6clicks
We are on a mission to protect consumers by providing the best GRC software platform that helps businesses and advisors demonstrate compliance, improve cybersecurity and reimagine risk.
6clicks was founded in 2019 by co-founders Andrew, Louis and Ant in the face of increasing regulation across all sectors, the need for businesses to manage risk better, and a wake of high-profile hacks making cyber security for businesses paramount.
The idea was for 6clicks to be used by advisors and businesses that integrated all the functionality you need for audit, risk and compliance, content and AI to supercharge the experience and save time. Early in 2020, the 6clicks platform was released underpinned by three core characteristics that still power the platform today - 1) our unique Hub & Spoke architecture making deployment easy for advisors and businesses with autonomous teams, 2) powered by AI (now Hailey, our AI engine), and 3) with a fully-integrated content library.
6clicks' vision is to restore trust in businesses by enabling businesses and advisors to easily demonstrate compliance, improve cyber security and reimagine risk for their customers, prospects, and partners.
What's behind the name 6clicks?
Like many early stage companies, we wrestled to find a suitable name for the business. The inspiration finally came when we decided that we wanted it to be as easy as possible to send a vendor risk assessment. The goal was simple - complete this task in the fewest mouse clicks possible. 6 clicks was the goal and still is! And there you have it; the name 6clicks was born.
-
Content, CybersecurityNIST SP800-171 r2SKU: NIST SP800-171 r2NIST SP 800-171 r2 is a set of standards and guidelines to help non-federal systems and organisation ...
-
Content, Audit & Assessment templatesNIST SP800-171 r2 Question SetSKU: NIST SP800-171 r2 Question SetThis download includes the NIST SP800-171 r2 core controls and mapped questions that you can use to ...
-
Content, LegislationNSW Cyber Security Policy (NSW CSP)SKU: NSW Cyber Security Policy (NSW CSP)The policy outlines the mandatory requirements to which all NSW government departments and Public Se ...
-
Content, Audit & Assessment templatesNSW Cyber Security Policy (NSW CSP) Question SetSKU: NSW Cyber Security Policy (NSW CSP) Question SetThis download includes the NSW CSP Maturity Reporting requirements and questions to perform an asses ...
-
-
Content, StandardsOWASP Application Security Verification Standard (ASVS)SKU: OWASP Application Security Verification Standard (ASVS)The primary aim of the OWASP Application Security Verification Standard (ASVS) Project is to normal ...
-
Content, StandardsOWASP Secure Medical Device Deployment Standard (SMDDS)SKU: OWASP Secure Medical Device Deployment Standard (SMDDS)The OWASP SMDD Standard specifies security controls and requirements for testing, purchasing, and co ...
-
Content, Audit & Assessment templatesOWASP Secure Medical Device Deployment Standard (SMDDS) Question SetSKU: OWASP Secure Medical Device Deployment Standard (SMDDS) QuestionThis download includes the OWASP Secure Medical Device Deployment Standard (SMDDS) including a basic ...
-
Content, Risk librariesPandemic RiskSKU: Pandemic RisksRisks that relate to the mass spread of disease. Most notably, Coronavirus.
-
Content, StandardsPayment Card Industry Data Security Standard 3.2.1 (PCI-DSS)SKU: Payment Card Industry Data Security Standard 3.2.1 (PCI-DSS)Global security standard for protecting cardholder data & reducing credit card fraud.
-
Content, Structured ReportsPCI-DSS SAQ A-EP v3.2.1 Assessment TemplateSKU: PCI-DSS SAQ A-EP v3.2.1 Assessment TemplateSAQ A-EP has been developed to address requirements applicable to e-commerce merchants with a websit ...
-
Content, Control setsPhysical and Environmental SecuritySKU: Physical and Environmental SecurityThis Physical and Environmental Security controls set / policy helps to prevent unauthorised physica ...
