New Era offers a holistic approach to Cyber Security.

By working with world-leading partners, we detect, prevent and respond to known and emerging threats – in real-time.

Speak to your local Cyber Security Specialists today.

New Era’s local teams are just a click or call away.

Implementing effective and up-to-date Cyber Security solutions ensure that your systems, networks, data and programs are protected from digital attacks and unauthorised access.

In today’s digital environment, Cyber criminals have become increasingly sophisticated in their methods, making it more vital than ever before to be protected against potential threats.

Managed it services and solutions

I am interested in your Cyber Security Services.

"*" indicates required fields

Name*

Cyber Security Resources

Australian Cyber Security Centre

The Australian Cyber Security Centre, the successor to the Cyber Security Operations Centre, is the Australian Government’s lead agency for cyber security.

Sign up for important alerts, download valuable resources and more.

The Essential 8 Cybersecurity Framework

In today’s digitalised business world, cyber security is one the high priority list for many businesses.

Cyber attacks are becoming increasingly common and sophisticated, and they can cause severe and costly damage to organisations and individuals. The Essential 8 framework has emerged as a valuable tool for enhancing cyber security, no matter the size of your business.

NIST Cybersecurity Framework

NIST Cybersecurity Framework is a set of guidelines to mitigate organisational cybersecurity risks, published by the US National Institute of Standards and Technology (NIST) based on existing standards, guidelines, and practices. The framework provides a high level taxonomy of cybersecurity outcomes and a methodology to assess and manage those outcomes.

 

CIS Critical Security Controls

The CIS Critical Security Controls (CIS Controls) are a prescriptive, prioritised, and simplified set of best practices that you can use to strengthen your cybersecurity posture.​

Each control is underpinned by several safeguards – specific and unique actions to improve security.​

 

Other valuable resources

3 Steps to Zero Trust Cybersecurity

Over recent years, Zero Trust has emerged as a strategic and holistic approach to cybersecurity. By eliminating implicit trust and verifying each access, this integrated solution covers users, applications, and infrastructure, regardless of their location or nature.

Sans.org Cyber Security Policies

In collaboration with information security subject-matter experts and leaders who volunteered their security policy know-how and time, SANS has developed and posted here a set of security policy templates for your use

Our Cyber Security offering includes:

  • Application Control
  • Patching Applications
  • Configuration of Microsoft Macro Settings
  • User Application Hardening
  • Restrict Admin Privileges
  • Patch Operating Systems
  • Multi-Factor Authentication
  • Daily Backups