Services
Cyber Essentials Residential Tier
What we offer in this service:
- $299 + gst Professional Services Fee
- 1-3 Users Included – Additional users / devices $50 per user
- (Additional licence fees apply)
- 90-110 minute estimated time slot – Additional time spent on other tasks charged at $90 + gst per 30 minute.
1. IDENTITY – Identity breach assessment & protection
At CyberSure we offer ‘Proactive’ and ‘Reactive’ models on our Identity breach assessment and protection service.
Proactive : Our ‘Proactive’ service includes automatic notification when a breach is found and informs the impacted parties so they can take action to stop the bad actors using their credentials. An application is installed on nominated devices where you can monitor the number of assigned identities within the same application. The scanning tool is always scanning the dark web to ensure you are alerted as soon as anything is found. There is a subscription charge for this service and is calculated per user, with each user having the ability to include up to seven identities. This service is slightly more advanced as identities can include more than email ID. We proactively check the dark web for your passport number, driving licence details and many more.
Reactive : Our ‘Reactive’ service is a one time search through our dark web search engines to check for leaked credentials on the dark web. This is done as a one time exercise and you are notified of anything that may have been impacted in the past but does not actively monitor or alert you.
2. NETWORK – Home LAN security assessment & recommendations
We often forget about the important role our home Wifi routers plays in our security posture within our homes. It is the first and often main firewall between our devices and the internet. We want to ensure it stays front of mind when it comes to cyber security, and we do this by carrying out necessary routine maintenance. At CyberSure we carry out these essential measures to help prevent unnecessary breaches within our home networks.
The key tasks we conduct include;
- Home Wifi router assessment (one included in package)
- Firmware check and upgraded if needed
- Guest Wifi enabled (if router is capable & compatible)
- Switching IoT devices to Guest network
- Age assessment of Wifi router and recommendation to upgrade to Wifi 6 or 7 depending on user needs within home.
OpenDNS Home Setup
- This service can help filter out adult content and servers as a gateway filter for another layer of additional safety for your family.
3. ENDPOINT - Endpoint Protection
At CyberSure we believe using endpoint protection on home devices is wise for several reasons:
Protection Against Cyber Threats: Endpoint protection solutions safeguard devices such as laptops, desktops, and mobile phones from a variety of cyber threats, including malware, ransomware, and phishing attacks. These threats can compromise personal data and lead to significant financial losses. By deploying endpoint protection, users can prevent, detect, and try to prevent potential infections before they escalate into serious issues.
Enhanced Security for Remote Work: With the rise of working from home, many home devices are vulnerable as they often lack the robust security measures found in corporate environments. Many companies allow users to ‘BYOD’ Bring Your Own Device and this should be a fundamental reason why we need to deploy Endpoint protection to help continuously monitors these devices, ensuring they remain secure even when disconnected from the primary network. This is crucial as cybercriminals frequently target devices that are less protected, making home users particularly susceptible to attacks.
Centralized Management and Visibility: Many endpoint protection solutions offer centralized management capabilities, allowing users to monitor and control security across all devices from a single interface. This not only simplifies the management of security settings but also enhances visibility into potential vulnerabilities, enabling quicker action to potential threats.
Data Loss Prevention: Endpoints often store sensitive information, making them prime targets for data theft. Endpoint protection helps to monitor for malicious activities, such as data exfiltration and ransomware attacks, thereby safeguarding personal and financial information from unauthorized access and loss.
In summary, your CyberSure Community Warden is saying endpoint protection is essential for maintaining the security and integrity of home devices, particularly in an increasingly digital and remote working environment.
4. BACKUP - Setup backups (up to 2 devices per user)
Why Backups are Key to a CyberSure plan for our Home Users
Backups are a critical component of a comprehensive cybersecurity plan for home users for several key reasons:
Data Protection: Backups safeguard your important data like documents, photos, and financial information from being lost or corrupted due to hardware failures, accidental deletion, or cyber attacks like ransomware. Having a backup ensures you can restore your data if the original is compromised.
Malware Recovery: If your device becomes infected with malware, a recent backup allows you to wipe the device clean and restore your data, effectively removing the malware. This gets you back up and running quickly after an attack.
Disaster Recovery: Backups protect against data loss in the event of a disaster like a fire, flood, or theft that physically damages or destroys your devices. An off-site backup, like a cloud storage service, ensures your data is safe even if your home is impacted.
Peace of Mind: Knowing your data is backed up regularly gives you peace of mind and confidence in your ability to recover from any data loss scenario, whether accidental or malicious. This allows you to focus on enjoying your devices without worrying about potential disasters.