-
Content, LegislationQueensland Information Security Policy (IS18:2018)SKU: Queensland Information Security Policy (IS18:2018)The QLD IS18 annual return is an annual assessment of cyber security required to be undertaken by QL ...
-
Content, Audit & Assessment templatesQueensland Information Security Policy (IS18:2018) Question SetSKU: Queensland Information Security Policy (IS18:2018) Question SetThis download includes the QLD IS18 annual return requirements and questions to perform an assessmen ...
-
Content, CybersecuritySA Cyber Security Framework (CSF)SKU: SA Cyber Security Framework (CSF)The South Australian Cyber Security Framework (SACSF) is a cabinet approved, whole of government app ...
-
Content, Audit & Assessment templatesSA Cyber Security Framework (CSF) Question SetSKU: SA Cyber Security Framework (CSF) Question SetThis download includes the SA Cyber Security Framework (CSF) requirements and mapped questions that ...
-
Content, CybersecuritySecure Controls Framework (SCF)SKU: Secure Controls Framework (SCF)The Secure Controls Framework (SCF) is a comprehensive catalog of controls that is designed to enabl ...
-
Content, Audit & Assessment templatesSecure Controls Framework (SCF) AssessmentSKU: Secure Controls Framework (SCF) AssessmentThe Secure Controls Framework (SCF) is a comprehensive catalog of controls that is designed to enabl ...
-
Content, CybersecuritySOC 2 Trusted Services CriteriaSKU: SOC 2 Trusted Services CriteriaThe 2017 Trust Services Criteria provides 5 criteria in the accounting sector covering the areas of ...
-
Content, Audit & Assessment templatesSOC 2 Trusted Services Criteria Question SetSKU: SOC 2 Trusted Services Criteria Question SetThe 2017 Trust Services Criteria provides 5 criteria in the accounting sector covering the areas of ...
-
Content, Risk librariesStartups & New VenturesSKU: Startups & New VenturesThis Risk Library contains the most prevalent risks affecting startups and new business ventures tod ...
-
Content, Control setsSupplier Security Control SetSKU: Supplier SecurityThis Supplier Security controls set / policy helps to ensure protection of the organisation’s asse ...
-
Content, Control setsSystem Acquisition and Development Control SetSKU: System Acquisition and DevelopmentThis System Acquisition and Development controls set / policy helps to ensure that information secur ...
-
Content, CybersecurityTAS Information Security Framework (ISF)SKU: TAS Information Security Framework (ISF)The TAS Information Security Framework provides a consistent, risk-based approach to protecting Tasm ...
-
Content, Audit & Assessment templatesTAS Information Security Framework (ISF) Question SetSKU: TAS Information Security Framework (ISF) Question SetThe TAS ISF provides a consistent, risk-based approach to protecting Tasmanian Government informatio ...
-
Content, Audit & Assessment templatesUAE Information Assurance (IA) AssessmentSKU: UAE Information Assurance (IA) AssessmentThe UAE Information Assurance (IA) Standards are designed to mitigate cyber threats and ensure the d ...
-
Content, StandardsUAE Information Assurance (IA) StandardsSKU: UAE Information Assurance (IA) StandardsThe UAE Information Assurance (IA) Standards are designed to mitigate cyber threats and ensure the d ...
-
Content, CybersecurityUK NCSC Cyber EssentialsSKU: UK NCSC Cyber EssentialsThe UK NCSC Cyber Essentials is a simple but effective, Government backed scheme that will help you ...
-
Content, Audit & Assessment templatesUK NCSC Cyber Essentials Question SetSKU: UK NCSC Cyber Essentials Question SetThe UK NCSC Cyber Essentials is a simple but effective, Government backed scheme that will help you ...
-
Content, StandardsVictorian Protective Data Security Standards 2.0 (VPDSS)SKU: Victorian Protective Data Security Standards 2.0 (VPDSS)The Victorian Protective Data Security Standards (VPDSS) establish 12 high level mandatory requireme ...