Pegasus Technologies Cyber Initiative
At Pegasus Technology, we’ve proactively transitioned all our clients to a more secure cyber footing.
Pegasus Technologies Cyber Secure Environment is designed for 365 Tenancy and local system user and server devices.
It addresses the requirements of the Essential Eight Maturity Levels 1 and 2, as well many requirements from cyber insurance questionnaires.
This comprehensive approach ensures a robust and measurable cybersecurity posture for both Office 365 environments and local systems.
Our environment will allow you too confidently,
-
assess for Essential 8 – Maturity Level 1 or Level 2
-
answer the cyber security questionnaires.
Note: the Essential eight assessment is not included in the Cyber Secure Environment costs.
However, I am a qualified ACSC TafeCyber Essential Eight Assessor. Qualification #77 and can perform the accessment if you need the certification.
The Pegasus Technology Approach
It’s all well and good for me to tell you that you need our ‘Cyber Secure Environment’. But how do you know that you are secure.
Yes, we have extensive knowledge and a long history (40+ years) of implementing and supporting secure IT environments.
There are 2 ways I can see for us to measure your security:
1. The Essential Eight Framework
Australian Signals Directorate /Australian Cyber Security Centre created the Essential Eight maturity model (All government Departments are required to meet the Essential Eight maturity level and we are already seeing that come down the supply chain).
The Essential eight lists 8 mitigation strategies that need to be implemented to reach a specific Maturity Level and documents the controls and tests to validate their implementation. Essential Eight Explanation
2. Cyber Insurance questionaries.
Cyber Insurers have skin in the game – If you get breached, they pay – So their questions are relevant.
Cyber insurance questionnaires cover various security products. Having a cyber-secure environment reduces your risk, enabling you to confidently answer yes to the various technology-related questions. As a result, your risk is minimised, their risk is minimised leading to potentially lower insurance premiums..
Answer ‘no’ to all of them, and you may find yourself without coverage.
Your existing Cyber Security Posture probably consists of:
From a Cyber Insurance viewpoint, this is a consolidated list of the questions I have seen:
With the Pegasus ‘Cyber Secure Environment’ you will have:
Don’t wait, book an Free Initial Call to discuss your Cyber Security requirements and how our ‘Cyber Secure Environment’ can help.
Pegasus’s Cyber Secure Environment addresses the following security issues:
Pegasus Cyber management Services
Pegasus Technology offers two classes of services in the Cyber Security domain. These allow us to implement and manage our Cyber Secure Environment.
- 365 tenancy support to maintain the security of the environment and support users within this environment.
- Desktop/Server Security Support – Cyber Support for your desktop/server environment.