
Prioritizing Security for a Proactive Future with Microsoft Solutions
For non-profit organisations, securing their digital future requires prioritising cybersecurity. We achieved this for one client by putting security first. Leveraging Microsoft security solutions, we implemented a comprehensive solution that not only increased their response time to security threats, but also transformed their approach from reactive to proactive. This allows them to focus on their core mission with the confidence that their digital assets are well-protected.
CLIENT
NorthCott
INDUSTRY
Non-for-Profit
LOCATION
Australia
SERVICES
Cybersecurity
Numbers that Matter
The Client
Northcott, a not-for-profit organization established over 90 years ago, stands as one of Australia’s largest disability service providers. Operating throughout New South Wales (NSW) and the Australian Capital Territory (ACT), Northcott offers services in both metropolitan and regional locations. The organization is dedicated to empowering individuals with disabilities to achieve their full potential. Northcott achieves this mission by providing personalized and adaptable support services. A highly committed team delivers these services, ensuring each client receives optimized support tailored to their specific needs.
Motivations for Change:
Northcott faced several challenges in maintaining a robust cybersecurity posture. The organisation lacked dedicated resources for security operations (SecOps) and a Security Operations Centre (SOC), hindering the efficient and effective management of security tasks. Recognising the value of such resources, Northcott sought an investment that would enable qualified staff to address security needs.
Furthermore, Northcott identified a need for improved reporting mechanisms. The existing system limited the generation of actionable insights for leadership and the board regarding the organisation’s security status and incident response.
Northcott aspired to adopt a proactive and transparent approach to security, demonstrating a strong commitment to protecting its assets. This proactive approach, they believed, would mitigate the risk of data breaches and associated reputational damage. To achieve this goal, Northcott required a dedicated security partner.
The Solution
iwx delivered a comprehensive and reliable security solution for Northcott within a three-month timeframe. The solution addressed Northcott’s challenges through the following key components:

24/7 Security Operations Centre (SOC) and Security Response
This service provided continuous monitoring and incident response, ensuring rapid detection and resolution of security threats.

Optimised Security Controls
iwx implemented well-considered security controls that minimised user impact while enhancing operational effectiveness during incident response. These controls adhered to the ASCS ASD 8 security standards.

Unified Security Platform
Leveraging Microsoft Security tools, including Microsoft XDR and Azure Sentinel SIEM, iwx created a centralised and scalable platform for comprehensive security management.

Enhanced Endpoint Protection
Next-generation Anti-Virus (AV), Endpoint Detection and Response (EDR), and Zero Trust endpoint controls were deployed to strengthen the overall protection of Northcott's devices.
The Impact:
The security solution implemented for Northcott yielded significant improvements across several key areas:
- Enhanced Threat Detection and Response: Optimised security controls minimised user disruption while improving operational effectiveness during incident response. This resulted in a demonstrably reduced mean time to detect (MTTD) and mean time to respond (MTTR) to security threats, ultimately enhancing user satisfaction and productivity.
- Improved Security Posture and User Experience: The deployment of modern single sign-on (SSO) and multi-factor authentication (MFA) streamlined access to applications and systems, strengthening overall security without compromising user experience. Additionally, simplified identity and access management (IAM) processes and policies further reduced the risk of compromised credentials and identity theft.
- Proactive Threat Mitigation: iwx established a proactive security environment for Northcott, enabling the identification and mitigation of security threats before they could cause harm. Continuous monitoring and alerting, coupled with regular security assessments and audits, ensured the ongoing maintenance of a robust security posture and compliance with relevant standards.
- Alignment with Industry Best Practices: Security controls were meticulously aligned with the Australian Signals Directorate (ASD) Essential 8 and the National Institute of Standards and Technology (NIST) Cybersecurity Framework. These widely recognised benchmarks provided a strong foundation for Northcott's security strategy. Furthermore, iwx ensured the controls addressed Northcott's specific requirements and objectives, creating a clear and consistent roadmap for future security enhancements.
Related Case Studies


Transforming Legal Practice with Secure IT Modernisation

Empowering Remote Work: A Case Study in IT Infrastructure Transformation
Ready to secure your digital future?
Talk to our expert now.
