Simplify Security Assurance

The InfoSecAssure platform makes cyber security more accessible to businesses all over the world. With a unique, risk-based approach InfoSecAssure helps organisations ensure they have the right security controls in their business and across their supply chain to protect them from cyber security threats. Also providing valuable insights into how mature your controls are against a range of standards, including ISO 27001, SOC2 and NIST Cyber Security Framework. We Make Security Easy.

What our clients are saying

I know more about cyber security than I used to and when I need help I have access to professionals who can explain it to me in plain English.
Wish we knew about this platform before we invested in some of the scanning tools we have today that don't give us the whole picture.
The way InfoSecAssure sets out controls both by risk and by their core 16 practice areas has really helped me and my team understand security like never before.
Our suppliers are happy they are involved in the process and not being sent a ridiculous number of questions and we can work with them know on reducing risk not just asking them to add more controls.

What we do

Discover a New Way of Simplifying Information Security Assurance, Manage Your Real Risks and Get on The Right Path To Securing Your Business Today.

No items found.

Compare Plans

Select the plan that best suits your business.

Starter
$99/mo
All the functionality you need for assessing and uplifting the security of your small business. Conduct a Health Check or assess your business against SMB 1001 Standard and achieve your first security certification.
Business
$99/mo
Boosted performance for those responsible for assessing and uplifting the security across a larger business. Assess your business against a range of standards and frameworks.
Business Pro
$99/mo
Boosted performance for risk managers who are responsible for assessing the security of their business and their supply chain. Customise risk frameworks and risk reports.
Professional
Varies
Best for advisors, consultants, managed service providers who want to scale their business and provide professional and effective cyber security services.
Assessments
Users
10
25
Unlimited
Unlimited
Asset Register
Security Health Check
SMB 1001
Feature text goes here
Assessment types
Health Check
SMB1001
ISO 27001
Essential Eight
SOC2
Privacy Steps
10
25
Unlimited
Feature text goes here
Feature text goes here
Feature text goes here
Feature text goes here

Slider Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Products

Feature

Starter

Business

Business-Pro

Professional

Company  Details

View/Edit

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

test

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

Text link

Bold text

Emphasis

Superscript

Subscript

buttonbutton wideISA Button

ISA Blue Heading Medium

ISA Blue Heading Medium Middle

Paragraph Light

Paragraph

Paragraph Small

Paragraph Tiny

ISA Blue Heading Small

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

ISA Blog RTE

Paragrah

Heading 2

Italic

Heading 3

Bold

Heading 4

  1. List by number
Quote
Heading 5

Link

Heading 6

Unveiling the New Security Standard SMB 1001: A Game-Changer for Small Businesses

Unveiling the New Security Standard SMB 1001: A Game-Changer for Small Businesses

The Murky World of Ransomware Attacks and Evolving Business Models

The Murky World of Ransomware Attacks and Evolving Business Models

Security Education and Awareness Training

Security Education and Awareness Training

Cyber Security Help Guide: Preventing Invoice Fraud

Cyber Security Help Guide: Preventing Invoice Fraud

What is AI? How is it defined, how is it applied and how is it being used across various industries?

What is AI? How is it defined, how is it applied and how is it being used across various industries?

Unravelling the Vulnerabilities: A Look at the Latest Security Threats in AI Systems

Unravelling the Vulnerabilities: A Look at the Latest Security Threats in AI Systems

Navigating the AI Ethical Landscape: Key Steps to Develop an Ethical AI Approach

Navigating the AI Ethical Landscape: Key Steps to Develop an Ethical AI Approach

Adopting A Risk-Based Approach vs. a Checklist Approach to Cyber Security

Adopting A Risk-Based Approach vs. a Checklist Approach to Cyber Security

How An AI Ethics Assessment Could Have Prevented The Robodebt Disaster.

How An AI Ethics Assessment Could Have Prevented The Robodebt Disaster.

A Guide to Destroying Data – When Shredding Isn’t Enough

A Guide to Destroying Data – When Shredding Isn’t Enough

Cyber Security Assessments: What Are They and How Are The Best Conducted?

Cyber Security Assessments: What Are They and How Are The Best Conducted?

Cyber Security - Risk vs Controls vs Compliance

Cyber Security - Risk vs Controls vs Compliance

How to Secure Your Business Through Information Risk Identification and Assessment

How to Secure Your Business Through Information Risk Identification and Assessment

How to Secure and Protect Data During Testing

How to Secure and Protect Data During Testing

Essential Eight Changes July 2021

Essential Eight Changes July 2021

ISO 27001 and 27002 Changes in 2022 - What is in, what is out and what has changed?

