Contact Us

Data and analytics

Some additional information in one line

Learning analytics

Transform your data into meaningful insights.
Learn More

Applications and data

Bespoke solutions to simplify and streamline your workflows.
Learn More

Artifical intelligence

Harness the power of AI to learn more from your data.
Learn More


Some additional information in one line


Some additional information in one line
Learn More

Change management

Some additional information in one line
Learn More

Cyber risk

Some additional information in one line
Learn More

ICT strategy

Some additional information in one line
Learn More

Managed services

Discover why more organisations are benefiting from managed services.

ICT managed services

We can manage all aspects of your ICT operations - from day-to-day tasks to long-term strategy.
Learn More

Managed data and analytics

Need some help with your data? Let us manage your systems and data for you.
Learn More

Escalation and remote support

Sometimes you just need a sounding board, or somebody to escalate a problem to. We're here to help.
Learn More

Our people

Multiple menus to choose from. Each drag-n-drop customizable.

Our values

Learn about the values that drive the people at RTG.
Learn More

Current vacancies

If you're looking for the next step in your career, RTG might have the perfect role for you.

Join us

If you like what you see, why not apply for a position with us? Submit your CV here.
Apply Now

Cyber risk consulting

Extending compliance into effective practice and engagement. 


Digital privacy, safety and security

Ascertain the degree of adoption, structure and adherence towards the compliance of cyber security and data privacy expectations.

Maximise Connectivity | Minimise Risk

The pressure to implement cohesive mitigation steps required by schools to address cyber security and data privacy obligations is increasing at an alarming rate. Since the 2018 introduction of the mandated Notifiable Data Breach (NDB) scheme, there has been a 712% increase in reports being made to the Office of the Australian Information Commissioner (OAIC).

When trying to manage data privacy, many schools are reactive rather than proactive in their response. The increasing adoption of technology brings with it the huge increase of data that is collected, stored and communicated within cloud-based applications and software. For schools, this creates a sensitive intersection between data privacy and cyber risk mitigation. The types of threats facing schools are constantly evolving, challenging the ability of organisations to be adequately prepared to respond to a data breach or cyber incident.

The education sector represents the 4th highest industry group from which data breaches are reported. Findings from the OAIC’s 12-month Insights Report shows incidents of cyber security and/or data breach reports made from the education sector is most commonly caused through human error.


Screen Shot 2019-08-29 at 3.20.09 pm


The Digital Privacy, Safety and Security solution (DPSS) is used by schools to benchmark existing practices relating to compliance and adoption of data privacy, data management, and cyber security regulations. Once your school’s DPSS benchmarks have been identified, use feedback from your customised analytic dashboard to design and implement change management strategies that build a sustainable, proactive approach towards DPSS-related operations, procedures and training.


Compliance is about more than box-ticking and documentation. Policies need to be enacted every day by busy employees trying to get their jobs done. Cyber security needs to be in the DNA of any organisation, with policies being revisited and updated as the cyber threat landscape evolves. Growing reliance on technology adoption in schools increases the likelihood and level of potential data breach incidents and related costs. Read more about how the DPSS solution helped this US school district to develop a strategic digital safety roadmap for the 2017-18 school year.


"I found it worthwhile to explore new ideas in this

area and to get people together to consider our current actions.”

Head of Learning

VIC Catholic School, 2018.


Learn More

ICT Security Controls Audit

Determine whether essential ICT security functions are effective and relevant to your organisational needs.

Systems | Governance | Processes

Included as part of your organisation’s risk management protocol, the completion of an ICT Security Controls Audit provides insight towards your school’s cyber security posture to support everyday operations. The types of cyber threats facing organisations are constantly evolving, challenging the ability with being adequately prepared and ready to respond in a timely and effective manner. 

Findings from the OAIC Quarterly Report (April – June 2019) showed of the total data breaches in that quarter, nearly 70% involved cyber incidents, such as phishing, malware or ransomware, brute-force attacks, or compromised or stolen credentials. It is clearly not enough for schools to implement security controls such as firewalls, virus protection and content filtering in a bid to protect against cyber risk. Schools need to regularly review their ICT safeguards, looking proactively towards how to react, defend and respond within the agile cyber risk environment.

The ICT Security Controls Audit will aid your organisation in building resistance against cyber threats and vulnerabilities. Capturing data through online surveys and interviews, RTG collates information relating to current ICT Security Control practices, structures and workflows. From here, a thorough analytic process is performed to ascertain

There are four key attributes which contribute to the ICT Security Controls Risk Profile.

  1. Organisational Governance, such as having ICT Strategic Plans in place and followed; plus existence of appropriate policies, procedures, processes and standards.
  1. Planning, such has ensuring Risk Registers exist and are reviewed to safeguard business continuity; plus adopting a scheduled ICT maintenance regime.
  1. Assets & Systems, such as Patches and Firmware processes and application; plus monitoring and issue rectification.
  1. Infrastructure & Network Architecture, such as network and server structure regime, plus testing and change management protocols.

Screen Shot 2019-09-11 at 7.37.33 pm


On completion of the ICT Security Controls Audit, organisations will have an analysis of their current reality, identified areas that need improvement, and obtained resources to make improvements focused on cyber risk management, and on a proactive environment focused on cyber risk mitigation. The time is now for organisations to develop a roadmap and action plan that includes communication and documents necessary to ensure the prevention of cyber threats, and maximise innovative learning. 

Learn More

Disaster recovery strategy

The best strategy for recovery is to plan for the worst.

DR | Back Ups | Business Continuity

Reliance on technology to improve administrative and operational efficiency, plus delivery of day-to-day tasks, has become the new norm. An organisation’s ICT system -  combining hardware, various operating systems, databases, applications and software – processes and stores an incredible volume of information. With information being one of the most important assets of an organisation, how confident are you with ensuring the confidentiality, integrity and availability of your ICT systems and data in the event of an unplanned outage?

Disaster Recovery is more than simply backing up and restoring data; much more.

It is knowing which concrete steps to take in order to get critical systems up and running again, and what you need to do to get them working again in an acceptable time frame. It is agreeing on what your organisation’s acceptable business risks are when your systems and applications go down. It is knowing the exact response to a malicious cyber attack that has potential to cripple your organisation’s ICT systems and data access.


Screen Shot 2019-09-19 at 10.13.23 am

When disaster strikes, how quickly can you get your business operations back up and running?

SOURCE: RTG Digital Privacy & Principles Research Study (2019)

The cost of adopting a Disaster Recovery strategy are significantly low when compared to the potential high costs of not having a strategy in place. The increased likelihood of a cyber threat, together with the improved sophistication of malicious cyber attacks means a simple back up plan won’t work. Experiencing a cyber threat or unplanned outage could put vital business or personal data at risk of being lost forever. It has been reported that cyber attacks are getting worse and more sophisticated. Having the right processes in place, against the right priorities, led by right recovery team is an important feature for any business continuity to take place.

Learn More

Cyber Risk - Featured Blogs

Subscribe Here!