
Business Ready QAssure Details | |
---|---|
Business Ready QAssure number |
12603
|
Legal Entity Name | Velvet Systems Pty Ltd |
Trading Entity Name | Velvet Systems |
Website Address | www.velvetsystems.com.au |
Street Address | 3/300 Cullen Ave East, Eagle Farm, Queensland, 4009, Australia |
Phone Number | 07 3160 7464 |
Small-to-medium Business (SME) |
Yes ![]() |
Indigenous Business |
No
To qualify as an indigenous business, a business must either: be
at least 50% owned by Aboriginal or Torres Strait Islander people;
employ at least 75% Aboriginal or Torres Strait Islander people;
be an equal joint venture agreement with a majority-owned
Aboriginal or Torres Strait Islander business entity.
|
Cyber Security Insurance Coverage | Expires 06/06/2026 |
Cyber Security Capabilities |
---|
Overview At Velvet Systems, we are committed to maintaining the highest standards of cyber security across all our operations. Our approach aligns with the Queensland Government’s Information Security Policy (IS18) and the associated frameworks under the Queensland Government Enterprise Architecture (QGEA). Governance and Risk Management Our cyber security governance includes regular risk assessments, incident response planning, and continuous improvement processes. Implementation of the Essential Eight We implement the Essential Eight mitigation strategies recommended by the Australian Cyber Security Centre (ACSC) to strengthen our cyber resilience: Application Control – We use allowlisting to prevent unauthorized applications from executing. Patch Applications – We apply security patches for applications within 48 hours of release. Configure Microsoft Office Macro Settings – Macros are disabled by default and only allowed in trusted environments. User Application Hardening – Features like Flash, ads, and Java are disabled or restricted in browsers. Restrict Administrative Privileges – Admin rights are tightly controlled and reviewed regularly. Patch Operating Systems – OS patches are applied promptly to mitigate vulnerabilities. Multi-Factor Authentication (MFA) – MFA is enforced for all remote access and privileged accounts. Daily Backups – Critical data is backed up daily and tested regularly for integrity and restoration. Continuous Improvement Our cyber security policies are reviewed annually or following any significant changes in the threat landscape. Staff undergo regular training in cyber awareness, phishing prevention, and secure data handling. |