FAQ – Thanks for visiting our FAQ to get some quick answers to common questions.

FAQ

Company Information

Confidential Technology Services is located at Suite One / 8 Fisher Street, Belmont, WA, 6104

Confidential Technology Services is a member of The Computing Australia Group of companies. The Computing Australia Group is a private Australian company registered through ASIC. Our ABN is 61 114 282 923. Our ACN is 114 282 923.

We are open during standard business hours. However, we offer an emergency response service which can be accessed via +61 8 6558 1825

We support the Perth metro area but also offer fly in / fly out services to other locations in Australia and overseas.

Due to the nature of the work, every business is unique – no two organizations have the same setup. We need to perform a (free) initial consultation to be able to get a detailed understanding of your requirements. For emergency work please call our hotline to get a quote: +61 8 6558 1825

External Audits

An external audit is performed from multiple locations to test the security of your network. Our skilled technicians use a range of tools to find out as much information about your network as we can. We will perform a comprehensive scan to expose any vulnerabilities in your systems.

Nobody, either internal or external to your organization will be involved in an external audit. The intention is to attempt to penetrate your network without the knowledge of your IT support.

You will receive a detailed report that highlights our findings, the implications and a number of recommendations for dealing with any issues we find. A consultant will also meet with you to explain our findings.

Most external audits are completed within 48 hours.

No problem! As we are working externally, nobody will need to be told what we are doing.

Internal audits

An internal audit is a detailed process that involves us placing a consultant within your office or premises. We will require passwords to key infrastructure to perform an in depth review of your systems.

Some clients prefer our audits to be conducted covertly. If you are able to provide us with the required passwords, we can perform our work with or without their knowledge. It is entirely up to you.

You will receive a detailed report that highlights our findings, the implications and a number of recommendations for dealing with any issues we find. A consultant will also meet with you to explain our findings.

A lot depends on the size of the organization we are auditing, how many locations you have and the number and type of equipment. A smaller organization can take as little as 48 hours.

No problem! We are used to working covertly and can even perform our audit after hours if you prefer.

Got a question that our FAQ hasn’t answered? Contact us directly and we will assist with your inquiry.

FAQ key on keyboard