Cyber Security
Cyber Security risk management cannot be ignored. Protect your data before it’s too late.
Cyber Security: Backups
Mawson Tech use top of the range cloud backups to save your data so it cannot be lost.
Cloud backups are the single most important feature of our service. It saves your data to online storage multiple times a day, automatically in the background.
Multi Factor Authentication
We implement Multi Factor Authentication using Microsoft 365.
All of our Managed IT customers have multi factor authentication enabled, because it is one of the easiest way to straight up prevent accounts from ever being logged in to by hackers.
Managed Updates
Mawson Tech install software on our managed computers that tracks and reports on what updates are installed.
Our managed customers can read these reports and know that their systems are up to date and not vulnerable to the latest CVEs.
Make sure you update.
Don’t just take our word for it. Watch the ACSC Updates video to learn about why you need to update your computers.
Use Multi Factor Authentication for easy Cyber Security.
Multi Factor Authentication prevents hackers from getting into your accounts.
It’s the single most effective tool in combating Business Email Compromise.
ACSC Essential Eight guide to Cyber Security
The ACSC Essential Eight are a set of guidelines for implementing Cyber Security in a business environment running Microsoft systems. It’s a plan for making your business secure and resistant against cyber threats. Mawson Tech can help you implement the Essential Eight. Get your organisation on the offensive in the fight against cyber criminals seeking to break into your systems.
Application Control
Application Control, Centralised Logging
Application control blocks all applications from running on your windows computer without them being whitelisted first. By controlling the processes that are allowed to run on computers, you can protect your users from running software that pretends to be legitimate, but is actually a virus or malware.
Patch Applications
Patch Management, Reporting
Making sure to patch applications protects users from software bugs that are exploited to provide hackers with access into your business files and data.
Configure Microsoft Office macro settings
Microsoft Office, Centralised Logging
Microsoft Office allows users to write code inside applications like Word and Excel. This was intended to grant power users more productivity, but more often than not result in normal users executing viruses. Controlling your users ability to run Microsoft Office macros protects against this common threat.
User application cyber security hardening
Ad blocker, Office hardening
You can enable certain settings that protect your users against threats that use common Windows applications to deploy viruses and malware. These settings generally are not required for businesses that are not enterprise and are a quick win for cyber security.
Restrict administrative privileges
Privileged user accounts, Just in time administration
Allowing your users to use a privileged account for day-to-day tasks is a recipe for disaster. If their account gets compromised, your business will suffer a much larger breach than if they are just a standard user account.
Patch operating systems
Centralised Update Management, Reporting
Your operating systems should be patched with the latest updates to prevent hackers from taking advantage of bugs that are present in older versions of Windows.
Multi-factor authentication
Microsoft Authenticator
ACSC generally recommend that multi-factor authentication is enabled for any internet facing service. This includes Microsoft 365, Business Applications and internal applications that are remotely accessible.
Regular backups
Cloud Backups
Not only to the ACSC recommend backups for your data, software and configuration settings, but they also recommend testing your backups regularly and performing disaster recovery exercises.
Microsoft 365 Security
It’s very easy to create a Microsoft 365 account. You can embrace the Microsoft platform and enjoy the productivity boost, collaboration tools and cohesion of the platform. However, you have to know – out of the box, Microsoft 365 is not secure. You’ll need a trusted IT partner to implement the more complicated parts of the Microsoft 365 stack to truely be a secure organisation.

This is where Mawson Tech will help.
Some providers will boast of their years of experience, or industry certifications. But the truth is that Microsoft 365 is change so rapidly that in many cases, experience is a liability. Sometimes people just don’t want to change with the times. However, Mawson Tech employees do have significant experience managing extremely large Microsoft 365 tenancies at large contractors for enterprise. When you engage Mawson Tech to provide cyber security services, you can rest assured that we are applying enterprise level protections for your organisation.
Firewall and Antivirus are not enough.
It makes sense for an IT provider to offer a firewall and antivirus package and say that you are now secure. For instance, they make an instant profit on the package they have sold. In reality, as with most things, the most value is provided through projects. Mawson Tech have compiled a stack of packages that will configure your Microsoft 365 tenancy to a secure state, enable the features required on your computers to take maximum value from your licenses, and train your users and admins on how to operate the system.

Let’s get your Cyber Security up to date.
Get Mawson Tech to evaluate your Cyber Security so you can see your risks and how you can mitigate them.
It’s never too late to increase your data protection.