Across all services mentioned below, our unifying differentiators are:
- Product‑agnostic, outcome‑driven advice that can work with any existing IT or security stack.
- Strong alignment with Australian guidance (ACSC, OAIC) and typical local pricing bands for SMB cyber and managed services.
- Sector‑specific adaptations for manufacturers, online retailers and legal firms, with local Canberra delivery capability and on‑site engagement as needed.
These elements together will provide a coherent, defensible value proposition for all our small and medium sized business clients in Canberra and beyond.
Why Cyber Cure?
Across all categories, the core uniqueness is that each tier is designed for small and medium organisations, is product‑agnostic, and is anchored in clear, measurable business outcomes rather than just “more tooling” or “more hours”. They are observable in the value differentiation section.
How to interpret the tiering of the services:
- “Lite” approximates minimal‑scope or bolt‑on offerings; often automated or heavily standardised.
- “Standard” reflects what typical Australian SMBs pay for decent‑quality, named‑consultant work or MDR with full SOC coverage.
- “Premium” matches larger consultancies, formal certification programs, or complex/multi‑site OT and legal environments.
Key differentiation in our warranties/SLAs
- Specific, measurable outcomes (click rates, maturity levels, response times) vs competitors’ vague “best efforts”
- Financial backing (credits, free extensions) shows confidence in delivery
- Australian regulatory alignment (ACSC, OAIC, Essential Eight) built into guarantees
- SMB-scoped realism – no enterprise-grade 99.99% uptime promises that can’t be met
These commitments demonstrate our professionalism, accountability as a partner that YOU can trust.
Below is a precise organisation sizing matrix for each service tier, tailored to Australian SMB realities (revenue, staff, revenue-per-employee benchmarks). This shows how we position our services across micro, small, medium and upper-medium organisations while avoiding enterprise overlap.
Australian SMB Size Definitions (for reference)
|
Size |
Staff |
Annual Revenue (AUD) |
Revenue/Employee |
|
Micro |
1-19 |
<$2M |
<$100k |
|
Small |
20-99 |
$2M-$20M |
$100k-$200k |
|
Medium |
100-199 |
$20M-$50M |
$200k-$250k |
|
Upper Medium |
200-499 |
$50M-$100M |
$250k+ |
If you were thinking
“Security is too expensive”, remember “Australian SMB breach averages $122k. One incident pays for 3 years. SLAs back delivery or you get credit/extension.”
“I don’t understand cyber”, remember “ACSC Essential Eight is the Australian standard. We translate to revenue/risk terms, not acronyms.”
“Our MSP says no”, remember “We’re vendor-neutral. Review their work, suggest fixes using their tools. No sales conflict.”
Above responses show you we are the pragmatic expert who understands SMB realities while delivering enterprise-grade outcomes.
Below are service descriptions and concrete, business‑facing deliverables for each of the offerings. Each bullet under “Deliverables” is something the YOU can literally see, receive, or use.
Cyber Risk & Maturity Assessment
-
Service description
A structured review of your current security posture against ACSC Essential Eight, ISO‑style controls and Australian privacy expectations, tailored for SMBs in sectors like manufacturing, online retail and legal services.Organisation sizing for the service
Tier
Staff Size
Revenue Range
Example Organisations
Lite
5-29
$500k-$3M
Boutique legal firms, small online stores, micro-manufacturers
Standard
30-99
$3M-$15M
Regional manufacturers, mid-size retailers, 5-partner legal firms
Premium
100-249
$15M-$40M
Multi-site manufacturers, national online retailers, 20+ partner firms
Key deliverables
- Executive summary (2–4 pages) with top 10 risks, likelihood/impact ratings, and a simple red‑amber‑green heatmap.
- Detailed technical findings report mapped to Essential Eight and other relevant control frameworks.
- 90‑day tactical roadmap and 12‑month strategic roadmap with effort/cost/impact estimates.
- Risk register (spreadsheet or GRC‑ready format) that can be updated and reused internally.
