CCIQ is now Business Chamber Queensland

Business Ready QAssure Details
Business Ready QAssure number
12603
Legal Entity Name Velvet Systems Pty Ltd
Trading Entity Name Velvet Systems
Website Address www.velvetsystems.com.au
Street Address 3/300 Cullen Ave East, Eagle Farm, Queensland, 4009, Australia
Phone Number 07 3160 7464
Small-to-medium Business (SME) Yes
Indigenous Business No
To qualify as an indigenous business, a business must either: be at least 50% owned by Aboriginal or Torres Strait Islander people; employ at least 75% Aboriginal or Torres Strait Islander people; be an equal joint venture agreement with a majority-owned Aboriginal or Torres Strait Islander business entity.
Cyber Security Insurance Coverage Expires 06/06/2026

This Business Ready QAssure supplier currently has a free listing. Further capability, executive summary and company information can be obtained from the company directly. Government employees can enter their own email for government administrator login full access.

Cyber Security Capabilities
Overview At Velvet Systems, we are committed to maintaining the highest standards of cyber security across all our operations. Our approach aligns with the Queensland Government’s Information Security Policy (IS18) and the associated frameworks under the Queensland Government Enterprise Architecture (QGEA). Governance and Risk Management Our cyber security governance includes regular risk assessments, incident response planning, and continuous improvement processes. Implementation of the Essential Eight We implement the Essential Eight mitigation strategies recommended by the Australian Cyber Security Centre (ACSC) to strengthen our cyber resilience: Application Control – We use allowlisting to prevent unauthorized applications from executing. Patch Applications – We apply security patches for applications within 48 hours of release. Configure Microsoft Office Macro Settings – Macros are disabled by default and only allowed in trusted environments. User Application Hardening – Features like Flash, ads, and Java are disabled or restricted in browsers. Restrict Administrative Privileges – Admin rights are tightly controlled and reviewed regularly. Patch Operating Systems – OS patches are applied promptly to mitigate vulnerabilities. Multi-Factor Authentication (MFA) – MFA is enforced for all remote access and privileged accounts. Daily Backups – Critical data is backed up daily and tested regularly for integrity and restoration. Continuous Improvement Our cyber security policies are reviewed annually or following any significant changes in the threat landscape. Staff undergo regular training in cyber awareness, phishing prevention, and secure data handling.