Small businesses are now the primary target.

Cyber criminals have shifted focus. Large enterprises have security teams, budgets, and sophisticated defences. Small businesses don't—which makes you the easier target. 43% of all cyber attacks now target small businesses, and the attacks that cause the most damage aren't sophisticated. They're simple: a convincing email, a weak password, a backup that wasn't tested.

1 in 5 small businesses that suffer a cyber attack close within 12 months. Not because they were hit by nation-state hackers—but because they couldn't recover. Systems locked by ransomware. Customer data stolen. Weeks of downtime. Reputation destroyed. For a small business operating on tight margins, that's often fatal.

The Privacy Act now has real consequences.

Australian businesses are legally required to take "reasonable steps" to protect personal information. If you suffer a breach and can't demonstrate what protections you had in place, penalties can reach $50 million. But the financial penalty isn't the worst part—it's having to notify every affected customer that their data was exposed because you didn't have the basics covered.

Your customers, suppliers, and insurers are already asking.

Increasingly, businesses won't work with suppliers who can't demonstrate basic security practices. Cyber insurance applications now ask detailed questions about your controls—and claims get denied when businesses can't prove they had protections in place. If you're tendering for contracts, responding to supplier questionnaires, or renewing insurance, you need to know where you stand.

Industry regulators are paying attention.

The Tax Practitioners Board, ASIC, AHPRA, the NDIS Commission, Law Societies—professional regulators across every industry are raising expectations around cyber security. It's no longer optional. If you handle client money, sensitive records, or personal information, your regulator expects you to have controls in place. "I didn't know" is no longer an acceptable answer.

The good news: the basics aren't complicated—you just need to know where to start.

Most small business breaches happen because of fixable gaps—passwords reused across systems, backups that aren't tested, staff who haven't been shown what a phishing email looks like. You don't need an IT department or expensive consultants. You need every gap identified, ranked by risk, with specific actions to fix them.

That's exactly what these health checks do.

A guided questionnaire—in plain English, no jargon—that walks through the security controls that actually matter for your business. Passwords. Backups. Email security. Software updates. Staff awareness. Incident readiness. In about 60 minutes, you'll have:

  • Every gap identified and ranked by risk—critical issues first, minor ones last
  • Specific actions to fix each gap—plain-English steps you can follow yourself or hand to your IT provider
  • A professional report you can share with your insurer, accountant, or keep for your records
  • Evidence of due diligence showing you've assessed your security posture

You get a prioritised roadmap—not just findings, but exactly what to do about them. Compare that to the cost of a breach—or the cost of losing a contract because you couldn't answer a supplier security questionnaire.

See It In Action

From first question to final report — here's what the experience looks like.

1

Assessment Overview & Progress Tracking

Enter your business name and track progress across all 11 security domains. Your answers save automatically — close the browser and pick up where you left off any time.

CyberAssure health check progress overview showing all 11 security domains
2

Plain-English Questions

Each question is written for business owners, not IT professionals. A "What to look for" guide is included on every question — you'll always know exactly what a good answer looks like.

Health check question interface with plain-English guidance
3

Your Overall Security Score

Get an instant overall score with a plain-English rating. Scores are broken down across Essential, Recommended, and Advanced practice levels so you know exactly where to focus first.

Overall security score showing 63% with Essential, Recommended and Advanced breakdowns
4

Prioritised Gap List

Every gap is ranked by priority with a plain-English recommendation. Time, cost, and impact ratings help you decide what to tackle yourself and what to hand to your IT provider.

Identified gaps table sorted by priority with recommendations for each item
5

Remediation Timeline & Export

A suggested month-by-month action plan shows you what to fix first, next, and over time. Export a Word report to share with your team or IT provider, and an Excel workbook to track progress.

Remediation timeline and export options for Word report and Excel workbook

Watch the Full Walkthrough

Watch the CyberAssure Small Business Cyber Security Health Check walkthrough video

What You Receive

Every health check generates a comprehensive report you can use immediately. Download a sample below.

