We can assess the security of your software, computers and processes and implement improvements.

IT Risk Assessment

We can discuss what level of security you need to fulfil your legal obligations for data protection and to ensure your organisation's continuity. We will then assess your existing, software, computers and processes to determine what you need to do in order to meet these requirements.

IT Procurement

We can use the risk assessment we've written, together with further discussions with your team to decide on a list of hardware and software to be procured to secure your organisation.

We can procure routers, wireless access points, computers, smartphones and VOIP phones on your behalf and configure them securely for you.

We can procure operating system management software, anti-virus software, user authentication software, password management software and cloud-based productivity software and implement them securely for you.

Cyber Essentials Certification

Once we have assessed your risks and procured any hardware or software necessary to mitigate them, we can arrange for our partner, IT Governance, to conduct a certification of your organisation against the standard of your choice.

The most popular standards for SMEs in the United Kingdom are Cyber Essentials and Cyber Essentials Plus, which are quite straightforward and cost effective ways to stand out when pitching or tendering for new business.

We can also arrange PCI DSS and ISO 27001 certifications if you have specific requirements for these more exacting standards.


Our Partners

IT Governance
PC Engines
Ruckus Wireless