding backup and retention
backup and retention, serve two different purposes in information management
Files with confidential papers stacked in piles
Guide
Information classification and security: a practical guide
No matter your organisation size, knowing how to manage digital information will help you reduce risks and meet legal obligations.
Questions to ask your IT managed services provider
Guide
Questions to ask your IT managed services provider
Key questions you should ask your managed services provider about their cyber security and how they help protect your systems.
Questions to ask your SaaS application provider
Guide
Questions to ask your SaaS application provider
Key questions you should ask your Software-as-a-Service (SaaS) business system providers about how to protect your sensitive information.
info-sec
Guide
Information security policy for not-for-profits
To define and formally document your cyber security practices and processes, you can download and customise this template for your not-for-profit.
Achieving intermediate level cyber security
Guide
Achieving intermediate cyber security
How to plan for and implement a road map to intermediate-level protection from cyber attacks.
Achieving best-practice cyber security governance
Guide
Best-practice cyber security governance
An overview of how to incorporate cyber security policies and governance into your organisational processes.
Privacy guidelines for not-for-profit organisations
Guide
Privacy guidelines for not-for-profits
Download these privacy guidelines for detailed advice on how to protect your organisation's data.
End user security policy template
Guide
DIY end user security policy
Download a high quality end user security policy template that you can adapt to your organisation's needs.
Achieving advanced level cyber security
Guide
Achieving advanced cyber security
How to plan for and implement a road map to advanced-level protection from cyber attacks.
Useful cyber security resources
Guide
More cyber security resources
For more information on cyber security, take a look through the links below.