GOLD CSMS Product Guide
Introduction to your GOLD Cybersecurity Management SystemTo top
Cybersecurity Management System Installation and Set Up Process: Authorised Administrator
The GOLD Cybersecurity Management System is designed to protect small to medium Australian businesses that manage confidential client information and rely heavily on computer use for daily operations. This package ensures you will be compliant with the ACSC Essential 8 Strategies.
The below information covers your product inclusions, set up requirements, authority structures and quick links to product support.
As a GOLD client, we have also allocated you a dedicated phone number so you can quickly reach the Jam Cyber team at any time regarding your cybersecurity.
Thank you again for choosing Jam Cyber & Cybersecurity to protect your business.
GOLD Cybersecurity Management System InclusionsTo top
- Next-Generation Antivirus
- Web Protection & Content Filtering
- Operation System Patching
- Application Patching
- Configuration of Microsoft Office Macro Settings
- User Application Hardening implementation
- Application Control
- Management of Administration Privileges
- Multi-Factor Authentication on Devices
- Multi-Factor Authentication on cloud-based apps/programs
- Daily Backups of Data files and Drive Encryption
GOLD CSMS Authority StructureTo top
Each company will be required to identify three Authority roles:
- Authorised Administrator: to manage contracts, employee communications, approve overrides and be the main point of contact for Jam Cyber.
- Authorised IT: to support employees with any technical issues, installation support and controlling programs.
- Authorised Manager (usually the CEO or Managing Director): overarching authority to approve overrides, programs and contracts.
One person can hold multiple authority roles within the business if required. The below table identifies permissions for each authority level and employees:
Authorise Authority Override ProcessTo top
Your Jam Cyber CSMS is designed to protect your business from both known and unknown threats. This includes blocking a range of websites, programs, applications and files from opening and running freely on your computer. However, GOLD clients have the option to override the security recommendations from Jam Cyber if deemed necessary by the business. This applies to the following areas:
- Web Protect: ability to override blocked websites by Jam Cyber
- User Application Hardening: ability to override recommended Java and Flash blocks by Jam Cyber
- Application Control: ability to override programs and apps deemed unsafe by Jam Cyber
- Next-Generation Antivirus: ability to run and open files blocked by antivirus systems
Only the Authorised Administrator or Authorised Manager can request an override. Please follow the below process to initiate an override:
GOLD CSMS InstallationTo top
Stage 1: Establishing A Cybersecurity ProfileTo top
To begin the process, Jam Cyber will undertake a scoping exercise to determine key programs and applications utilised by the business. This will enable the technical team to build a business-specific profile which will allow common programs to freely run and install with minimal fuss to the business.
During this stage, antivirus and website protection settings will also be tailored based on categories and business needs.
To undertake this task, the Jam Cyber technical team will work directly with the Authorised Administration and IT contacts to install the Remote Management & Monitoring (RMM) Platform and associated programs on the Authorised Administrators computer.
Once the business’s cybersecurity profile is established, the RMM Platform will be rolled out company wide.
Stage 2: CSMS Installation On Employee DevicesTo top
There are two applications which will need to be installed on all employee devices.
- Solarwinds Worldwide Remote Management & Monitoring (RMM) Platform
- Duo Multifactor Authentication application
All Authorised Administrators will receive communications with installation instructions for the above. Further details regarding the processes are provided below for information purposes only.
1: RMM Installation ProcessTo top
View the detailed RMM Installation Guide
To streamline the installation and management of your CSMS, Jam Cyber utilises Solarwinds Worldwide Remote Management & Monitoring (RMM) Platform. This tool will be required to sit on every computer in the organisation and will need to be downloaded onto each computer by the user (or your internal IT team). The RMM Platform allows Jam Cyber to automatically install the majority of the CSMS and configure your cybersecurity profile across your business automatically.
To install this platform across the company, Jam Cyber will forward an email to the nominated Authorised Administrator who will communicate the process with all employees.
Employees (or the internal IT team) will then need to follow the steps in the RMM Installation Guide. The process will take only minutes and a restart of computers will be required post-installation.
Once this has been completed on all computers, the Jam Cyber technical team will inform the Authorised Administrator and/or IT Contact and then installation of the Duo MFA can commence.
2: Duo MFA Installation ProcessTo top
View the detailed Duo MFA Installation Guide
To enable Multi-Factor Authentication (MFA), thus complying with the ACSC Essential 8 strategies, Jam Cyber has partnered with Duo Security. The Duo MFA installation process requires all employees to individually set up their own authentication on computers and smartphones.
Authorised Administrators will receive a notification via email regarding when this process will commence. Jam Cyber will initiate the Duo MFA install first with the Authorised Administrator and/or IT to ensure they are aware of the process and can support employees if required.
Please note: Duo Security will send automated setup information to all employees to undertake this process, so it is important employees are informed this is happening. Authorised Administrators will receive a template email from Jam Cyber to forward to employees to commence this process.
Please read the Duo MFA Installation Guide for further details.
Monitoring and Risk ReportingTo top
Domain Watch ServicesTo top
Jam Cyber will continually monitor your domain to ensure your website is safe and no emails have been compromised. Authorised Administrators will be contacted by our security team to establish this service. Businesses will only receive reports if a domain has been breached or emails and passwords have been compromised.
Quick links for GOLD CSMSTo top
Helpful User Guides:
Training and Tips:To top
Troubleshooting & SupportTo top
We are here to help!
As a GOLD client, you will have received a dedicated Jam Cyber Support phone number(1800 818 875 )
. Please use this number whenever calling Jam Cyber as it will ensure you are fast-tracked through the queue.
For non-urgent issues, you can email our team at [email protected]