- One workshop (online or in‑person for Canberra region) to walk management and IT through findings and priorities.
Unique features
- One‑page risk heatmap in plain English, with impact framed in revenue, downtime and legal exposure, not just technical scores.
- Sector‑specific lenses for manufacturers, online retailers and legal firms (e.g. supply‑chain disruption, e‑commerce fraud, legal privilege and confidentiality).
Service tiers & value
-
Lite
- Scope: Single environment (e.g., M365 + core servers), high‑level review.
- Deliverables: Short exec summary, top 10 risks, 90‑day quick‑wins list.
- Value: Fast, affordable baseline for micro/early‑stage businesses.
- Warranty: “90-day action plan will address 80%+ of identified high/medium risks”
- SLA: Full deliverables within 4 weeks of kick-off
- Competitors: Quick “IT health checks” that are mostly inventories and generic recommendations.
- Differentiation: Essential Eight‑aligned snapshot with a clear, prioritised 90‑day plan and board‑friendly summary, not just a technical checklist.
-
Standard
- Scope: Multiple environments (cloud, on‑prem, key SaaS); maps to Essential Eight and privacy expectations.
- Deliverables: Full risk register, 90‑day and 12‑month roadmap, workshop.
- Value: Comparable structure to mid‑market firms but more focused on ACSC guidance and SMB practicality.
- Warranty: “Risk register accurate to within 10% of follow-up validation” (if client re-tests within 90 days)
- SLA: 2-week turnaround from data collection to final workshop
- Competitors: Broader audits often aimed at ISO‑style maturity and large‑org templates.
- Differentiation: Tailored to SMBs in manufacturing/retail/legal, with pragmatic actions mapped to existing tools and local regulatory expectations.
-
Premium
- Scope: Multi‑site, includes third‑party and process reviews (e.g., HR, finance workflows).
- Deliverables: Everything in Standard plus board pack and follow‑up check‑in in 3–6 months.
- Value: Nearly “mini‑CISO programme” level at project pricing well below big‑4 style engagements.
- Warranty: “Follow-up check-in confirms 70%+ roadmap progress or we provide 20% credit”
- SLA: Board pack delivered 5 business days before scheduled leadership meeting.
- Competitors: Big‑4 style risk reviews heavy on documentation and light on execution support.
- Differentiation: Board packs plus follow‑up check‑ins specifically focused on execution and measurable risk reduction, not just “maturity scores”.

Fractional vCISO (Virtual CISO) Service Advisory
-
Service description
-
Ongoing, part‑time security leadership for SMBs that cannot justify a full‑time CISO, that owns the cyber strategy, governance and oversight function, without adding a full‑time executive to payroll.Organisation sizing for the service
Tier
Staff Size
Revenue Range
Example Organisations
Lite
10-49
$1M-$8M
Growing online stores, small factories, 3-7 partner legal practices
Standard
50-149
$8M-$30M
Regional manufacturers, chain retailers, mid-tier law firms
Premium
150-399
$30M-$80M
Multi-factory ops, national retail chains, top-50 regional law firms
Key deliverables (per year, scaled to package)
- Security strategy document aligned to business goals, budget and risk appetite.
- Rolling 12‑month cyber roadmap with quarterly updates and reprioritisation.
- Pack materials for board/leadership meetings: risk dashboard, KPI metrics, and decision options.
- Policy oversight: review and sign‑off of security and privacy policies at least annually.
- Vendor/security architecture reviews and written recommendations for major IT/security purchases.
- Incident‑support on demand: decision logs and post‑incident review documents.
Unique features
- Focus on business outcomes, not tools: KPIs tied to reduced incidents, downtime and compliance risks.
- Includes “CISO on‑call” for board or regulator meetings (e.g. OAIC privacy investigations, insurance renewals).
Service tiers & value
-
Lite
- ~0.5 day/month, focus on governance and roadmap only.
