Practice Protect

The Practice Protect Software Platform is the easiest way for teams to manage passwords, control access and protect data online.

Practice Protect acts as a single sign-on (SSO) solution that eliminates the need for the team to manage or be in control setting his or her own passwords for online business-critical application/software, which contain client’s sensitive information.


We take away the knowledge of all password for any team member who is not an administrator of the platform. This ensures they are not able to circumnavigate the system and forces access through the Practice Protect dashboard, which allows you to set restrictions around when, where and how they access that data. The main restrictions we can use are Geofencing, IP locks and time restraints, all on a per user basis. All team members will then have a full access log and audit trails across the applications you have granted them access to, giving you full visibility on when and where your data is being accessed.

This all backed by a suite of legal compliance documents we provide which shows the firms due diligence with the likes of the Mandatory Breach Reporting Legislation, CPD training for the team and full unlimited support at no cost.

Software Features

One Portal and One Password

Suspicious Activity Alerts

Password Reset Prevention

Complete Audit Trail

One Click Join/Leave

Concierge Onboarding

SAML Authentication

Ongoing Support

Multi-Factor Authentication

Advanced Geo-Locking

Works With Cloud Accounting Apps

Control Access

Practice Protect Firm Policies

Valued at over $20,000

Offline Data breach response plan: This validates your insurance policy. Insurers are now using the Mandatory Breach REporting legislation as a way of thoroughly assessing what measures you have in place and whether you would be in a stronger position as a result in the event of a breach the has also become a requirement of the Office of Australian Information Commissioner to demonstrate you have taken the correct steps in case a breach were to occur.

Engagement letter update: This makes it extremely clear to your clients how you are operating in a cloud-based enviroment, declaring what your business is doing to protect their data in the new world of cyber security. With a big-name business such as Facebook and WhatsApp succumbing to breaches more regularly, more clients are beginning to ask questions around how you are protecting their data.

Employee IT & cyber usage policy: This to ensure you have set correct expectations for your team when handling sensitive client information. 52% of data breaches occur due to human error, and more often than not, there are little to no policies or training for teams before breach occuring. By having an employee IT and cyber usage policy in place, you can demonstrate your due diligence as required by the OAIC under the guidelines of the Mandatory Breach Reporting legislation.

Third-party Systems Access Agreement: Regardless of who causes the breach, the entity owning the data is responsible. Many Australian firms are unaware that if hit with a breach caused by a third party such as external IT, the firm is held liable for that breach. This agreement states that third-parties are accountable, ensuring they are taking the correct measure when accessing your client’s sensitive information.

Emergency hotlines: 30 Minutes of free legal advice in the event of breach to guide you though the process.

Ready To Find Out More?