Find the perfect plan tailored to you.
We aim to capture the uniqueness of your business and define the solutions that will liberate your potential and bring clarity to what you are trying to achieve.
Essential Eight Health Check Audit
from $145 excl. GST per device.
Need to verify if your IT devices complies with the the Australian Government’s Essential Eight security controls?
Got a contractor or employee with a Bring Your Own Device and need to check their cyber and privacy risk?
Just want the piece of mind knowing your device is secure?
Want a comprehensive audit report on the cyber security status of your IT device?
Vaultron checks for over 50,000 known cyber security hardware and software vulnerabilities on your device including all areas of the Essential Eight.
Whether you have 1 device to 10+ devices, Vaultron has a suitable pricing for your business.
Pricing: Pricing includes access to our self help guides to fix issues – or we can fix the issues for you.
1 to 5 devices: $145 excl. GST per device.
5 to 10 devices: $119 excl. GST per device.
10 + devices $99 excl. GST per device.
Need us to fix the issues – $89 per hour. Typical time required for us fix a device and make it safe and compliant 1 hr.
Device = Laptop, Surface Pro, Macbook, desktop, iMac. Excludes mobile phones and tablets.
HEALTHCARE AND MEDICAL PRACTICE PRIVACY AND CYBER SECURITY REVIEW
$250 excl. GST
Get Expert Advice on Your Practice’s Cyber Security and Privacy Posture.
Check Your Partners – Privacy and Cyber Security due diligence assessments for medical and healthcare software. Know your risks and liabilities on critical software in your supply chain e.g. practice management, telehealth, email, secure messaging, secure storage and many more.
Dark Web Scan of Emails – Check the dark web for email and password compromise.
Cyber Security and Privacy Professional Development Training For Clinical Practioners
2 hours for $60.
In depth, and comprehensive live online training with the expected outcomes of:
a) Know and explain the maximum penalties, business costs, impact on their license to operate for poor cyber security and breaches of the Privacy Act 1988.
c) Define and assess what is “Reasonable” actions for cyber security in health care practices.
d) Identify the core elements of a clinical practice cyber security supply chain.
e) Know the types of cyber security threats and how to identify vulnerabilities within a clinical practice.
f) Implement a “Privacy By Design” approach to clinical privacy and cyber security.
g) Demonstrate leadership in setting aside common privacy and cyber security myths within their professional community.