To maintain a secure and resilient IT environment, all clients are required to meet a defined set of baseline security requirements. These standards are essential for protecting both the client’s and the Service Provider’s systems, data, and operations from cyber threats.
We acknowledge that implementation may take time. However, to the extent permitted by law, the Service Provider is not liable for any security incident, breach, data loss, or related service issue that could reasonably have been prevented by timely implementation or ongoing maintenance of the security controls outlined in this document. Until the security baseline is fully met, any related remediation work will fall outside the scope of our standard service coverage.
These baseline requirements apply where the relevant security control is included in your selected services or, if not included, are expected to be implemented via an equivalent solution internally or from a third-party provider unless otherwise agreed to by us in writing:
Until the security baseline is fully implemented:
If you do not meet the baseline requirements within the first 12 months because you decline the implementation of any mandatory control, or remove a previously implemented control, we may terminate your services with 30 days' notice and in accordance with Section 8.3 of our Master Terms of Service ("Termination for defaulting by client").
By engaging our services, you acknowledge and agree to these baseline security requirements, recognising your role in upholding the security and integrity of the shared IT environment.
Our Managed Helpdesk component is designed to provide comprehensive support for your business needs. The component includes:
For the Managed Helpdesk component, clients and their staff are required to:
The Managed Helpdesk component has the following limits:
Our Managed Cyber Security component is designed to provide a layered cybersecurity approach to protect your organisation from cyber threats. This component includes:
For the Managed Cyber Security component, clients and their staff are required to:
The Workstation Monitoring component has the following limits:
Our Monitoring and Patching component is designed to provide remote access for our IT support staff, asset tracking, software cataloguing, fault detection, patching, and remediation on an automated basis. This component includes:
To ensure effective delivery of our Monitoring and Patching component, clients and their staff are required to:
The following limitations apply to our Workstation Monitoring component:
Our Microsoft 365 component is designed to provide each user with a Microsoft 365 Business Premium License, manage your Microsoft 365 environment, increase adoption of the Microsoft 365 range of features, and secure your Microsoft 365 environment. This component includes:
For the Microsoft 365 component, clients and their staff are expected to:
The Microsoft 365 component service has the following limits:
Our Email Signature Management component is designed to provide centralised management of email signatures for the Microsoft 365 platform to deliver email signatures with templates, consistent branding, and seasonal promotional information. This component includes:
For the Email Signature Management component, clients and their staff are expected to:
The Email Signature Management component service has the following limits:
Our Cloud Printer Management component is designed to provide automatic deployment, universal configurations, and real-time control for your printers. This component includes:
For the Cloud Printer Management component, clients and their staff are expected to:
The Cloud Printer Management component service has the following limits:
Our Cloud Phone System component delivers a modern digital voice communication system over the internet, providing advanced call features and flexible management. The service includes;
For the Cloud Phone System component, clients and their staff are expected to;
The Cloud Phone System component has the following limitations;
Our Internet Services component is designed to provide reliable connectivity through NBN (National Broadband Network). Our services include;
Clients and their staff are expected to:
Our Web Hosting and Management component is designed to provide reliable and secure web hosting for your website. This component includes;
Clients and their staff are expected to:
Our Cybersecurity Training component is designed to integrate with Microsoft 365, provide regular training and phishing testing through email, to educate your staff on common cyber security threats with an aim to reduce the likelihood of your staff falling victim to a phishing or scam attack. This component includes:
For the Cybersecurity Training component, clients and their staff are expected to:
The Cybersecurity Training service has the following limits:
Our Application Control component is designed to limit programs so that only pre-approved and validated applications are allowed to execute on your windows devices, thereby enhancing endpoint security significantly. This component includes:
For the Application Control service, customers are expected to:
The Application Control service has the following limits:
Our Password Manager component is designed to provide a secure, zero-knowledge, end-to-end encrypted password storage and management for your organisation. This component includes:
For the Password Manager component, clients and their staff are expected to:
While our Password Manager service has the following limits:
Our Centralised Logging component is designed to bring log events and signals from Firewalls, Servers, Computers, and more into a central location for auditing purposes, and for threat signal monitoring. This component includes:
For the Centralised Logging component, clients and their staff are expected to:
Centralised Logging component service has the following limits:
Our Vulnerability Scanning component is designed to mitigate risks through identification of assets, vulnerabilities, patching, remediation, and reporting. It is designed to go beyond our standard Monitoring and Patching service by extending its coverage to more applications, and supported network devices. This component includes:
For the Vulnerability Scanning component, clients and their staff are expected to:
The Vulnerability Scanning component service has the following limits:
Our Vendor Management component is designed to provide management for third-party software as a service (SaaS) platforms and other third-party vendors with an aim to ensure they meet baseline security and compliance requirements and meet business needs. This component includes:
For Vendor Management component, clients and their staff are expected to:
The Vendor Management component service has the following limits:
Our Security & Tech Review component is designed to solve the administrative requirements of IT. It is designed to be a regular set of meetings to review your IT security controls and incidents, review the performance of our Managed Helpdesk service, and review your license and service consumption to ensure compliance and combat overspending. The component includes:
For the Security & Tech Review component, clients and their staff are required to:
The Workstation Monitoring component has the following limits:
Our Technology Success Program component is designed to establish a regular meeting cadence to provide consulting services aimed at delivering on compliance requirements, growth, automation, and optimisation. Where the Security & Tech Review component is reporting and reviewing, this component is about future strategy planning and proposing improvements to your organisation. This component includes:
For the Technology Success Program component, clients and their staff are expected to:
The Technology Success Program component service has the following limits:
Essential 8 Framework