Our Services
Cyber Security Roadmap
Security Uplift
Cyber Security is made up of People, Processes, and Technology. We can help you uplift security across all three areas.

People
We offer training to educate your staff on security best practices. This is otherwise known as Security Awareness Training.
​
Given the high frequency of scams targeting small businesses, this training is paramount in reducing the likelihood of your business being impacted.

Processes
Our Cyber Security Practitioners are well versed in setting up essential cyber security processes. These include:
​
Responding to Incidents
Third Party Due Diligence
Managing User Access
Managing Technological Assets
Updating Software and Hardware

Technology
We can help securely implement fundamental security tools. These include:
Regular Backups
Endpoint Protection
Multi-Factor Authentication
Email Security
Security Reviews
We'll provide both questionnaire based and hands on services to review your business's Cyber Security.
Re-Checkup
This will be an amended review of your initial checkup. As your security function improves, we will identify additional gaps and provide recommendations to ensure continuous improvement.
Penetration Testing
Penetration Tests are controlled cyber attacks on your business's systems.
We follow industry standards to test key areas, such as:
Websites
Wi-Fi
Networks
Phishing Simulation
Once your staff are provided with Security Awareness Training, we will send mock phishing or scam emails. Findings will be displayed in a report that showcases the training's effectiveness.
Vulnerability Assessment
Penetration tests are thorough and effective, but they're resource intensive and consequently more expensive.
​
Vulnerability Assessments are a cheaper alternative which identify weaknesses in the same key areas.
Security Compliance Services
These services ensure your business meets industry standards and regulatory requirements.
We can prepare your business for ISO 27001 external audits and SOC 2 Observatory Periods.
We also prepare businesses for compliance with the ASD Essential Eight.

ISO 27001
ISO 27001 has many requirements and two main audits to become certified: Stage 1 and Stage 2.
Our services help you pass both Stage 1 and 2.
After certification, surveillance audits must be undertaken annually to verify compliance is maintained.
We can also help you prepare for these surveillance audits.

Essential Eight
Unlike ISO 27001 and SOC 2, Essential Eight does not require external audits to verify compliance.
Therefore, we can prepare you for Essential Eight compliance. After our preparations, we can perform an audit to ensure you are fully compliant.