- Value: A named security lead for small firms who just need direction and external accountability.
- SLA: Response to ad-hoc queries within 24 business hours; monthly roadmap update on schedule
- Warranty: “Single named advisor maintains continuity throughout engagement”
- Competitors: MSP “vCIO/vCISO” add‑on, usually pushing their own stack.
- Differentiation: Explicit separation from implementation vendors and a clearly documented risk register and roadmap.
-
Standard
- 1–2 days/month; owns risk register, policy cadence, board reporting and vendor oversight.
- Value: Equivalent to having a part‑time senior security leader at mid‑market vCISO pricing, but explicitly product‑agnostic.
- SLA: 4 hours/month guaranteed consulting time; priority response (4 business hours)
- Warranty: “Risk register updated quarterly with demonstrable risk reduction metrics”
- Competitors: National consultancies rotating multiple consultants across clients.
- Differentiation: Continuity with a named senior advisor who also understands cyber law and forensics, ideal for incident and regulator interactions.
-
Premium
- 3+ days/month; embeds into leadership team, attends exec/board meetings, and guides major programmes (Essential Eight, MDR, DR).
- Value: CISO‑level influence at a fraction of full‑time cost, comparable to large‑firm virtual CISO but with continuity of a single principal.
- SLA: 12 hours/month guaranteed; same-day response for critical issues; board meeting attendance
- Warranty: “Annual risk posture improvement or 15% credit toward next 6 months”
- Competitors: High‑cost vCISO programmes geared to upper mid‑market/enterprise.
- Differentiation: C‑suite‑level participation at SMB pricing, with integrated oversight of Essential Eight, MDR, IR, and supplier risk, not siloed projects.

Essential Eight “Fast‑Track” Implementation
-
Service description
-
Hands‑on help to reach a pragmatic and realistic, risk‑based Essential Eight maturity for Windows, Microsoft 365, servers, endpoints, cloud and SaaS environments, tuned to the business risk and budget.Organisation sizing for the service
Tier
Staff Size
Revenue Range
Example Organisations
Lite
5-39
$500k-$5M
Single-site manufacturers, small e-com, solo+ legal practices
Standard
40-129
$5M-$25M
Multi-line manufacturers, regional retail, 10-partner firms
Premium
130-299
$25M-$60M
Multi-site factories, national online retail, mid-tier nationals
Key deliverables
- Gap analysis report per Essential Eight control (current vs. target maturity).
- Implementation blueprint (who does what, when, and with which existing tools).
- Configuration guides and checklists tuned to your environment (e.g., M365, AD, endpoint platform).
- Verification report showing evidence of control implementation and residual gaps.
- Updated runbooks for IT/helpdesk so changes are operationalised (e.g., patching cadence, application control process).
Unique features
- Outcome‑based: narrow focus on the specific Essential Eight controls that most reduce ransomware and account‑compromise risk for SMBs.
- “No rip‑and‑replace” principle: optimises what the client already owns before recommending new spend.
Service tiers & value
-
Lite
- Focus on a subset of controls (e.g., MFA, patching, backups) for smallest environments.
- Value: Quick uplift on the highest‑impact controls with minimal disruption.
- Warranty: “Target controls reach maturity level 1 or we extend guidance at no extra cost”
- SLA: Verification report within 2 weeks of implementation completion
- Competitors: “Essential Eight compliant” MSP packages that are essentially product bundles.
- Differentiation: Focused uplift of the most impactful controls using what the client already owns, avoiding forced migrations.
-
Standard
- Full Essential Eight gap analysis and roadmap; phased rollout using existing tools where possible.
- Value: Same language and mapping as ACSC, without forcing a specific product stack.
- Warranty: “Full Essential Eight roadmap delivered; controls verified to target maturity”
- SLA: Monthly progress report; final verification within 10 business days of phase completion
- Competitors: Larger firms that treat Essential Eight uplift as a one‑time project with heavy documentation.