The 3-2-1 backup rule is a best practice for home users:
- Have 3 copies of your data (1 primary, 2 backups)
- Use 2 different backup formats (e.g. external hard drive and cloud storage)
- Keep 1 backup somewhere safe
Regularly testing your backups is also important to ensure they are working properly and you can successfully restore data when needed.
At CyberSure we make backups a core part of your home cybersecurity strategy, you can effectively safeguard your data and minimize the impact of any cyber incident. Backups provide a critical safety net and disaster recovery mechanism for home users.
5. Cyber Awareness Training
CyberSure highly recommends awareness training for our residential tier customers as we now see this service as essential for home users due to the increasing prevalence of cyber threats and the significant risks they pose to personal data and security. As cybercriminals employ sophisticated tactics such as phishing and malware, understanding these threats becomes crucial for individuals to protect themselves and their families.
The training equips users with the knowledge to recognize and avoid malicious activities, thereby reducing the likelihood of falling victim to cyber attacks. For instance, many people are unaware of the common methods used by cybercriminals to steal personal information, which can lead to identity theft and financial loss. By being informed about these tactics, home users can take proactive steps to learn more about the more common techniques used by cybercriminals;
- Regular awareness training
- Email Phishing simulation tests
- SMShing simulation tests
- Vishing simulation tests
- WhatsAppPhishing
Moreover, with the rise of remote work and increased reliance on digital devices, the risk of cyber threats extends beyond the workplace into personal lives. Cyber awareness training helps users understand the importance of securing their home networks and personal devices, which is vital as many people use these devices for both personal and professional activities.
In summary, cyber awareness training is a critical component for home users to maintain a secure digital environment, protect sensitive information, and mitigate the risks associated with modern cyber threats.
Cyber Essentials – Small Business Tier
What we offer in this service:
- $899 + gst Professional Services Fee
- 1-10 Users Included – Additional users / devices $80 per user – Applies to one business location.
- (Additional licence fees apply)
- 150-170 minute estimated time slot – Additional time spent on other tasks charged at $90 + gst per 30 minute.
1. IDENTITY – Identity breach assessment & protection
At CyberSure we offer ‘Proactive’ and ‘Reactive’ models on our Identity breach assessment and protection service.
Proactive : Our ‘Proactive’ service include automatic notification when a breach is found and informs the impacted parties so they can take action to stop the bad actors using their credentials. An application is installed on nominated devices where you can monitor the number of assigned identities within the same application. The scanning tool is always scanning the dark web to ensure you are alerted as soon as anything is found. There is a subscription charge for this service and is calculated per user, with each user having the ability to include up to seven identities. This service is slightly more advanced as identities can include more than email ID. We proactively check the dark web for your passport number, driving licence details and many more.
Reactive : Our ‘Reactive’ service is a one time search through our dark web search engines to check for leaked credentials on the dark web. This is done as a one time exercise and you are notified of anything that may have been impacted in the past but does not actively monitor or alert you.
2. NETWORK – LAN security assessment & recommendations
At CyberSure we have built a set of assessments for your business to ensure you can stay on top of your perimeter hardware maintenance. Our assessments are recommended to be carried out on a annual basis with the necessary recommendation if we can add value with our prevention efforts.
The key tasks we conduct include;
Switch & router assessment
- Age and health of units
- Firmware assessment and upgrade if needed
- Guest Wifi enabled
- Switching IoT devices to Guest network
- Asking that end customer’s and non staff members only connect to Guest Wifi
- Regular password updates and setting a password policy
- Implement Multi Factor Authentication (MFA) where needed
3. ENDPOINT - Endpoint Protection
At CyberSure we believe Endpoint Protection is Critical for Small Businesses.
Small businesses are increasingly targeted by cybercriminals due to their typically weaker security measures compared to larger enterprises. Endpoint protection is essential for safeguarding devices like laptops, desktops, and servers that connect to the business network and store sensitive data.
Without proper endpoint security, small businesses face significant risks:
- Data breaches leading to loss of customer trust, regulatory fines, and reputational damage
- Ransomware attacks encrypting critical files and demanding payment to restore access
- Malware infections stealing confidential information or hijacking systems for malicious purposes
Our suggested endpoint protection’s core capabilities include:
- Next-generation antivirus and anti-malware protection
- Threat and vulnerability management to identify and remediate risks
- Endpoint detection and response for identifying and removing sophisticated threats
- Automated investigation and remediation to scale security operations
More than just Antivirus – Endpoint Detection and Response (EDR) continuously monitors endpoints for suspicious activity and provides detailed visibility into threats, while antivirus often relies on occasional scans
Our service offers advanced incident response tools like network isolation, remote shell access, and sandbox analysis. Antivirus typically only terminates processes and quarantines files
In today’s threat landscape, endpoint protection is not optional for small businesses. By partnering with CyberSure and deploying a modern endpoint security solution, small businesses can cost-effectively shield themselves from the devastating consequences of a successful cyberattack.