ISO 27001 and 27002 Changes in 2022 - What is in, what is out and what has changed?

Are Your Kids Breaking the Rules?

Are Your Kids Breaking the Rules?

Optus Breach and What You Can Do to Protect Yourself

Optus Breach and What You Can Do to Protect Yourself

Crisis Communications During an Incident

Crisis Communications During an Incident

6 Ways to Stop Malware in its Tracks

6 Ways to Stop Malware in its Tracks

Top 10 Types Of Background Checks

Top 10 Types Of Background Checks

ISO 27001 and 27002 Changes in 2022

ISO 27001 and 27002 Changes in 2022

Managing Security in Healthcare Practices

Managing Security in Healthcare Practices

Small business big challenges

Small business big challenges

There's a Focus on Education

There's a Focus on Education

Current Cyber Security Threats

Current Cyber Security Threats

Aged Care and Community Services organisations under-attack by hackers

Aged Care and Community Services organisations under-attack by hackers

Your password probably isn't good enough

Your password probably isn't good enough

What to Expect during a ISO 27001 Certification Audit

What to Expect during a  ISO 27001 Certification Audit

Which Certification or Audit Report should our business get?

Which Certification or Audit Report should our business get?

Practically Perfect Patching

Practically Perfect Patching

Information security assurance across your supply chain

Information security assurance across your supply chain

Healthcare or HealthSCARE?

Healthcare or HealthSCARE?

Cyber Kaleidoscope - the quest for return on security investment

Cyber Kaleidoscope - the quest for return on security investment

Security Risks in Cloud-based Collaboration Tools

Security Risks in Cloud-based Collaboration Tools

Our top 7 tips to answering security questionnaires

Our top 7 tips to answering security questionnaires

The Security Questionnaire Vortex

The Security Questionnaire Vortex

Information security governance for small businesses

Information security governance for small businesses

APRA CPS 234 Information Security

APRA CPS 234 Information Security

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Tools and Templates

Tools and Templates

Tools and Templates

Tools and Templates

Assessment Types

Assessment Types

Support

Effectively Manage Assets

Effectively Manage Assets

Effectively Manage Assets

Risk Management Features

Effectively Manage Assets

Risk Management Features

Risk Management Features

Risk Management Features

Risk Management Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Tools and Templates

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Accounts

Accounts

Accounts

Accounts

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Support

Easy and Secure Access

Easy and Secure Access

Easy and Secure Access

Easy and Secure Access

Effectively Manage Assets

Easy and Secure Access

Effectively Manage Assets

Effectively Manage Assets

Effectively Manage Assets

Risk Management Features

Risk Management Features

Insight Report Features

Risk Management Features

Risk Management Features

Risk Management Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Insight Report Features

Tools and Templates

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Assessment Features

Accounts

Accounts

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Assessment Types

Support

Easy and Secure Access

Easy and Secure Access

Easy and Secure Access

Easy and Secure Access

Easy and Secure Access

Effectively Manage Assets

Effectively Manage Assets

Effectively Manage Assets

Effectively Manage Assets

Risk Management Features

Heading 1

The rich text element allows you to create and format headings, paragraphs, blockquotes, images, and video all in one place instead of having to add and format them individually. Just double-click and easily create content.

Heading 2

Bullet lists

Heading 3

Headings, paragraphs, blockquotes, figures, images, and figure captions can all be styled after a class is added to the rich text element using the "When inside of" nested selector system.

Our Starter Plan is uniquely designed to meet the needs of small businesses from every sector.
No items found.
Learn more about the different plans

Learn More

InfoSecAssure has developed a suite of best-in-class cyber security risk assessments that you don’t have to be a expert to use.  Our platform and Applied Experience content helps all businesses and their professional advisors to manage their unique information security risks to reduce the possibility of a significant cyber breach and provide valuable assurance outcomes for their clients.

Join us today
Join the growing number of businesses today who have signed up to see how well the controls they have in place align to regulatory requirements and industry standards and promote trust with their clients.

Why we care

All businesses need support to participate in the global supply chain.  They are loosing opportunities to win clients because they have not invested in the right information security assurance.  

Consultants are using antiquated tools that are ineffective and provide below average outcomes for clients.  Cyber security skills shortage has resulted in senior risk assessor struggling to train industry newcomers to meet demand.

Regulated businesses are legally obligated to conduct and maintain information security risk assessments that identify and assess cyber security risks and often don’t have the skills, tools or resources to do the job well.

We care about helping businesses achieve great information security so they can win more business, grow their customers and protect themselves from unnecessary pain and loss of money in the event of a data breach.

Our plans suit every business

No items found.
No items found.
No items found.
50%

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

50%

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

50%

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.

50%

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.