- Differentiation: Stepwise, risk‑based roadmap plus operational runbooks so internal IT can sustain the controls.
-
Premium
- Includes hands‑on implementation guidance, verification, staff training, and integration with MDR/IR services.
- Value: End‑to‑end uplift and operationalisation similar to large consultancies, but right‑sized for SMB budgets.
- Warranty: “Independent verification confirms target maturity across all 8 controls”
- SLA: Hands-on support during business hours; 48-hour response for implementation blockers
- Competitors: Full transformation programmes that often exceed SMB budgets.
- Differentiation: End‑to‑end uplift plus verification and training, integrated with MDR and IR, without imposing enterprise‑grade tooling or cost.

Incident Response Retainer & Digital Forensics
-
Service description
-
A standing agreement that guarantees a pre‑agreed incident response plan, on‑call retainer, rapid access to experienced incident responders and forensic specialists, plus structured post‑incident investigations and reporting.Organisation sizing for the service
Tier
Staff Size
Revenue Range
Example Organisations
Lite
15-69
$1.5M-$12M
Small manufacturers, regional retailers, boutique legal
Standard
70-199
$12M-$45M
Mid-size factories, chain stores, mid-tier law firms
Premium
200-399
$45M-$90M
Multi-site ops, national retail, top regional practices
Key deliverables
- Incident response plan tailored to your business (roles, decision trees, notification triggers).
- Contact and escalation sheet for business, legal, insurance and third‑party support.
- During an incident: situation reports, containment checklist, and communication templates for staff/clients.
- Forensic evidence collection plan and chain‑of‑custody documentation.
- Final incident report with root‑cause analysis, timeline, impact assessment and recommendations.
- Optional regulator/insurer pack to support OAIC notifications or insurance claims.
Unique features
- Playbooks tailored to SMB realities (e.g., small IT team, cloud‑first, outsourced helpdesk) with pre‑approved legal, communications and insurer contact trees.
- Evidence handling and timelines structured to support potential legal or regulatory action (e.g., OAIC notifications, contractual disputes).
Service tiers & value
-
Lite
- On‑call availability at a defined SLA, basic IR playbook, discounted hourly rates.
- Value: Insurance‑friendly, gives SMBs a named team to call without large fixed cost.
- SLA: Initial response within 4 hours of notification; discounted rates ($200/hr vs $350 market)
- Warranty: “Pre-agreed playbooks cover 90% of scoped scenarios”
- Competitors: “Call‑us‑when‑it‑burns” arrangements without prior planning.
- Differentiation: Pre‑defined playbooks and contact trees so first 24 hours are organised, even on the smallest retainer.
-
Standard
- Full IR plan, annual tabletop, preferential scheduling, and structured reporting for regulators/insurers.
- Value: Similar to what larger firms provide but translated to SMB scale and local Canberra responsiveness.
- SLA: 2-hour response for ransomware/containment; structured reporting within 72 hours
- Warranty: “Forensic evidence chain-of-custody guaranteed admissible in Australian courts”
- Competitors: Insurer‑aligned IR firms focused primarily on technical triage and containment.
- Differentiation: Forensics and evidence handling built in, with outputs tailored for OAIC, insurers and legal proceedings.
-
Premium
- Includes embedded monitoring/MDR integration, proactive compromise assessments, and legal/communications coordination.
- Value: Almost full “breach readiness programme” for a fraction of big‑brand retainers.
- SLA: 1-hour response; on-site Canberra response within 4 hours if required
- Warranty: “Full incident report within 15 business days post-containment or 25% credit”
- Competitors: Global IR retainers aimed at large enterprises with high annual minimums.
- Differentiation: Integrated readiness (tabletops, MDR, DR) and regulator/communications support, sized for SMB budgets and Canberra‑region availability.

