Cyber defence is a must for every business. But what kind of cyber security do you need?

Every business is different and has unique cyber security requirements. This is why we offer a variety of cyber security solutions for businesses of all sizes, across industries.

When choosing a solution, you should consider:

  • The size of your business
  • The type of data you collect and store
  • Your cyber risk levels
  • Your cyber-security budgets

Let’s discuss each of our cyber security solutions in detail.

Cyber Essentials Level 1

This is our starter pack and good for small businesses. It aligns with The Essential 8’s Maturity Level 1, which means we will implement the controls in a basic way. Your organisation can have protection against common threats, but not against more advanced or targeted ones.

This package includes:

  • DNS Filtering – blocks access to certain websites or online services to prevent malware or filter content
  • Zero Trust Administration – assumes no network or device is trustworthy and so requires continuous verification of the identity and context of every request/transaction, detecting and preventing potential threats
  • SaaS Cloud Backup – allows you to securely store your data on the cloud and access it anytime, anywhere, so you don’t lose your data due to hardware failure, theft, natural disaster, or human error

Cyber Essentials Level 2

We recommend this to be the minimum for all businesses. It aligns with Maturity Level 2, where the controls will be implemented more comprehensively. Your business can have better protection against common and advanced threats, though not against the most sophisticated or persistent ones.

This package includes DNS Filtering, Zero Trust Administration, SaaS Cloud Backup, as well as SOC/SIEM 24/7 Monitoring.

What’s a SOC & SIEM?

SOC (Security Operations Centre) is a team of experts who monitor, analyse, and respond to cyber threats in real-time. SIEM (Security Information & Event Management) is used to detect and investigate incidents, plus generate reports and alerts.

Cyber Essentials Level 3

This package is perfect for businesses with highly sensitive data and regulatory obligations. It corresponds to Maturity Level 3, which aligns with the best practices recommended by the Australian government. Here we optimally implement all the Essential 8 measures, so you can have a high level of protection against all types of threats.

In addition to DNS Filtering, Zero Trust Administration, SaaS Cloud Backup, and SOC/SIEM, this package includes:

  • PIM/PAM – Privileged Identity Management (PIM) manages highly privileged access and can meet compliance regulations, plus prevent breaches caused by the misuse of privileged accounts. Privileged Access Management (PAM) helps prevent unauthorized or malicious actions by privileged users, such as administrators, executives, or third-party vendors.
  • Token/Key/Biometric Access – These authentication methods can secure a system or a device. Token access uses a physical or digital object (a card or a code) that proves the identity of the user. Key access uses a secret password or passphrase that only the user knows. Biometric access uses a unique physical characteristic of the user that cannot be easily duplicated, like a fingerprint or an iris scan.

What are The Essential 8 Controls?

The Cyber Essential packages all include these Essential 8 controls, albeit in varying maturity levels:


Application Control

  • Enables only trusted and approved software to run on your devices, then blocks what could be malicious
  • Aims to prevent unauthorised software from running on your computer
  • Helps you avoid malware, viruses, and other threats

Patch Applications

  • Regularly updating the software that runs on your devices
  • Fixes bugs or vulnerabilities that hackers could exploit
  • Reduces weaknesses in your applications

Configure Microsoft Office Macro Settings

  • While macros are useful for automating tasks in Microsoft Office programs, we need to configure your macro settings to block or warn you about macros from unknown sources

User Application Hardening

  • Disables or blocks features or functions in your software that are not needed or could be risky (e.g., web browser plugins, macros, or auto-play)
  • Reduces the chances of malware or phishing

Restrict Administrative Privileges

  • Gives special access and permissions only to the people who need them
  • Sets limitations on what authorised users can do

Patch Operating Systems

  • Updating the software that controls your devices regularly, because unpatched systems can be used by an attacker to access to your network and steal, encrypt, or damage your data

Multi-factor Authentication (MFA)

  • Adds ways to verify your identity when logging in to your accounts or systems, such as a password or code sent to your phone
  • Makes it harder to steal your credentials, impersonate you, or hack your data or system

Regular Backups

  • Makes backup copies of your important files and information regularly
  • Stores backups where they are safe and separate from your devices (e.g., external hard drive or a cloud service)
  • Backups are made easy to recover in case of a cyber incident

Which Cyber Security Service Level is Right for You?

The best way to choose the right service level for you is to consider what your business requires. For more information about our solutions and for an instant quote, click here to complete our quotation form./p>

If you are unsure which package is best for your business, contact Future IT Services for a consultation.