Summary Report (Word)

Plain-English findings with prioritised recommendations, improvement plan, risk associations, and resources. Share with your IT provider or keep for your records.

Download Sample

Choose Your Industry

Any Industry

Small Business Cyber Security Health Check

Find your security gaps before attackers do. Covers passwords, backups, updates, staff awareness, and incident readiness.

Expectations from: Privacy Act (OAIC), customers, suppliers

View Small Business Health Check
Professional Services

Accounting Practice Health Check

ATO portal security, Xero/MYOB protection, client TFN handling, BAS fraud awareness, Privacy Act compliance.

Expectations from: TPB, ATO, Privacy Act (OAIC), PI insurers

View Accounting Practice Health Check
Professional Services

Bookkeeper & BAS Agent Health Check

ATO Portal security, accounting software protection, TPB Code requirements, client data handling.

Expectations from: TPB Code of Conduct, ATO, Privacy Act (OAIC)

View Bookkeeper Health Check
Property

Real Estate Agency Health Check

Trust account security, property management software, tenant ID handling, settlement fraud awareness.

Expectations from: Fair Trading, trust account auditors, Privacy Act (OAIC)

View Real Estate Health Check
Healthcare

GP Clinic Health Check

PRODA/Medicare portal security, clinical software protection, patient records, prescription scam recognition.

Expectations from: AHPRA, Services Australia, Privacy Act (OAIC), medical indemnity

View GP Clinic Health Check
Healthcare

Allied Health Health Check

Practice management software, Medicare/DVA claims security, patient records, mobile practitioner considerations.

Expectations from: AHPRA, Services Australia (Medicare/DVA), Privacy Act (OAIC)

View Allied Health Check
Community Services

NDIS Provider Health Check

PRODA portal security, client management systems, NDIS Practice Standards alignment, participant data handling.

Expectations from: NDIS Commission, Practice Standards, Privacy Act (OAIC)

View NDIS Provider Health Check
Early Childhood

Childcare Centre Health Check

CCS system security, childcare management software, children's records, NQS alignment, parent communication.

Expectations from: ACECQA, state regulatory authority, Privacy Act (OAIC)

View Childcare Health Check
Financial Services

Financial Planning Health Check

Licensee portal security, client portfolio protection, ASIC impersonation awareness, Privacy Act compliance.

Expectations from: ASIC, AFSL obligations, Privacy Act (OAIC), licensee

View Financial Planning Health Check
Financial Services

Mortgage Broking Health Check

Settlement fraud prevention, bank details verification, CRM security, ID document protection.

Expectations from: ASIC, ACL obligations, Privacy Act (OAIC), aggregator

View Mortgage Broker Health Check

How It Works

Download the HTML file, open it in your browser, answer the questions. About 60 minutes. No technical knowledge required—the questions are written in plain English for business owners, not IT professionals. Get a clear picture of your security gaps and what to fix first.

Your data stays private — everything runs locally on your device. Nothing is sent to us.

AI-Powered

Every Health Check Includes a Personal AI Security Advisor

Two AI assistants are built into every tool. One helps you understand questions as you go. The other is available the moment you see your results — ready to explain every gap, every action, and every score in plain English.

AI question helper explaining cyber security questions in plain English during the assessment
During the assessment

Not sure what a question means? Just ask.

Every question has an AI helper on standby. Ask it to explain what the question is really asking, give you an example, or explain why it matters — in your industry's language, not tech speak.

AI Personal Security Advisor answering questions about cyber security health check results
After you finish

Your Personal Security Advisor knows your results.

Once you complete the assessment, an AI advisor has your full results in front of it. Ask about any gap, any action, any score — and get a clear, personalised answer. Like talking to a security professional who's already read your report.

Included in every health check — no extra cost

For the first time, small businesses get on-demand security expertise built directly into the tool. No consultants. No jargon. No guesswork.

Questions before you buy?

Find out how the health checks work, what you get, and how your data is protected.

View FAQ Get in Touch