Third‑Party & Supply‑Chain Risk Service
Service description
A structured program to periodically review, assess and provide ongoing oversight cyber risk in your suppliers, and critical manufacturers, logistics partners, SaaS providers and IT partners.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Supplier Count |
|
Lite |
20-79 |
$2M-$12M |
10-30 suppliers |
|
Standard |
80-199 |
$12M-$40M |
30-75 suppliers |
|
Premium |
200-399 |
$40M-$90M |
75-150 suppliers |
Key deliverables
- Supplier criticality matrix and inventory (who supports which process, with what data).
- Tiered security questionnaire sets (lightweight for low‑risk, deeper for high‑risk suppliers).
- Individual supplier risk ratings with concise recommendations per critical supplier.
- Overall third‑party risk dashboard for executives.
- Contract‑language suggestions for cyber requirements you can use with current and new vendors.
Unique features
- Plain‑language questionnaires that suppliers actually complete, aligned with Australian regulatory expectations and common insurance questionnaires.
- Focus on critical suppliers rather than trying to “boil the ocean,” making the program practical for SMBs.
Service tiers & value
-
Lite
- One‑off setup with critical‑supplier list and basic questionnaires.
- Value: Gives SMBs a simple, repeatable process where currently there is often nothing.
- SLA: Critical supplier assessments completed within 4 weeks
- Warranty: “Questionnaires aligned with top 3 insurance questionnaires used in Australia”
- Competitors: Rare – most SMBs have no structured vendor‑risk programme or use generic questionnaires.
- Differentiation: Simple, ACSC/insurance‑aligned questionnaires and a critical‑supplier list that can be run without buying GRC software.
-
Standard
- Ongoing assessments for a defined number of key suppliers, periodic dashboard and contract language support.
- Value: “Third‑party risk management in a box” without GRC platform costs.
- SLA: Quarterly reviews of top 10 suppliers; dashboard updated within 5 business days
- Warranty: “Risk ratings accurate to within 1 tier upon independent validation”
- Competitors: Risk‑advisory firms embedding vendor risk into large GRC engagements.
- Differentiation: Clear per‑supplier pricing and dashboards that work in spreadsheets, not platforms, making it sustainable for small teams.
-
Premium
- Expanded supplier set, deeper follow‑up with high‑risk vendors, and integration into procurement/legal workflows.
- Value: Near‑enterprise vendor‑risk outcomes with spreadsheet‑friendly processes SMBs can actually run.
- SLA: Monthly monitoring of top 5 high-risk vendors; contract clause support within 48 hours
- Warranty: “Programme reduces third-party incidents by 50% within 12 months or credit”
- Competitors: Enterprise‑grade TPRM platforms and consulting.
- Differentiation: Enterprise‑style governance and contract clauses without the licensing and implementation overhead of full GRC suites.
Penetration Testing & Red‑Team‑Style Exercises
Service description
Scenario‑driven penetration testing of your external perimeter, networks, cloud, web apps, and social‑engineering style exercises cloud, applications and people, simulating realistic attacker behaviour with clear business‑level reporting.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Example Targets |
|
Lite |
10-59 |
$1M-$10M |
Single web app, external perimeter |
|
Standard |
60-199 |
$10M-$40M |
External + M365 + 1-2 apps |
|
Premium |
200-499 |
$40M-$100M |
Full red-team (network + app + social) |
Key deliverables
- Rules‑of‑engagement document approved by you before testing begins.
- Findings report with: executive summary, attack narrative, technical details and remediation guidance.
- Evidence pack (screenshots, logs, proof‑of‑concepts) for each critical and high‑risk issue.
- Validation test results showing whether fixes have been effective (for agreed items).
- Read‑out workshop with IT and management to review findings and agree next steps.
Unique features
- Business‑impact narrative in the report: “what an attacker could do in business terms” is the headline section.
- Optional joint‑review workshop with IT and management to walk through findings and prioritisation instead of leaving teams with a long list.
Service tiers & value
-
Lite
- Scope‑limited pen test (e.g., external perimeter only, or single web app) with standard report.
