Frequently Asked Questions

Do you come to our office for meetings or to conduct cyber assessments?

Yes, we can. While many of our services can be delivered remotely, we’re happy to visit your office for on-site assessments, workshops, or strategy meetings—especially for Melbourne-based clients.

Do you provide SMB1001 certification?

Yes. We are an authorised CyberCert partner and can guide you through the process of achieving SMB1001 Certification, including a formal audit and certificate upon passing.

Do you provide cybersecurity services for Microsoft 365 as well as Google Workspace?

Yes. While we are recognised specialists in Google Workspace security, we also provide cybersecurity services for Microsoft 365 environments.

Are you able to perform penetration tests on web apps?

Yes, we frequently conduct web application penetration testing. Get in touch with us to discuss your application and goals—we’ll tailor the scope to your needs.

How do I start with Sentry Cyber?

Getting started is easy—just give us a call at 1800 526 269 or contact us here. One of our specialists will walk you through your options and provide clear, practical advice—no pressure, no obligations.

We’ve been hacked! What should we do?

If you have a cyber incident response plan, follow it immediately. If not, power down affected systems and contact us urgently. Acting fast can significantly reduce the damage.

What is ransomware?

Ransomware is malicious software that encrypts your data and demands payment—usually in cryptocurrency—to restore access. It’s one of the fastest-growing cyber threats facing businesses today.

Do you provide IT help desk support?

We don’t offer general IT support or managed IT services. Our focus is purely on cybersecurity, though we do assist with security-related issues and work alongside your existing IT team or MSP.

What’s the difference between an MSP and a cybersecurity business like Sentry?

MSPs (Managed Service Providers) typically offer general IT support, whereas we specialise exclusively in cybersecurity—offering risk assessments, penetration testing, awareness training, and ongoing security monitoring.

Do you offer special pricing for not-for-profit organisations?

Yes, we offer discounted rates for eligible not-for-profits. Contact us to find out more about how we can support your mission securely and affordably.

What are your payment terms?

We require payment in advance for most of our services. Managed security services are typically billed monthly, and project-based work is invoiced upfront or on milestone completion. We accept EFT or credit card payments

Can you provide services interstate or internationally?

Absolutely. We work with clients across Australia and overseas through a combination of remote services, on-site visits where needed, and secure communication tools.

Do you charge to review my current IT environment?

No. We offer a complimentary cybersecurity workshop that identifies key gaps and vulnerabilities—what we call the “tip of the iceberg”—to help you prioritise your next steps.

Do you provide cybersecurity apps or software?

Yes. We offer carefully selected cybersecurity tools for backup, threat detection, phishing protection, and more—integrated into our managed security services.

Do you offer a guarantee?

Yes. Our managed security clients are protected by our data breach guarantee: if you suffer a breach while under our protection, we’ll refund your managed security fees for that period.

Do you provide cyber awareness training in person?

Yes. We deliver engaging cyber awareness training both in person and online. Sessions are tailored to your industry, team size, and specific risks.

What is a penetration test?

A penetration test (or “pen test”) simulates a real-world cyberattack to uncover weaknesses in your systems or applications—before the attackers do.

What is a vulnerability assessment?

A vulnerability assessment is a scan and review of your environment to identify known security weaknesses that could be exploited by attackers.

What’s the difference between SMB1001 and Essential Eight?

SMB1001 is a certification tailored for small to mid-sized businesses to demonstrate cyber hygiene, while Essential Eight is an Australian government framework outlining specific security controls. Both are valuable but serve different purposes.

Are you able to provide cybersecurity services for remote teams?

Yes. Many of our clients operate with hybrid or fully remote teams. We specialise in securing cloud platforms, remote access, and collaboration tools like Google Workspace and Microsoft 365.

Can you harden our web app?

Yes. We offer secure code reviews, infrastructure hardening, and continuous security monitoring for web applications to reduce the risk of compromise.

Do I need to back up Google Workspace?

Yes. Google’s native tools are not backups—they’re productivity tools. We strongly recommend backing up Google Workspace and Shared Drives using third-party solutions.

Does Google Workspace provide adequate protection against Phishing?

No. Google Workspace only provides basic Spam and malware protection from emails. We highly recommend an effective Secure Email Gateway (SEG) such as IronScales to provide best in class protection.

Are you able to provide services for large businesses or enterprises?

Yes. While we’re best known for helping SMBs, our team has experience working with enterprise environments, especially those using Google Workspace or needing expert assessments.

How often should I review my cybersecurity posture?

We recommend conducting a cybersecurity review at least annually—or immediately after a major change in your systems, such as a cloud migration or staff restructure.

Do you help with phishing simulations?

Yes. We run tailored phishing simulation campaigns to test and train your staff, and provide follow-up reporting and awareness training.

Can you help us meet compliance requirements (ISO 27001, GDPR, Essential 8, etc.)?

Yes. We help clients align with major compliance frameworks by identifying gaps, implementing controls, and providing evidence for audits.

Do you offer ongoing cybersecurity monitoring?

Yes. Our Managed Security service includes 24/7 monitoring of key systems, alerting, and response to threats in real-time.

What industries do you work with?

We work across a range of industries including finance, healthcare, education, real estate, technology, media and not-for-profits—especially those using Google Workspace.

Do you offer one-off assessments or only ongoing services?

We offer both. Whether you need a single audit or want a long-term security partner, we can tailor our services to meet your needs.

What size businesses do you typically work with?

Most of our clients are small to mid-sized businesses (10–200 users), but we also support larger organisations needing specialist cloud security expertise.

Can you help us set up security policies in Google Workspace?

Yes. We offer full configuration and policy hardening for Google Workspace, including 2FA, device management, DLP, context-aware access, and more.

How long does a cyber risk assessment take?

Most risk assessments are completed in 3-6 weeks depending on the size of your organisation and scope of the review.

What is your process for onboarding a new client?

We start with a discovery call or workshop, followed by a tailored proposal. Once approved, we begin onboarding with a security assessment and implementation roadmap.

Do you work with in-house IT teams or external MSPs?

Both. We regularly collaborate with internal IT departments, MSPs, and leadership teams to deliver security without stepping on anyone’s toes.

Can you help us respond to insurance or cyber liability requirements?

Yes. We can help you prepare for insurance applications, answer technical questions, and implement controls insurers typically require.

Do you offer a white-labelled service for MSPs or consultants?

Yes. We partner with MSPs and consultants who want to offer expert cybersecurity services without building a full internal team.

Is your team certified or qualified?

Yes. Our team includes professionals with certifications such as Certified Penetration tester (eCCPT), Certified Malware Analysis Professional (eCMAP), Certified Ethical Hacker (CEH) Certified Application Security Practitioner, Certified Cyber Security Technician (CCT), Certified in Cybersecurity (ISC2) and Google Workspace Admin credentials, ensuring technical depth and credibility.

How is Sentry Cyber different from traditional cybersecurity firms?

We specialise in cloud-first environments especially Google Workspace, which most traditional firms don’t. We’re also known for making cybersecurity simple, practical, and easy to action.