
Cyber security
Maintain the safety of your data and systems with robust security and device management
Challenged capability
Our approach to cybersecurity is reactive and lacks measures to prevent breaches.
- We are largely unprepared for potential cybersecurity breaches.
- Our organisation lacks proactive security measures.
Basic capability
We have basic cybersecurity measures in place, including education and MFA for core systems.
- Our devices and systems are secured with automatic patches. MFA is in place for core systems.
- We run basic cybersecurity education for all staff.
- Our staff induction covers cyber education, policies, and obligations.
Intermediate capability
Rigorous cybersecurity measures protect our data, supported by effective risk management processes.
- We have implemented rigorous cybersecurity measures.
- To protect data, we have activated MFA for all online services.
- We have effective risk management processes and technical controls in place.
Advanced capability
We adhere to best-practice cybersecurity standards, with well-educated staff mitigating risks.
- We employ best-practice cybersecurity protections (e.g., adhering to the ASD Essential Eight).
- Our staff are well-educated in cybersecurity processes that mitigate risks.
How ready are you?
Spend a few minutes to know how ready your organisation is to move to the cloud. This will help you understand what materials below will be on most valuable as you chart your own path to digital transformation.

Heart for kids
Hear how moving to the cloud has created more secure and efficient collaboration.

Lessons learnt in cyber security
How one organisation became a victim of a sophisticated cyber-crime. Hear their lessons learnt to make sure you are not next.
Basic
()
Cyber Security Essentials
Cyber security can seem daunting, but if you consider it risk management rather than risk elimination, here are some effective first steps to reduce your exposure to cyber attacks.
The current cyber security threat landscape
A look at recent trends in the cyber security landscape reveals that the pandemic has exacerbated threats to organisations – and not-for-profits are not immune either. The cyber security landscape is constantly evolving, but some things never change.
Privacy as the foundation of trust
Not-for-profits provide services to and assist those who are sometimes the most vulnerable members of our society and as such, have a profound duty of care to protect their information.
An overview of cyber security capabilities to protect your organisation’s information
Why it's so important to protect your organisation's information, and what you need to do it.
Why cyber security is so important
An overview of why cyber security protection is a must for every organisation.
Educating staff about cyber security
Staff education is an essential part of cyber security. Take a look at our list of key staff education topics, aspects of cyber security policy and email protocols for your organisation.
Cyber security training
Investigate our training offerings to help improve the security of IT within your organisation.Intermediate
()
Understanding backup and retention
backup and retention, serve two different purposes in information management
Information classification and security: a practical guide
No matter your organisation size, knowing how to manage digital information will help you reduce risks and meet legal obligations.
Questions to ask your IT managed services provider
Key questions you should ask your managed services provider about their cyber security and how they help protect your systems.
Questions to ask your SaaS application provider
Key questions you should ask your Software-as-a-Service (SaaS) business system providers about how to protect your sensitive information.
Information security policy for not-for-profits
To define and formally document your cyber security practices and processes, you can download and customise this template for your not-for-profit.
Achieving intermediate cyber security
How to plan for and implement a road map to intermediate-level protection from cyber attacks.
Best-practice cyber security governance
An overview of how to incorporate cyber security policies and governance into your organisational processes.
Privacy guidelines for not-for-profits
Download these privacy guidelines for detailed advice on how to protect your organisation's data.
DIY end user security policy
Download a high quality end user security policy template that you can adapt to your organisation's needs.Advanced
()
Achieving advanced cyber security
How to plan for and implement a road map to advanced-level protection from cyber attacks.