4. Email – Secure Email Gateway
Email security is now deemed crucial for small businesses due to the significant risks associated with cyber threats that primarily exploit email as an entry point. Here are key reasons highlighting its importance:
High Target for Cybercriminals: Small businesses are often seen as attractive targets because they typically have fewer resources and weaker security measures than larger corporations. Approximately 43% of cyber attacks target small businesses, making robust email security essential to protect sensitive information from breaches and unauthorized access.
Prevention of Financial Loss: The financial repercussions of a data breach can be devastating for small businesses. Statistics indicate that 60% of small businesses close within six months of suffering a cyber attack. Implementing effective email security measures is a cost-effective strategy compared to the potential losses incurred from a breach .
Protection Against Sophisticated Attacks: Cybercriminals increasingly use advanced tactics such as phishing and business email compromise (BEC) to deceive employees into revealing sensitive information or making unauthorized transactions. With over 90% of cyberattacks starting with a malicious email, strong email security is vital to mitigate these risks .
Reputation Management: For small businesses, maintaining a positive reputation is critical. A security breach can lead to loss of customer trust and negative publicity, which can be particularly damaging for smaller firms that rely on word-of-mouth and customer loyalty .
Compliance and Legal Obligations: Many small businesses are subject to data protection regulations that require safeguarding customer data. Effective email security helps ensure compliance with these regulations, thereby avoiding potential legal penalties and liabilities .
That is why at CyberSure we are prioritizing email security and deem it essential for small businesses to protect their data, finances, and reputation in an increasingly digital and threat-prone landscape.
5. BACKUP - Setup backups
At CyberSure we believe backups are fundamental to small businesses for several critical reasons:
Data Protection: Backups safeguard essential business data against loss due to hardware failures, accidental deletions, or cyberattacks like ransomware. Without backups, recovering lost data can be nearly impossible.
Business Continuity: In the event of a disaster, having reliable backups ensures that operations can resume quickly, minimizing downtime and maintaining customer trust. This continuity is vital for sustaining revenue and reputation.
Cost-Effectiveness: The cost of data recovery after a loss can far exceed the investment in regular backups. By implementing a backup strategy, small businesses can save money in the long run and avoid potential financial setbacks.
Regulatory Compliance: Many industries have legal requirements for data retention and protection. Regular backups help small businesses comply with these regulations, reducing the risk of penalties.
We go by the 3-2-1 backup rule, and stand by this best practice for our business users:
- Have 3 copies of your data (1 primary, 2 backups)
- Use 2 different backup formats (e.g. external hard drive and cloud storage)
- Keep 1 backup somewhere safe
By partnering with us we can deploy backups as a crucial safety net that enables your businesses to protect their data, ensure operational resilience, and maintain compliance, ultimately supporting long-term resilience.
5. Cyber Awareness Training
Cyber awareness training is essential for small businesses to effectively combat the growing threat of cyber attacks. By incorporating services such as regular awareness training and various simulation tests—email phishing, SMShing, vishing, and WhatsApp phishing—businesses can significantly enhance their security posture. Here’s why this training is vital:
Comprehensive Threat Recognition: Regular awareness training educates employees about the latest cyber threats, ensuring they can recognize and respond to potential risks. Simulation tests, including email phishing, SMShing, vishing, and WhatsApp phishing, provide practical, hands-on experience that reinforces learning and helps employees identify real-world threats.
Reduction of Security Incidents: Human error is a leading cause of security breaches. By conducting phishing simulations, small businesses can effectively measure and improve their employees’ ability to spot and avoid malicious attempts. This proactive approach helps reduce the likelihood of successful attacks, protecting sensitive data and minimizing financial losses.
Cultivation of a Security-Conscious Culture: Engaging employees in regular training and simulations fosters a culture of cybersecurity awareness within the organization. When employees understand the importance of cybersecurity and practice identifying threats, they become more vigilant and responsible, contributing to the overall security of the business.
Compliance and Risk Management: Many industries have regulations regarding data protection and cybersecurity. Implementing comprehensive cyber awareness training helps ensure compliance with these regulations while also managing risks associated with data breaches.
In summary, employing cyber awareness training that includes regular sessions and targeted simulations is crucial for small businesses to equip their employees with the knowledge and skills necessary to defend against a wide range of cyber threats, ultimately safeguarding your reputation.