Skip to content
Home
Wyze Words
Our Services
DISP Cyber Security Services Australia | Essential Eight ML2 | Cyber Wyze
Essential Eight Assessment & Uplift (ML2) | Cyber Wyze
Managed IT Services | Secure IT Operations | Cyber Wyze
Data Security & Data Loss Prevention Services | Cyber Wyze Australia
AI Data Security and Governance Services | Cyber Wyze
CMMC Cyber Security Services Australia | Implementation & Managed Cyber | Cyber Wyze
Critical Information
Case Studies
Customer Case Study – Aquila
Customer Case Study – Active Fleet
DISP
Defence Industry Security Program (DISP)
Navigating Essential 8, DISP & CMMC
DISP Maturity Action Plan (MAP)
DISP Cyber Security Requirements — A Complete Guide
Essential 8
Essential 8 Cyber — A Complete Guide in Plain English
Budgeting for Essential 8 Uplift: Cost Factors and ROI Considerations
CMMC
What is CMMC? An Australian View
What is CMMC 2.0?
Who Needs CMMC?
Data Security & DLP
What is Data Loss Prevention (DLP)?
How to Protect CAD Files: Breakthrough Encryption
The Top 5 Causes of Data Loss and How to Address Them
About
Locations
Cyber Security Services Brisbane | DISP, Essential Eight & Data Security | Cyber Wyze
Cyber Security Services Sydney | Enterprise Security, E8 & Data Protection | Cyber Wyze
Cyber Security Services Adelaide | DISP, Essential Eight & DLP | Cyber Wyze
Cyber Security Services Melbourne | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Canberra | DISP, Essential Eight & CMMC | Cyber Wyze
Cyber Security Services Perth | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Hobart | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Darwin | Essential Eight, DLP & Secure IT | Cyber Wyze
Contact Us
1300 744 915
Home
Wyze Words
Our Services
DISP Cyber Security Services Australia | Essential Eight ML2 | Cyber Wyze
Essential Eight Assessment & Uplift (ML2) | Cyber Wyze
Managed IT Services | Secure IT Operations | Cyber Wyze
Data Security & Data Loss Prevention Services | Cyber Wyze Australia
AI Data Security and Governance Services | Cyber Wyze
CMMC Cyber Security Services Australia | Implementation & Managed Cyber | Cyber Wyze
Critical Information
Case Studies
Customer Case Study – Aquila
Customer Case Study – Active Fleet
DISP
Defence Industry Security Program (DISP)
Navigating Essential 8, DISP & CMMC
DISP Maturity Action Plan (MAP)
DISP Cyber Security Requirements — A Complete Guide
Essential 8
Essential 8 Cyber — A Complete Guide in Plain English
Budgeting for Essential 8 Uplift: Cost Factors and ROI Considerations
CMMC
What is CMMC? An Australian View
What is CMMC 2.0?
Who Needs CMMC?
Data Security & DLP
What is Data Loss Prevention (DLP)?
How to Protect CAD Files: Breakthrough Encryption
The Top 5 Causes of Data Loss and How to Address Them
About
Locations
Cyber Security Services Brisbane | DISP, Essential Eight & Data Security | Cyber Wyze
Cyber Security Services Sydney | Enterprise Security, E8 & Data Protection | Cyber Wyze
Cyber Security Services Adelaide | DISP, Essential Eight & DLP | Cyber Wyze
Cyber Security Services Melbourne | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Canberra | DISP, Essential Eight & CMMC | Cyber Wyze
Cyber Security Services Perth | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Hobart | Essential Eight, DLP & Secure IT | Cyber Wyze
Cyber Security Services Darwin | Essential Eight, DLP & Secure IT | Cyber Wyze
Contact Us
1300 744 915
Search
New Client Form
Confidential
Step
1
of
7
14%
Facebook
This field is for validation purposes and should be left unchanged.
Company
(Required)
Company Website
(Required)
ABN / ACN
(Required)
Submitter
(Required)
First Name
Last Name
Email
(Required)
Enter Email
Confirm Email
Primary Phone
(Required)
Mobile / Secondary Phone
(Required)
Position / Job Title
(Required)
Industry Type
(Required)
Advertising
Agriculture
Banking
Construction
Creatives
Data Management
Education
Entertainment
Fashion
Finance
Hospitality
Marketing
Retail
Services
Technology
Other
Primary Office Location (address)?
