Free Cyber Security Assessment for Your Business
We will review your cloud security, endpoint protection, email configuration, dark web exposure, vulnerabilities, and compliance posture, and deliver a detailed report showing exactly where your business stands.
Most businesses we assess have significant gaps they did not know about. Foreign login attempts on their accounts, missing MFA, no EDR, unpatched systems, misconfigured email, and no backup. The assessment shows you what is actually happening in your environment.
Request Your Free Assessment
We will be in touch within one business day.
No obligation. No sales pressure. Just an honest assessment.
What the Assessment Covers
This is not a generic checklist or an automated scan with a pretty cover page. We conduct a genuine review of your environment and deliver a detailed, branded report covering every area of your IT security posture.
Microsoft 365 or Google Workspace
We assess your cloud platform configuration including anti-threat policies, conditional access, MFA status, device management (Intune or Google Endpoint Management), Azure AD or Google Workspace identity configuration, and SIEM. We identify what is configured, what is missing, and what is misconfigured.
Devices, Patching & Encryption
We check OS and application patch status across your workstations, assess whether antivirus is installed and centrally managed, verify whether EDR is deployed, and confirm whether devices are encrypted with BitLocker or equivalent. You get a clear picture of how protected your endpoints actually are.
Login Attempts & Security Weaknesses
We analyse your cloud login activity to identify failed login attempts from foreign countries targeting your accounts. We assess your Microsoft 365 or Google Workspace security configuration for weaknesses including missing MFA, excessive admin access, outdated settings, and weak access policies.
SPF, DKIM, DMARC & Blacklist Check
We verify your email authentication records: SPF alignment, DKIM configuration, and DMARC enforcement. We check whether your domain is on any blacklists. Misconfigured email records mean your emails may not be delivered, and your domain can be impersonated by attackers.
Leaked Credentials & Data
We scan the dark web for your business domain to check whether any of your staff email addresses, passwords, or credentials have been exposed in data breaches. If compromised credentials exist and are not addressed, they are an open door for attackers.
Backup, BCP, Incident Response & Access Control
We assess your data backup and recovery practices, business continuity planning, incident response readiness, notifiable data breach preparedness, password management, access controls, and security awareness training. These are the areas regulators and insurers ask about.
A Detailed Report With Clear Results
After the assessment, you receive a comprehensive, branded report that presents the findings in plain language. No jargon walls, no generic advice. Specific findings about your environment with clear risk ratings and actionable recommendations.
The report is yours to keep regardless of whether you engage us for any further work. There is no obligation, no pressure, and no hidden catch. If you want to take the report to another IT provider and have them fix the issues, that is completely fine. We run this assessment because it is the most effective way for us to demonstrate the value we provide, and because most businesses that see the results want to work with us to fix them.
The Assessment Process
Request
Fill out the form above or call us on 1300 619 750. We will arrange a brief call to understand your business and confirm the scope.
Access
We request temporary read-only access to your Microsoft 365 or Google Workspace admin console. We do not make any changes to your environment.
Assess
We conduct the full assessment covering cloud security, endpoints, vulnerabilities, email, dark web, and compliance. This typically takes two to three business days.
Report
We deliver the branded report and walk you through the findings on a call. You get a clear picture of where you stand and what to do about it.
This Assessment Is for You If…
Most businesses we assess discover issues they had no idea existed. Foreign login attempts from countries like Russia, China, and Korea targeting their accounts. Missing MFA on critical accounts. No EDR. Unpatched systems with known vulnerabilities. Email authentication not configured, leaving their domain open to impersonation. No backup, no incident response plan, no business continuity plan. The assessment brings all of this to the surface so you can make informed decisions about your security.
Frequently Asked Questions
Is this really free?
Yes. This assessment is valued at $2,500 and we are currently offering it at no cost with no obligation. You receive the full report and walkthrough regardless of whether you engage us for any further work. We do this because the assessment consistently demonstrates the value of proper IT security management, and most businesses that see the results want to work with us.
Will you make changes to our systems?
No. The assessment is read-only. We do not make any changes to your Microsoft 365, Google Workspace, or any other part of your environment. We review the current configuration and report on what we find. Any remediation work would only happen if you choose to engage us separately.
What access do you need?
We request temporary read-only admin access to your Microsoft 365 or Google Workspace tenant so we can assess the security configuration, user settings, and login activity. For endpoint assessments, we may deploy a temporary lightweight scanning tool. All access is revoked after the assessment is complete.
How long does the assessment take?
The assessment itself typically takes two to three business days once we have access. The walkthrough call is usually scheduled within a few days of the report being delivered. From initial request to receiving your report, expect approximately one to two weeks.
We already have an IT provider. Is that a problem?
Not at all. Many businesses request an assessment specifically because they want an independent second opinion on how their current IT is being managed. The report gives you an objective view of your security posture that you can discuss with your existing provider, or use as a baseline if you are considering a change.
What industries do you work with?
We support businesses across healthcare, accounting and finance, legal, professional services, property and real estate, retail and franchise, wholesale and distribution, and not-for-profit. The assessment is relevant to any business that uses Microsoft 365 or Google Workspace and wants to understand their security posture.
What happens after the assessment?
We walk you through the report on a call and answer your questions. If you want us to help address the issues identified, we provide a clear proposal with a scope and price. If you do not, the report is yours to keep and you are welcome to take it to any provider you choose. No obligation, no pressure.
