top of page
Blue-and-green-Calming-Backgrounds.jpg

Security
Checklist

​

​

What it is

   When your organisation is well established,

and you want to see if anything is missing,

a checklist can be a great starting point.

​

​

Why it matters

  With threats changing constantly, business evolving,

and so much change,

it's almost inevitable that things are overlooked.

Have you done a recent review?

​

​

What we do

   We've brought together a plethora of concepts,

approaches, configurations and checkpoints

and assembled them into a list.

If you find anything you've missed,

anything that resonates with you,

or anything you like to know more about,

then we can work together to get you sorted.

​

We've covered everything from the basics in the Essential Eight,

to some specifics around E8 Backups (are you capturing M365 configurations?)

Things like MFA,

break glass accounts,

password complexity,

identity lifecycle management,

conditional access,

audit logging,

network segmentation,

configuration and data backup,

and much, much more...

​

​

​

A Checklist

lets you see where you are,

and assess whether there's

anything you've missed.

​

​

​

bottom of page