Services
Managed Detection and Response
To minimise cyber security risk, being able to rapidly identify and respond to attacks is essential. We supply the people, technology and cyber intelligence required to hunt for specific threats across your organisation’s networks and endpoint devices to ensure they are configured properly.
We can provide ongoing monitoring and management of your threat detection.
MDR versus ISP
Many businesses enlist the help of an Internet Service ProviderThe organisation that provides connectivity to the Internet for individuals or companies. Some ISPs offer additional services above that of just connectivity such as e-mail, web hosting and domain registration. (ISPThe organisation that provides connectivity to the Internet for individuals or companies. Some ISPs offer additional services above that of just connectivity such as e-mail, web hosting and domain registration.), however they find that the company provides little value beyond IT management, does not adapt quickly enough to the evolving cyber threat landscape that impacts the network, and is too slow to protect the business.
PDSS is a Managed Detection and Response (MDR) provider that, through an outcome-focused approach, delivers the actionable insight organisations need to proactively detect current and emerging cyber threats and respond rapidly to incidents.
Assessment services
PDSS’ cyber security assessment services are designed to uncover vulnerabilities across your organisation, validate the effectiveness of security controls and processes in place, and provide the support and advice required to address security risks.
Compliance
Businesses have to work within a heavily regulated landscape and are under pressure to meet increasingly complex compliance requirements.
Operating in a competitive tender environment for bank, government and other large businesses, we guide you to stand out against the rest.
We work with you to meet your responsibilities and to demonstrate that you are taking action to protect your business, customers, stakeholders and partners in an increasing hostile cyber security environment.
PDSS understand the need to meet multiple standards are able to map and create an integrated system for your business s\o that you do not have multiple systems to manage. Integrations include:
GDPR /APP
To support General Data Protection Regulation (GDPR) and Australian Privacy Principles (APP) compliance, PDSS’ cyber security solutions help organisations to safeguard personal data by identifying vulnerabilities, proactively monitoring threats and facilitating a swift response to incidents.
ISO 27001
Learn how PDSS’ penetration testing advice and incident management services can help you to improve your information security to ISO 27001 standards.
PCI DSS
We reduce the cost and complexity of meeting the lengthy list of requirements that affect any organisation needing to process, transmit or store credit and debit card payment information. We can show you ways to use 3rd parties to reduce your risk.
Other Regulations that may affect your industry.
Sector | Commentary |
---|---|
Banking and Finance | APRA CPG 235 /CPS 235 and CPG 234 / CPS 234, relevant sub sections of each section RGI04 of AFSL license obligation (RG 104.93 and RG 104.96). Additionally, recommended to follow ISO 2700 l/2 and COBIT 5. |
Federal Government | Australian Government Protective Security Policy Framework (PSPF) and Information Security Manual (ISM) |
Healthcare Providers | Royal Australian College of General Practitioners (RACGP) Computer and Information Security Standards, National Health and Medical Research Council’s “The regulation of health information privacy in Australia”. Additionally, recommended to follow ISO 27001/2 and COBIT 5. |
Internet Service Providers | Communications and Media Authority’s “Australian Internet Security Initiative” (ACMA, 2015), Telecommunications Providers (Interception) and Listening Device Amendment Act. Additionally, recommended to follow ISO 27001/2. and COBIT 5. |
Mining | None. Recommended to follow ISO 27001/2, ISO 27019 and COBIT 5 |
Retailers | None. Recommended to follow ISO 27001/2 and COBIT 5 |
State Government | Victorian Protective Data Security Framework (VPDS). Where Victorian organisations handle information of national interest, the Protective Security Policy Framework (PSPF) requirements remain mandatory and supersede any obligations set out in the VPDSF. |
Telecommunications Providers | Telecommunications (Interception) and Listening Device Amendment Act, Australian Communications and Media Authority’s “Australian Internet Security Initiative” (ACMA, 2015). Additionally, recommended to follow ISO 2700112, and COBIT 5. |
Utilities Companies | None. Recommended to follow ISO 27001/2, ISO 27019 COBIT 5, and NERC-CIP V5 |
Training
In today’s changing threat landscape, protecting the confidentiality of sensitive information is just as important as providing a high standard of education.
Employees make mistakes and approximately 80% of cyber security incidents can be traced to people.
As business owners, you have a legal responsibility to keep your business and customer information safe. That’s why having a cyber security training program is vital.