- Value: Entry‑level assurance beyond automated scans, suitable for budget‑constrained SMBs.
- SLA: Final report within 5 business days of testing completion
- Warranty: “Manual validation of top 10 automated findings”
- Competitors: Low‑cost testers mostly running automated scanners.
- Differentiation: Manual testing time reserved even in Lite, and business impact explicitly described in the report.
-
Standard
- Broader scope (e.g., external + cloud, or app + basic social engineering), clear attack narrative, remediation workshop.
- Value: Comparable to serious competitors’ core offerings, but with stronger storytelling for non‑technical leaders.
- SLA: Remediation workshop within 7 days of report delivery
- Warranty: “Business impact of each finding quantified in revenue/downtime terms”
- Competitors: Reputable testing firms delivering solid technical reports but limited remediation support.
- Differentiation: Joint read‑out workshops and prioritisation sessions, aligned with your Essential Eight and IR services.
-
Premium
- Red‑team style scenarios, multi‑phase campaigns, integration with MDR and IR drills, re‑testing included.
- Value: Real‑world attack simulation usually offered to larger enterprises, adapted to SMB constraints.
- SLA: Re-test of critical findings within 30 days of remediation
- Warranty: “Attack scenarios tied to real client MDR/IR playbooks”
- Competitors: Red‑teams aimed at large corporate security teams.
- Differentiation: Red‑team‑style campaigns designed to test SMB‑size processes and staff, tied directly into MDR and IR playbooks.
Security Awareness, Culture & Phishing Program
Service description
A practical, Australian‑context program that lifts staff security awareness and changes behaviour using training, simulations and targeted nudges with content specific to manufacturing, retail and legal scenarios.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Training Groups |
|
Lite |
10-69 |
$1M-$12M |
All-staff baseline |
|
Standard |
70-199 |
$12M-$40M |
Role-based campaigns |
|
Premium |
200-499 |
$40M-$100M |
Culture + leadership programme |
Key deliverables
- Baseline survey and/or phishing simulation to measure current risk levels.
- Annual training plan (topics, cadence) tailored by role and sector.
- Library of short training modules (videos, micro‑lessons, toolbox‑talk scripts).
- Regular phishing campaigns with individual and aggregate metrics.
- Quarterly report to management on engagement, click‑rates and improvement trends.
Unique features
- Stories and examples drawn from Australian SMB incidents and ACSC guidance, not US‑centric case studies.
- Add‑on modules for executives and board members focusing on governance, not passwords.
Service tiers & value
-
Lite
- Baseline training package and one phishing simulation/year.
- Value: Simple step change from no training, with clear metrics.
- SLA: First phishing campaign live within 2 weeks; metrics report within 5 days
- Warranty: “Click rates below 30% within first campaign”
- Competitors: Generic e‑learning bundles with little localisation or reporting.
- Differentiation: Australian examples, ACSC messaging, and baseline phishing metrics even at entry level.
-
Standard
- Annual programme with several campaigns, targeted modules, and quarterly reporting.
- Value: Comparable to global awareness platforms, but localised and managed for the client.
- SLA: Quarterly campaigns on schedule; detailed metrics within 3 business days
- Warranty: “15% click-rate reduction every 6 months or additional campaign free”
- Competitors: Subscription training platforms with templated campaigns.
- Differentiation: Managed service with tailored content for manufacturing, online retail and legal staff roles.
-
Premium
- Culture‑focused approach: custom content for sectors, leadership workshops, behavioural nudges, and continuous metrics.
- Value: Moves beyond compliance into measurable behaviour change, which many low‑cost platforms don’t target.
- SLA: Monthly campaigns + leadership briefings; real-time dashboard access
- Warranty: “Phishing susceptibility <10% within 12 months or programme extension”
- Competitors: Culture‑oriented programmes mainly sold to large enterprises.
- Differentiation: Behaviour‑change focus (nudges, leadership engagement, metrics) brought to SMBs at accessible cost.
