Security
Checklist
​
​
What it is
When your organisation is well established,
and you want to see if anything is missing,
a checklist can be a great starting point.
​
​
Why it matters
With threats changing constantly, business evolving,
and so much change,
it's almost inevitable that things are overlooked.
Have you done a recent review?
​
​
What we do
We've brought together a plethora of concepts,
approaches, configurations and checkpoints
and assembled them into a list.
If you find anything you've missed,
anything that resonates with you,
or anything you like to know more about,
then we can work together to get you sorted.
​
We've covered everything from the basics in the Essential Eight,
to some specifics around E8 Backups (are you capturing M365 configurations?)
Things like MFA,
break glass accounts,
password complexity,
identity lifecycle management,
conditional access,
audit logging,
network segmentation,
configuration and data backup,
and much, much more...
​
​
​
A Checklist
lets you see where you are,
and assess whether there's
anything you've missed.
​
​
​