Find your biggest cyber risks

Complementary Cyber Security Workshop

Many dangerous cyberย  threats often lurk below the surface, out of sight and easy to miss. Our Complementary Cyber Security Workshop targets theย  “tip of the iceberg,” investigating the most common and highest-risk vulnerabilities (such as phishing, which counts for 90% of current cyber attacks). If we find issues here, deeper problems may lie beneath. We’ll show you what’s urgent, how to fix it, and where you should consider further investigation, ensuring you address your largest security risks right away.

Gmail & Outlook

Web Apps & E-Mail

We’ll check if things like secure logins (multi-factor authentication) are setup and if your data is safe. We will also assess how likely your team is to fall for a phishing scam.

Gmail & Outlook

Local Network & Servers

We’ll look at your computers, servers, and network devices to see if they’re patched, protected by antivirus, and safe from ransomware attacks & Backed up.

Gmail & Outlook

Wi-Fi & Guest Internet

We’ll make sure your wireless network is secure, reducing risk of intruders.

Gmail & Outlook

Policies & Training

We’ll review any existing plans for handling emergencies (e.g. cyberattacks) and see if your team has basic cybersecurity awareness.

What you’ll get?

Practical Security Tips

specific to your organizations setup

Right Time, Right Lesson

of any major risks (and how to fix them)

Built on Real Threats

for advanced areas of deeper security testing e.g. pen testing (if needed)

How it works ?

๏‰ด

Book A Schedule

Schedule a time that works for you and kick-start your security with ease.

๏š

Share Basic Info

Have your logins available for your systems (e.g. your server/router logins or key software), as well as any written IT policies you have.

๎ค

Quick Audit

We will do a top-level check of your IT environment and security practices done via online meeting using screen share or in person.

๏€ค

No-Obligation Report

Receive an easy to follow summary of findings, along with a clear plan to address any urgent issues and recommended cyber framework to achieve.

READY TO SECURE YOUR BUSINESS?

One Critical Thing Most People Don't Realise

Sentry Cyber regularly helps DISP members, applicants, and Defence supply-chain businesses measure where they genuinely sit, build a roadmap to full Level 2, and maintain ongoing compliance as requirements evolve.
Reference:
Defence Industry Security Program โ€” Cyber Assurance

To genuinely claim a maturity level, every one of the eight mitigation strategies must meet that level. Being excellent at seven and weak at one means your overall maturity is dragged down to the weakest control.

This is why self-assessments so often give a false sense of security and why an independent review matters. We measure every strategy individually, so there are no surprises when an insurer or auditor does it for you.

Mandatory for DISP Members
Full Maturity Level 2

If you work with the Australian Government or Department of Defence, Essential Eight compliance is no longer a nice-to-have.

All Defence Industry Security Program (DISP) members are now required to achieve and maintain compliance with the full Essential Eight Maturity Level 2 standard. That is a meaningful step up from earlier DISP cyber requirements, and it demands demonstrable, evidence-based controls across every one of the eight strategies.