Backup, Continuity & Ransomware Resilience Review
Service description
Independent assessment of how well your backup, disaster‑recovery and continuity approach would stand up to ransomware and major outages, with special focus on ransomware resilience and cloud SaaS data protection.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Critical Systems |
|
Lite |
15-59 |
$1.5M-$10M |
Core servers + M365 |
|
Standard |
60-179 |
$10M-$35M |
Servers + cloud + ERP |
|
Premium |
180-399 |
$35M-$85M |
Multi-site + OT integration |
Key deliverables
- Current‑state backup and continuity map (systems, RPO/RTO, ownership).
- Gap and risk report highlighting single points of failure and ransomware‑specific weaknesses.
- Recommended target‑state architecture and process changes that are vendor‑neutral.
- Tabletop exercise plan and facilitation for at least one major scenario.
- Post‑exercise report capturing lessons learned and agreed improvements.
Unique features
- “Time to survive” analysis: quantifies how long key processes can be offline and tests against actual backup/restore performance.
- Vendor‑neutral guidance on immutable backups, offline copies and SaaS backup strategies.
Service tiers & value
-
Lite
- One‑off review of backup configuration and simple continuity checklist.
- Value: Fast, independent sanity‑check beyond “it’s backing up”.
- SLA: Review report within 2 weeks of discovery
- Warranty: “Identifies single points of failure with recovery time estimates”
- Competitors: MSP backup checks (“green lights on the console”).
- Differentiation: Independent view and explicit RPO/RTO vs. business‑need analysis.
-
Standard
- Detailed resilience review, tabletop exercise, and target design.
- Value: Approaches big‑firm DR/BCM quality in an SMB‑ready package.
- SLA: Tabletop exercise facilitated within 4 weeks
- Warranty: “RTO/RPO gaps quantified vs business requirements”
- Competitors: Traditional DR/BCM consultants with complex frameworks.
- Differentiation: Ransomware‑specific testing and tabletop exercises tied to real systems and staff.
-
Premium
- Ongoing annual exercises, improvement tracking and integration with IR/MDR services.
- Value: Continuous resilience programme, uncommon at SMB price points.
- SLA: Annual exercise + progress tracking quarterly
- Warranty: “Recovery success rate >90% in annual test or free re-facilitation”
- Competitors: Large, multi‑site continuity programmes.
- Differentiation: Annual exercises and continuous improvement in a format SMBs can run with limited headcount.
OT/Manufacturing & Office Segmentation Assessment
Service description
A practical segmentation and security review for mixed IT/OT environments, mixed office/plant environments, focusing on isolating OT/ICS from corporate IT and internet threats, keeping production and safety‑critical systems shielded from common IT threats.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Plant Size |
|
Lite |
25-79 |
$2.5M-$15M |
Single small plant |
|
Standard |
80-199 |
$15M-$45M |
1-2 medium plants |
|
Premium |
200-399 |
$45M-$90M |
Multi-site manufacturing |
Key deliverables
- Network and asset map showing IT, OT and external connectivity.
- Segmentation design (zones and conduits) that can be implemented with your existing or planned network gear.
- Risk and impact report focused on production, safety and regulatory implications.
- Implementation plan with phased steps to move from current to target segmentation.
- Optional on‑site walk‑through and handover session with operations and IT teams.
Unique features
- Operationally‑aware recommendations that take into account uptime constraints and safety requirements, not just pure IT theory.
- Uses realistic roadmaps that can be implemented with existing network gear and staged upgrades.
Service tiers & value
-
Lite
- High‑level review and simple zoning recommendations for small facilities.
- Value: Gives a clear direction for plants that currently have flat networks.
- SLA: High-level zoning within 3 weeks
- Warranty: “Recommendations compatible with existing network hardware”
- Competitors: Network integrators who treat OT as standard IT.
- Differentiation: OT‑aware recommendations considering uptime and safety, even in a high‑level review.
