WOW! and CONGRATS! 👏 I was overwhelmed with the wealth of information in the library. I'll definitely be calling on those resources.
MD @ 1800 Buggies
I just did it - LOVED IT! Really comprehensive and there were elements that I hadn't thought of. I will be sharing widely.
CEO @ Blue Marbles Co
I agree with Natasha - Really, brilliant! Thoughtful questions and I liked the assessment charts – very helpful visuals.
Principal @ Maurice Wutscher
Real time visibility of my compliance, cyber and data strengths and weaknesses. A powerful tool for operational resilience and client confidence.
Past President @ FENCA
change the way you do...
improvementgovernancerisk mgmt.compliancecyber & datapeoplegrowth
in a modern global economy.
Evidence of the real and present danger businesses face daily.
Yahoo Accounts Hacked
Uber Accounts Hacked
Equifax Accounts Hacked
General Malware Attacks
Phishing / Social Engineering Attacks
Compromised / Stolen Device Attacks
for businesses of all shapes and sizes.
A range of free (and two premium) programs (aka: micro-credentials), that allow businesses to assess, report, remediate and certify themselves against international best practice standards. Features that are faster and cheaper than legacy institutions, but in line with more enterprise exercises in business performance, culture, compliance and certification.
it’s not rocket science.
Follow the step by step instructions to assess your internal controls and measure your business strengths and weaknesses.
Study the risk report provided to identify, prioritise and remediate the gaps and weaknesses in your business.
With this new info in hand, take active measures to improve your business and performance.
When your house is in order (Low – Medium risk) apply for Certification to show the world your a trusted business.
SMBs and supply chains.