Is this you?
You’re familiar with the Essential Eight framework and have already implemented the Essential Eight mitigation strategies and controls to some degree.
And now you want to know how well you’re doing and where you can improve – perhaps you’re doing work with a government department or major client that requires Essential Eight compliance.
DNG Technology offers the Essential Eight Assessment as a comprehensive and objective evaluation of your organisation’s cyber security posture based on the best practices recommended by the Australian Cyber Security Centre (ASCS).
It’s perfect for owners and IT teams who need independent compliance and governance oversight.
Available in two formats – a comprehensive FULL ASSESSMENT or a fast-track LITE ASSESSMENT
The Process

Collect
We conduct discovery workshops to understand your business and collect relevant evidence which clearly identifies your current cyber security posture.

Analyse
We'll review the data and other evidence, identify your risks, and compare them with the eight mitigation strategies and supporting controls defined by ACSC's Essential Eight.

Report
You'll receive a comprehensive report highlighting the effectiveness of the controls, and emphasising those that need immediate attention within the following categories: PREVENTION, LIMITATION and RECOVERY
We provide a detailed assessment of your current cyber security state against the eight essential security controls recommended by the Australian Cyber Security Centre (ACSC).
Process begins with outcome based workshops. Timelines vary depending on the maturity level assessment you need
Your comprehensive Assessment Report provides in-depth findings and tailored recommendations for each control
Detailed datasheets provide additional frameworks for internal use and ongoing planning by management and IT teams
Presentation meeting on completion of the Assessment walks all parties through the results and next steps
Let's talk about Essential Eight...
Related Information

Stop MFA Fatigue with Number Matching & Context
Disabling email autofill can reduce the risk of accidentally sending sensitive information to the wrong recipient. It’s a simple but powerful tweak, especially in environments with frequent external communication or

Disable Email Autofill
Disabling email autofill can reduce the risk of accidentally sending sensitive information to the wrong recipient. It’s a simple but powerful tweak, especially in environments with frequent external communication or

Enforce Automatic Software Updates
Enabling automatic updates across your devices takes less than 15 minutes and dramatically shrinks your attack surface by ensuring you’re patched against known vulnerabilities.

Implementing Automatic Screen Locks
Enforcing automatic screen locks is one of the fastest, highest-impact controls you can roll out. In under 15 minutes, you can tighten your organisation’s security posture by ensuring every workstation,
Your cyber security risks are real
And to find out what they are, invest seven minutes in our Cyber Security Risk Assessment. We’ll email you a full set of results including your Risk Score and personalised recommendations that you can act on straight away.
There’s no cost or commitment, but it’s information every business owner needs to have. And it’s perfect if you and your IT team need independent compliance and governance oversight.
