Skip to content

Join the hundreds of companies that trust 6clicks

qld-gov-logo

vic-gov-logo.png

nsw-gov-logo

Accel-IT-logo

TCS-logo-new

Melbourne-Racing-Club-logo

flybuys-logo

BDO-logo-resized-1

Trusted-Impact-Logo-resized

PS-Logo-nobg

ICT Legal - Favicon

riskcom-logo

EY-logo

devicedesk

Fisher-Leadership-logo

insync-logo1

Maddocks

KordaMentha_Logo

Picture1

AFSL Authorised Representative

An Australian Financial Service Licensed (AFSL) Authorised Representative is a person who has been authorised by an AFSL holder to provide financial services..

Annex A Controls

Annex A of the ISO 27001 standard consists of a list of security controls organizations can utilize to improve the security of their information assets. ISO..

Compliance Automation Software

Compliance automation software monitors a company's internal systems and controls, helping ensure it complies with required standards and regulations while..

Compliance Risk Management

Compliance risk management, which is a subset of compliance management, involves identifying, assessing, and monitoring the risks to your enterprise's..

FedRAMP

The Federal Risk and Authorization Management Program (FedRAMP) is a US specific government program that provides a standardised approach to security..

Governance Risk & Compliance (GRC)

Governance, risk, and compliance (GRC) software allows a company to effectively manage its governance, enterprise risk program, and its compliance with..

HIPAA

HIPAA is the acronym for the Health Insurance Portability and Accountability Act passed by Congress in 1996. HIPAA helps by:

  • Providing the ability to transfer..

HITRUST

HITRUST stands for the Health Information Trust Alliance and was founded in 2007. The standard was organised with the intent to provide an option for..

Information Security Management System (ISMS)

An Information Security Management System, also known as an ISMS, is a systematic approach consisting of processes, technology and people that helps you..

ISO 27001

ISO/IEC 27001 is a framework for managing IT security. ISO 27001 is an information security management system (ISMS) that helps keep consumer data safe, and..

Notifiable Data Breach

Under the Australian Notifiable Data Breaches (NDB) scheme by the OAIC, an organisation or agency must notify an individual and OAIC when a data breach..

OAIC

The Office of the Australian Information Commissioner (OAIC) is an independent agency within the Attorney-General’s portfolio. The primary functions include..

SOC 2

Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on five "trust service criteria" — security,..

SOC 3

You can think of a SOC 3 report as a redacted SOC 2 report; the SOC 3 report summarizes the material of a SOC 2 report, but it excludes details of the testing..

SOC Reports

A service organization controls (SOC) report is a way to verify that an organization is following specific best practices related to protecting their clients'..

Vendor Assessment

Vendor assessment describes an organization's program of assessing its vendors' management of that organization's information, and whether vendors are..