Health Check

Arrange a CyberGig Health check
to protect your business now

What is a Cyber health check?

The test is based on a highly respected Australian standard called the Essential Eight, developed by the Australian Signals Directorate to help Australian businesses.

The test will assess your how your business is protected from common cyber security risks and identify items that may need attention. The service provider will offer some recommendations for fixing the important items.

The test will be the same for all small businesses, but vary in price depending on the number of devices to be tested.


To get the most out of your health check, get organised with your service provider beforehand.

What you might want to do prior to the day

  • Figure out how many devices you want checked and make a booking on this website.
  • Tell us the postcode where the check will take place and select your service provider.
  • Confirm a date and time with the service provider and understand their plans.
  • Let your team know what is happening and organise their participation.
  • Transfer the fully refundable * payment to CyberGig to be held on account by CyberGig & only released to expert, after work is completed & approved by you.
  • * CyberGig will hold all funds on account until work has been completed by the expert to a satisfactory level, which can be fully refunded in the unlikely event of work not completed.

The service provider will install health check testing software on your devices.

Things to remember on the day are:

  • Make sure that all devices being checked are available, unlocked and usable.
  • Agree the time available and complete the check within that time to avoid extra costs.
  • Some checks will be done by the computer; others will be a questionnaire you complete with the service provider.
  • You will receive two results reports. The first gives an overview of what the check found and lists the highest priority items. The second report is technical, for use in fixing any problems.

Once the check is finished, your service provider will complete the paperwork.

  • Your service provider will upload a summary of your health check results to Cybergig. If you have questions about this step, please talk with your service provider or contact CyberGig directly on
  • Once we receive and confirm the upload, we will email you a confirmation of work completed.
  • Cybergig will invoice you and discuss feedback, next steps, quarterly check schedule ( advisable ).
  • Payment is released by CyberGig to expert, after work is completed & approved by you.

If you are applying for a government grant, we recommend doing this as soon as possible after the check is completed. For more detail on how to apply please review the the Cyber Security Small Business Guidelines, the sample application form and the sample grant agreement published on 

  • Discuss feedback of the process & service with CyberGig, arrange next steps perhaps schedule a quarterly cyber check for your business ( advisable ).
  • Stay in touch with CyberGig and our email newsletter that will keep you informed of Cyber issues & threats around the world
  • Enquire about out CyberGig premium membership option that will provide more regular, updated support & protection for your business.
  • Call or email us anytime for a confidential discussion about all your Cyber security related concerns, its likely we will know a CyberGig expert, product or tool that may help.


The certified small business health check is based on the Australian Government’s Essential Eight list of mitigation strategies to help protect against a range of cyber security threats. The health check has been customised for small business and the cyber threats they are most concerned about.

Application Updates and Patching

Fixes abnormalities (bugs) and improves usability and performance.

Microsoft Office Macro Settings

Can increase cyber risk and should be disabled if not needed.

User Applicaton Hardening

Disables or removes settings or apps that are not needed to help reduce risk.

Restricted Administration Privileges

Limit users to the minimum access needed to perform in the business.

Operating System Patching

Ensure computers have the latest security updates.

Multi-factor Authentication

Using a combination of two or more ways to sign in each time.

Daily Backups

Helps ensure all information is not lost in an attack.

Trusted Applications

Stops non-approved apps being used.

Maleware / Virus Scans

Both types are needed to scan your computers.

Mobile / BYOD

Ensure policies are in place to reduce security risks.