Client Services

Our Client Services

The story about how I came into working within data security is told here

Now, semi-retired,  I still enjoy discussing security situations and requirements with SME companies – those companies that are thriving within their sector and are fully engaged but have little time or budget left to ensure the stability of their data systems – and I find myself busier than ever

Always happy to discuss any thoughts or concerns a company may have – in total confidence


Business Accreditation

CYBER ESSENTIALS (UK Gov and National Cyber Security Centre / IASME)

A simple questionnaire (Cyber Essentials) with the addition of an external electronic scan (Cyber Essentials Plus) will provide a common platform which most UK suppliers will accept.

I will assist in all aspects and the certificate must be annually re-tested

The ISO/IEC 27000 family of standards helps organizations keep information assets secure.

Using this family of standards will help your organization manage the security of assets such as financial information, intellectual property, employee details or information entrusted to you by third parties.

ISO/IEC 27001 is the best-known standard in the family providing requirements for an Information Security Management System (ISMS).

An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process

I will assist in all aspects of the certification process and regularly work alongside a well respected accreditation company 

Audit & Compliance

PCI-DSS audits – both internal and external

Audit of network equipment components, operating systems and vulnerabilities

Audit of server builds and server ‘hardening’ work undertaken

We supply specialist software product to ensure that all project and compliance work is tracked, auditable and complete by all teams members wherever they are based

Security Policy Documentation

Specific, full or part sets of security policies

Internal Staff Training

As it says on the tin – staff awareness training sessions
Phishing campaigns that are guarenteed to reduce staff vulnerability over a 12 month period

Hacker’s View of You

An interesting (and often unnerving) look at your company and its digital footprint on the web; often highlights forgotten email, user ids, equipment etc

- Contact Details -