-
Standard
- Detailed asset mapping, risk analysis, and staged segmentation blueprint.
- Value: Similar conceptual depth to large OT providers but scoped for SMB operations.
- SLA: Full segmentation design within 6 weeks including on-site walkthrough
- Warranty: “Zone/conduit design per CISA ICS-07-16 guidelines”
- Competitors: OT security firms with heavy methodologies and high price points.
- Differentiation: Equivalent conceptual rigour in zone/conduit design, scaled to smaller plants and budgets.
-
Premium
- Implementation oversight, tuning post‑cutover, and integration with monitoring/IR.
- Value: Feels like a full OT‑security engagement without enterprise‑grade pricing.
- SLA: Implementation oversight first 30 days post-design
- Warranty: “Traffic flow validation confirms 95% isolation effectiveness”
- Competitors: Complex industrial security transformation projects.
- Differentiation: Implementation oversight and IR integration without requiring proprietary OT platforms.
Retained Security Advisor for Legal & Professional Firms
Service description
A retained sector‑specific security advisory and controls for legal, accounting and other professional services firms, focused on confidentiality, client‑data protection and incident readiness for legal, accounting and other professional practices.
Organisation sizing for the service
|
Tier |
Staff Size |
Revenue Range |
Partner Count |
|
Lite |
8-39 |
$1M-$6M |
2-6 partners |
|
Standard |
40-99 |
$6M-$20M |
7-15 partners |
|
Premium |
100-199 |
$20M-$50M |
16-40 partners |
Key deliverables
- Sector‑specific risk profile and priorities (e.g., privilege, client confidentiality, regulator expectations).
- Secure‑practice guidelines for email, document management, client collaboration and court/government portals.
- Customised playbooks for mailbox compromise, lost documents/devices and sensitive‑matter data loss.
- Periodic risk and incident‑trend briefings for partners and practice leaders.
- Support materials for client RFPs and audits, demonstrating your security posture.
Unique features
- Emphasis on legal privilege, secure client collaboration, and safe handling of court and government documents.
- Pre‑built playbooks for business email compromise of partners or client‑facing staff.
Service tiers & value
-
Lite
- Quarterly risk review and ad‑hoc advice focused on email, DMS and client data handling.
- Value: Gives smaller practices a “security partner” without large monthly cost.
- SLA: Quarterly reviews on schedule; 24-hour response for privilege incidents
- Warranty: “Playbooks cover 100% of OAIC notifiable scenarios”
- Competitors: Generic MSP security advice not tailored to legal privilege or regulator expectations.
- Differentiation: Advice framed around confidentiality, privilege and client expectations, not just “IT security”.
-
Standard
- Monthly engagement, sector‑specific playbooks, and support for client security questionnaires.
- Value: Competitive with generalist advisory retainer, but tuned specifically for legal and related professions.
- SLA: Monthly advisory; client questionnaire support within 48 hours
- Warranty: “Security posture meets top-50 firm benchmarks”
- Competitors: Generalist vCISO services with no legal‑sector specialisation.
- Differentiation: Sector‑specific playbooks (mailbox compromise, sensitive‑matter handling) and support with client security questionnaires.
-
Premium
- Deep partner‑level engagement: attendance at partner meetings, support in high‑sensitivity cases, and preparation for audits/regulator scrutiny.
- Value: Positions the firm as security‑mature to sophisticated clients, similar to top‑tier law practices’ security posture but at SMB‑aligned pricing.
- SLA: Partner meeting attendance; same-day incident coaching
- Warranty: “Zero privilege/data loss incidents attributable to security gaps or credit”
- Competitors: High‑end advisory engagements aimed at top‑tier firms.
- Differentiation: Partner‑level engagement, incident coaching and client‑facing security positioning tailored for mid‑tier and boutique practices.
80% Remote Services: Virtual assessments, cloud-based management, online training.
20% Onsite Services: Critical incident response, physical assessments, executive briefings.