(Required)
User & Device Inventory
Total Staff (incl. contractors/remote)?
(Required)
Active Microsoft 365 users (licences)?
(Required)
Microsoft 365 Licence Type?
(Required)
Linux User Total?
(Required)
Windows User Total?
(Required)
Total Desktop / Workstation Count?
(Required)
Total Laptop Count?
(Required)
Total IOS / Mac Devices Count?
(Required)
Total Android/Chrome Devices?
(Required)
Any Additional Mobile Devices Requiring Support (e.g. MDM - Tablets, IoT)?
(Required)
Any Planned Growth/Shrinkage in Headcount (next 12 months)?
(Required)
Core Infrastructure
Do You Have Documentation For Network / Physical IT Assets?
(Required)
Current Internet Provider Arrangement?
(Required)
Do You Currently Use A Corporate VPN?
(Required)
Please Select
Yes
No
Security Posture
Do You Have Existing 3rd Party IT Security Services?
(Required)
Please Select
Yes
No
Do You Have Existing 3rd Party IT Security Services?
(Required)
Please Select
Yes
No
Do You Currently Have Active Security Monitoring (eg. SOC)? If so, with who?
(Required)
Do You Have A Current Disaster Recovery and Incident Response Plan?
(Required)
Please Select
Yes
No
Do You Have Any Customer SLA Dependencies On Your Supply Agreements (E.G Uptime)?
(Required)
Have You Had A Security Incident In The Last 36 Months (Please Provide Details)?
(Required)
Backup & Resilience
Do You Currently Have A Backup Plan, Service or High Availability Service?
(Required)
Do You Use Cloud Backup for M365?
(Required)
Please Select
Yes
No
What is the Frequency of Backup Data Required?
(Required)
Do You Test and Restore Backups? If yes, how often?
(Required)
Governance, Risk, & Compliance
Is there Currently an ICT Roadmap / Strategy (including Cyber)?
(Required)
Do You Have Regulatory, Commercial or Quality Management Obligations?
(Required)
Have You Had A Recent Compliance Audit? Provide details if applicable.
(Required)
Current DISP Membership Status?
(Required)
Do You Have Data Sovereignty Requirements?
Please Select
Yes
No
Unsure
Support & Service Delivery
Do You Run 24/7 Business Operations? Please Outline Business Hours and Support Required
(Required)
Can You Define Your Critical Business Systems?
(Required)
Preferred Communication / Support Method (Phone, Email, Dashboard)
(Required)
Do You Have A Hard SLA Requirement? (If yes, provide details)
(Required)
Oboarding & Offboarding
Do You Have Documentation To Support Efficient Onboarding and Offboarding of Employees?
(Required)
Average User Movement Monthly?
(Required)
Existing Pain Points or Desired Improvements for User Experience and Onboarding/Offboarding?
(Required)
IP Management and AI
Do You Currently Utilise IP Development or AI Tools That Integrate With M365 Security?
(Required)
Do You Operate Any Legacy or Bespoke Systems?
(Required)
Do You Require 3rd Party Supply-Chain Security Management?
(Required)
Please Select
Yes
No
Unsure
Do You Have Any Key Projects Or Business Changes That Are Predicted Within the Next 12-24 Months?
(Required)
Risk Management and Continuous Improvement
What is Your Top Commercial Risk if ICT or Data Were to be Unavailable for 1hr, 1Day, 1 Week?
(Required)
Are There Any Existing Business Risks Identified That Need Consideration (e.g Role Based Access Controls, Local Administrator)?
(Required)
Is Your Business Able to Adopt and Maintain Multi-Factor Authentication Across All Applications and Systems?
(Required)
Please Select
Yes
No
Unsure
Do You Currently Hold Cyber Insurance?
(Required)
Please Select
Yes
No
Do You Have A Continuous Improvement Plan/Policy to Which You Need Us to Align?
(Required)
Please Select
Yes
No