To maintain a secure and resilient IT environment, all clients are required to meet a defined set of baseline security requirements. These standards are essential for protecting both the client’s and the Service Provider’s systems, data, and operations from cyber threats.
We acknowledge that implementation may take time. However, to the extent permitted by law, the Service Provider is not liable for any security incident, breach, data loss, or related service issue that could reasonably have been prevented by timely implementation or ongoing maintenance of the security controls outlined in this document. Until the security baseline is fully met, any related remediation work will fall outside the scope of our standard service coverage.
These baseline requirements apply where the relevant security control is included in your selected services or, if not included, are expected to be implemented via an equivalent solution internally or from a third-party provider unless otherwise agreed to by us in writing:
Until the security baseline is fully implemented:
If you do not meet the baseline requirements within the first 12 months because you decline the implementation of any mandatory control, or remove a previously implemented control, we may terminate your services with 30 days' notice and in accordance with Section 8.3 of our Master Terms of Service ("Termination for defaulting by client").
By engaging our services, you acknowledge and agree to these baseline security requirements, recognising your role in upholding the security and integrity of the shared IT environment.
Our Managed Helpdesk component is designed to provide comprehensive support for your business needs. The component includes:
For the Managed Helpdesk component, clients and their staff are required to:
The Managed Helpdesk component has the following limits:
Our Managed Cyber Security component is designed to provide a layered cybersecurity approach to protect your organisation from cyber threats. This component includes:
For the Managed Cyber Security component, clients and their staff are required to:
The Workstation Monitoring component has the following limits:
Our Monitoring and Patching component is designed to provide remote access for our IT support staff, asset tracking, software cataloguing, fault detection, patching, and remediation on an automated basis. This component includes:
To ensure effective delivery of our Monitoring and Patching component, clients and their staff are required to:
The following limitations apply to our Workstation Monitoring component:
Our Cybersecurity Training component is designed to integrate with Microsoft 365, provide regular training and phishing testing through email, to educate your staff on common cyber security threats with an aim to reduce the likelihood of your staff falling victim to a phishing or scam attack. This component includes:
For the Cybersecurity Training component, clients and their staff are expected to:
The Cybersecurity Training service has the following limits:
Our Security & Tech Review component is designed to solve the administrative requirements of IT. It is designed to be a regular set of meetings to review your IT security controls and incidents, review the performance of our Managed Helpdesk service, and review your license and service consumption to ensure compliance and combat overspending. The component includes:
For the Security & Tech Review component, clients and their staff are required to:
The Workstation Monitoring component has the following limits:
Essential 8 Framework