Tim Harrison
May 31, 2025

Updates To Our Future Direction

Why we are making this change

For over two decades, we’ve been dedicated to managing your IT and safeguarding your business against cyber threats. As the digital landscape becomes more complex and threats more sophisticated, we’re committed to enhancing our security standards and service offerings. These changes are designed to protect your critical data, ensure compliance, and simplify your IT management, so that your reasonable expectation that we are keeping you safe, can be met.

Anyone who’s turned on the news for more than 15 minutes have seen that cyber threats, cyber attacks, and data breaches are on the rise, backed by state actors, and on the rise. The Annual Cyber Threat Report 2023-2024 | Cyber.gov.au – published by the Australian Signals Directorate shows that an average single cybercrime incident (like fraud, theft, phishing, and the like), costs a business on average between $49,615 and $63,602. Globally, the bigger threat, a data breach, has an average cost of $4.26 Million USD according to Cost of a data breach 2024 | IBM.

Over the years we’ve added services to our layered cybersecurity approach, including controls like DNS filtering, endpoint detection and response, identity threat detection and response, application control, password managers, and more. Likewise, growing regulatory requirements and demands to meet guidance and frameworks like the ACSC’s Essential 8 framework has increased the complexity of the services we provide.

However, as we allow a lot of our clients to pick and choose (A la carte style) what services and protections they get from us, it’s giving many clients a false sense of security. Operationally, we also provide a mixture of legacy and modern plans, splitting our focus into 4 different groups of clients which is making it difficult for us to deliver the level of service and consistency we want to.

What do you need to do?

Please review this update carefully. Our team will be reaching out with personalized guidance on how these changes affect you. Meanwhile, if you’d like to discuss your current plan or move to a new one sooner, contact our helpdesk today.

We are committed to continuing the support for all our clients that we’ve grown to know and value over the years, so our team will find a suitable path forward.

What is changing

Focus on Security as a minimum

We require all clients of ours to commit to our minimum security requirements. Until our minimum security requirement is met, any data breach, or cyber crime incident that would have been prevented by implementing these controls will not be covered by any of our agreements and we will be exempt from any liability. We will work with all clients to help them achieve this minimum requirement. The requirements include;

  1. Engage in Regular Security and Operational Reviews
  2. Implement phish-resistant multifactor authentication
  3. Implement Application Control
  4. Implement Vulnerability Management
  5. Participate in Cybersecurity Awareness Training
  6. Implement a password manager with Single Sign-On capabilities
  7. Include us in new hire onboarding and employee termination processes
  8. Participate in Regular Staff and Device Audits:
  9. Develop and maintain an incident response plan
  10. Ensure all critical business data is backed up
  11. Work with all software providers to implement and enforce multifactor authentication or similar controls.

New Plans Being Released

We are releasing four new plans. We encourage you to check out our baseline service; MANAGED IT PLAN, our +COMPLIANCE PLAN and +SERVICES PLAN pages for more information.

  1. Managed IT
  2. + Compliance
  3. + Services
  4. Complete
  • Managed IT implements our inclusive, fixed price helpdesk, monitoring, patching, managed cyber security, and our regular security and tech reviews. This plan will be most suitable for any organisation under 25 staff, which does not handle sensitive or personally identifiable information.

  • + Compliance includes everything in Managed IT, plus a lot of compliance features and enhanced security like vulnerability scanning, application control, our technology success program, and more. Perfect for any high compliance businesses, businesses handling sensitive information, or over 25 staff.

  • + Services includes everything in Managed IT, plus consolidates common IT services with us, such as phone systems, internet services, email signature management, and more. Perfect for any organisation under 25 staff, which does not handle sensitive or personally identifiable information and wants to get all their IT needs from one place.

  • Complete includes everything from Managed IT, + Compliance, + Services.

Legacy Plans Being Discontinued

Hourly Ad-Hoc, Retainer, and Helpdesk Access Plans

In order for us to implement our security recommendations, implement recommended changes, and respond to incidents in a timely manner, we must be able to act without waiting for approval to perform billable work.

As a result, we will be discontinuing all “Pay by the hour” style plans. Only best effort, non-committed, liability exempt ad-hoc services will remain. Anyone engaging with us using Ad-Hoc only will not be able to individually purchase any licenses, services, or additional products from us, such as microsoft licenses, phone services, internet services, and so on. All support provided under Ad-Hoc is at a best effort SLA only.

If you are an existing customer and change to our managed services by the end of 2025, have introductory pricing and lower minimums for you.

Managed Clients Still On Contract

We will maintain your existing service until the renewal. If the change in plan would be at the same or lower cost, we will automatically migrate your service to the new plans within 6 months. If the cost would be higher, your plan will remain unchanged though you will have the option to upgrade to the new plans without having to renew your contract.

Managed Clients Out Of Contract

We will contact you to change you from your Month-to-Month plan and ask you commit to one of our new plans over the next 6 months. Your account manager or tech lead will contact you to explain the differences in features, pricing, and how it impacts you. Once you have been notified, you have 90 days or until the end of December 2025 (whichever comes first) to decide. If no decision is made, your current plan will continue at a premium of 20% of our current legacy rates. By the end of financial year (June 30th, 2026) you must move to a new plan or move to another provider. We will notify you before any changes occur to your account, with no less than 30 days notice.

What is new

New Cybersecurity Products

These new products are included in either our MANAGED IT plan, or the +COMPLIANCE plan.

Security and Tech Reviews
Meet with your dedicated teams lead technician on a regular basis to go through security reporting, licensing and usage reports, and more. Optimise your costs, and mitigate risk.

Identity Threat Detection and Response
Previously available only for Managed clients, this will now be available for everyone. We monitor your activity through logs in Microsoft 365 and other platforms to flag anything suspicious and respond accordingly.

Microsoft 365 Intune Management
We design, build, and implement Microosft 365 Intune. This allows your computers to have a consistent configuration, and autoamtically set themselves up, so when you get a new computer, it configures itself out of the box.

Cloud Printer Management
No need for complicated servers any more, our cloud printer management service lets you print remotely from anywhere, perfect for Cloud servers, Hybrid workers, and offshore workers.

Application Control
Limit what computers can run to only what is required to do your job. We deny everything else to limit your exposure to risk.

Vulnerability Scanning & Remediation
Scanning of your assets against the NVD and CVE databases, to track over 230,000 known vulnerabilities and fix them.

Centralised Logging
Central Logging / SIEM brings log events and signals from Firewalls, Servers, Computers, and more into a central location for auditing purposes, but is also monitored for threat signals which are analyzed and responded to.

Technology Success Program
With regular meetings and a direct line to your technology success manager, your ability to deliver on compliance, growth, automation, and optimisation through technology.

Request a Callback

Get expertise IT Management, Cybersecurity, and Vendor Consolidation Services.

Call us on +61 (8) 9467 2269
Or fill out the form for a call back.
This site is protected by reCAPTCHA
Tthe Google Privacy Policy and Terms of Service apply

Latest news & articles

Case Study: Essential 8 Implementation

FINANCIAL SERVICES With advanced cybersecurity threats putting Australian businesses at risk, an investment firm specialising in professional financial services had…
Read more

Resources

Essential 8 Framework

Resources

Share