Get a Cyber Security Vulnerability Assessment

From one of the first organisations in Australia to achieve ISO 27001:2022

Our cyber security specialists can locate the weaknesses in your security, report on the findings, and provide suggestions on ways to patch the gaps.

ISO 27001 Certification
cyber essentials certification
IASME cyber assurance certification
Penetration testing

The MyEmpire Group difference

"We’re big enough to support all manner of businesses, from ma and pa’s to enterprise, but small enough to still obsess over detail."

We don’t obsess over detail to the point of paralysis, but we do take great pride in delivering exceptional work. And it’s not just because we get a thrill receiving elated client feedback, although that’s something we all share in common. Primarily it’s because we genuinely care about building cyber security systems that protect businesses. That means really learning your business and your people so we can develop a cyber security strategy suited to you, not a close-enough template pulled from a file. That’s what makes us different; we only feel satisfied when we know a job’s been done right. 

"The biggest benefit to working with MyEmpire Group is having access to cyber expertise on an as-needed basis. We're able to access skills and knowledge across a broad range of [cyber security] areas, and without having to hire in-house."
Jenelle Schultz
Chief Operating Officer, Business Fitness
"The MyEmpire Group team’s technical understanding of Essential 8 and ability to cut through all the techno-speak and explain things to us in layman's terms made the process so much more streamlined."
Lisa Saunders
Group Executive – Governance Risk & Compliance, REI Superannuation
MyEmpire Group have been outstanding in helping us prepare for and obtain our ISO 27001 certification. Their personalised and considered approach to truly understanding our business needs really sets them apart.
Peter Bell - Co-Founder, Techno Global Team
Peter Bell
Co-Founder, Techno Global Team

Our People

Our cyber security specialists are a mixture of seasoned veterans, many with 30+ years’ experience in IT, management and security. We also have young faces on the team, our rising stars–those whose talents we recognised early and chose to invest in. 

Beyond being experts in their fields, our people share a few things in common, a result of how we hire. Prior to any skills being tested in an interview, we look for personable people. Authentic, honest people who are passionate about their field and good communicators. In other words, we look for people who light up when they talk about their line of work. People whose passion is contagious. Only candidates who meet this criteria are taken through the typical interview steps where we probe skills and work history.

ISO 27001

Leadership Team

Alex Woerndle, MyEmpire Group

Alex Woerndle

HEAD OF OPERATIONS
(CO-FOUNDER & DIRECTOR)

Alex is an experienced director, IT consultant and infosec professional. He provides security management and leadership to a range of organisations from start-ups through to governments and ASX50 listed enterprises. He has also served over 10 years in voluntary roles as a Non-Executive Director of the Australian Information Security Association,.au Domain Administration Ltd and the Australian Conservation Foundation’s Finance, Audit and Risk Committee.

Carl Woerndle

HEAD OF SALES AND MARKETING
(CO-FOUNDER & DIRECTOR)

Carl has more than three decades’ experience in IT, security and business leadership. Prior to MyEmpire Group, he and Alex built DistributeIT which held approx. 10% market share of .com.au domains. As well as a business owner and manager, Carl has worked as a Cyber Security Advisor consultant for Deloitte. He is a regular keynote speaker on cyber security.

Chris Self

HEAD OF SERVICE DELIVERY

Chris is a highly experienced information security principal. He has worked as a senior cyber security consultant for KPMG, CQR Consulting (now part of CyberCX) and Deloitte. Prior to starting with MyEmpire Group, he was the Information Security Manager at Adelaide Airport where he led a full rebuild of the airport’s cyber security processes and infrastructure. Chris holds a master’s in information systems security and a number of information security certifications, including CISSP and CRISC.

Talk to a Cyber Security Specialist

What is a Vulnerability Assessment?

This assessment involves identifying vulnerabilities that expose your business to cyber threats. We use multiple tools and scanners to identify cyber vulnerabilities across your technology landscape. We then assign a severity level to each vulnerability. This paves the road, determining what needs fixing and in what order. We present our findings in a report along with recommendations on exactly what to do to fix these gaps. 

Cyber security gap assessment Cyber security specialists
"The biggest benefit to working with MyEmpire Group is having access to cyber expertise on an as-needed basis. We're able to access skills and knowledge across a broad range of [cyber security] areas, and without having to hire in-house."
Jenelle Schultz
Chief Operating Officer, Business Fitness

Benefits of a Vulnerability Assessment

Get a snapshot of risks to your organisation

A vulnerability assessment gives you a snapshot of risks to your organisation from cyber attack. Highlighting weaknesses helps keep you on the front foot of cyber defence.

Security of Critical Infrastructure (SOCI)

Know what to fix and when

As well as identifying weaknesses in your cyber security, we’ll provide an order of priority so you know what to tackle and when in order to patch these vulnerabilities. Consider it a roadmap to better cyber security.

Ready to mature your cyber security?

Types of vulnerability assessments we offer

Host-based scans

Identifies vulnerabilities on workstations, servers, and other network hosts. It also provides visibility into the configuration settings.

Network-based scans

Locates vulnerabilities in network security, including Wi-Fi network security, e.g. ensure wireless networks are securely configured and malicious access points are closed.

Penetration testing

Application scans

Pinpoints security weaknesses in websites and mobile applications, including misconfigurations of security settings.