Comprehensive set of services designed to enable cybersecurity and compliance to Australian Signals Directorate's Essential 8 maturity model
Adelaide-based team of security experts that detect, analyse, and respond to all cybersecurity incidents and events using SIEM solution
Automatically detects attacker's activities using Indicators of Attack, behaviours and send prioritised alerts
Regular governance and compliance checks, using risk management and controls at all level with long-term security strategy in place
Prioritised and SLA-based installation and configuration of patches on Servers / Workstations and Applications
Minimises the effect of outages and disruptions on business operations
Ensuring only authorised software, applications and files can execute on servers and endpoints
Leveraging dark web scanning procedure to ensure no users / data is compromised
Advanced and ongoing end-user awareness, training with annual audits
“In an ever-changing cyber threat landscape, we needed an ICT partner who would help us sleep at night. For us, Subnet is that partner. And their MS Foundations is the service that ticks all the boxes - 24x7 Security Operations Centre, Managed AV, OS and Application patching, remote and onsite support – they deliver value and ensure safety from cyberattacks. Subnet is also assisting COPL to explore and understand the Essential 8 Maturity Model and what it means for our environment. Peace of mind.”
Find out how Subnet's next generation of Managed Services can help you jump start your cyber resilience and compliance to Australian Cyber Security Centre (ACSC) Essential 8 strategies
LIZ FOURIE - MANAGER CORPORATE SERVICES, BERRI BARMERA COUNCIL
Based on the most recent ACSC Essential 8 guideline, Subnet Security Maturity Journey will provide you with a baseline of your organisation's level of preparedness to prevent cyber attacks.
Our upcoming events and webinars on cybersecurity
Join Subnet and Fortinet at our in-person lunch event to learn why businesses need to have a real-time, 24x7 dynamic and granular view of the health of their IT systems cutting across servers, storage, endpoints and applications.
Join ConnectWise and Subnet for an overview of the most recognised cybersecurity frameworks around the world. They’ll compare and contrast frameworks, pointing out the pros and cons of each so you can make an informed decision on which ones to use.
Read our latest thought leadership articles, blogs and content on cybersecurity
September '21 had a lot going on in the land of Cybersecurity - seeing the release of 3 major vulnerabilities and exploit Proof Of Concepts (POCs) for Apple IOS (iPhone), Exchange Autodiscover, and VMWare vCenter Bad Packet. Here is an in-depth view of the exploits
As the market continues to evolve, here are some best practices Subnet recommends, that businesses can implement to protect themselves from threats from ransomware, network vulnerabilities, and business email compromises.
On a year-on-year basis the ACSC saw an increase in cybercrime reports of 13%, totalling some 67,500 reported incidents, roughly translating to 1 attack every 8 minutes and impacting every business sector and government agencies at all levels. The ACSC report identifies a couple of key attack trends and threats as follows