planning

Basic Capability

We are in the early stages of developing our capability and have improvements to make. We likely:

  • Aim to keep data secure but have limited formal controls covering people, processes and technology
  • Have firewall and antivirus protection, but it isn’t centrally managed or monitored
  • Have few IT security policies.

See how you have improved

Intermediate Capability

We have the fundamentals under control to protect our information, but further improvements are possible. We likely:

  • Have implemented most of the ACSC’s Essential 8 security protections
  • Educate staff about where information should be stored based on what type of data it is – sensitive, confidential, public etc
  • Securely encrypt and password-protect all devices that store sensitive information (such as client data)
  • Centrally manage and monitor network firewalls
  • Have approved security policies that staff understand and follow.

See how you have improved

Advanced Capability

Our security protections work very well, deliver value and support us to achieve our mission. We likely:

  • Have been independently assessed and confirmed as compliant against an information security standard
  • Have a system that collects and analyses security information from all devices and accounts, identifying risks and appropriate actions
  • Regularly reinforce security education so that staff consider security a key responsibility
  • Undertake compliance testing to identify issues assess their risk and prioritise appropriate remedial action.

See how you have improved

How ready are you?

Spend a few minutes to know how ready your organisation is to move to the cloud. This will help you understand what materials below will be on most valuable as you chart your own path to digital transformation.

Need More Expertise?

We have experts who can give you more tailored advice. Book now for a 30-min session to get key questions answered.

Book now

Lessons learnt in cyber security

How one organisation became a victim of a sophisticated cyber-crime. Hear their lessons learnt to make sure you are not next.

Learn more

Cyber security overview
Guide
Cyber security: What it is and why it matters
The basics on why it's so important to protect your organisation's information.
Why cyber security is so important
Guide
Why cyber security is so important
An overview of why cyber security protection is a must for every organisation.
IT management
Guide
What do we mean by ‘IT management’?
IT management covers digital technology initiatives at a strategic level. It helps you plan effectively, manage digital technology projects and budgets, and get staff and executive buy-in.
Training for IT strategy, planning and management
Training
Digital transformation /IT strategy course
If your organisation needs help planning for digital technology investment into the future, look no further than webinars presented by Connecting Up.
IT asset register template
Guide
Develop your digital technology assets register
A digital technology assets register can help with your decision making, planning and budgeting.
Team planning on butcher's paper
Guide
Planning your online communications
How to identify your target audience, your goals, key messages and channels, and then make a plan.
Achieving intermediate level cyber security
Guide
Achieving intermediate cyber security
How to plan for and implement a road map to intermediate-level protection from cyber attacks.
Achieving best-practice cyber security governance
Guide
Best-practice cyber security governance
An overview of how to incorporate cyber security policies and governance into your organisational processes.
Privacy guidelines for not-for-profit organisations
Guide
Privacy guidelines for not-for-profits
Download these privacy guidelines for detailed advice on how to protect your organisation's data.
End user security policy template
Guide
DIY end user security policy
Download a high quality end user security policy template that you can adapt to your organisation's needs.
Using volunteers for IT
Guide
Resourcing to meet your digital technology/IT needs
Achieving your technology and IT goals requires resourcing, which begins with identifying your needs and solutions.
Graphic icon of hand holding a cog
Guide
Achieving advanced IT management
What constitutes advanced IT management (digital strategy and governance) and what to do to get there.
Achieving advanced level cyber security
Guide
Achieving advanced cyber security
How to plan for and implement a road map to advanced-level protection from cyber attacks.
Man and woman looking at an Ipad
Guide
How to set up a Digital Technology / IT Steering Committee
Learn about the responsibilities of a Digital Technology / IT Steering Committee and how to set up for success.