Helping companies improve Information and Cyber Security

Helping you manage all the security risks to your business – cyber, electronic and paper records, people, process, data protection legislation (GDPR), physical access and business continuity –  to avoid data breaches and compliance issues that lead to financial loss and reputational damage

Details on five ways we can help YOUR business >>

Protect your Information, Protect your Reputation

Manage Security Risks

Manage security risks

We help you manage all types of security risks; people, cyber, physical access, process and business continuity.

Get ready for GDPR

Get ready for GDPR

We can explain what the new data protection law means for your business and help you implement changes so you are ready for May 2018.

Answering Information and Cyber Security questions

Expert advice

We will answer any questions you have about Information and Cyber Security.

We don’t do IT. We don’t sell products.
We give honest and practical advice on best practice to manage all the security risks to your business, and help you develop and implement programmes to integrate security into your culture so you avoid data breaches and compliance issues that lead to financial loss and reputational damage.

View All Features

Our Blog

On Tuesday 17 October I was at IAPP’s ‘fireside chat’ with Elizabeth Denham, the Information Commissioner. The top 3 items for me were: GDPR certification – details to be published in early 2018, the ICO is leading the work on this in WP29. The Commissioner thought it should be based on Accountability and mentioned the approach… Read More

Continue Reading

On 25 May 2018 the General Data Protection Regulation (GDPR) replaces the Data Protection Act (DPA). The aim is to give individuals more control over how their personal data is used and get businesses to be more transparent over how it will be used. The UK Government have confirmed that Brexit has no impact. Businesses… Read More

Continue Reading

Early on in the ISO27001:2013 standard, page 1 section 4.2 to be precise, is ‘Understanding the needs and expectations of interested parties’. An organisation needs to determine the parties relevant to their information security management system (ISMS) and what requirements they could have for information security. The standard helpfully notes that requirements may include legal and regulatory… Read More

Continue Reading

This morning I received an email from Wetherspoons – I am a customer and did sign up to receive updates – saying they will no longer be sending emails as many consider this intrusive. I agree that some people can find this intrusive, but at the same time think this could be part of their General… Read More

Continue Reading

It isn’t hard to find an event at the moment that is specifically about GDPR or includes sessions to cover different aspects of it. With so many companies talking about it and promoting products and services to help prepare for May 2018, you would think/hope they would be the ones that are well on their way… Read More

Continue Reading

Thinking of moving to a new location? Here are some security items you should consider when selecting your perfect office. Location Consider neighbourhood public health and safety issues Is there an unacceptably high incidence of crimes against people or property? Will employees feel safe walking alone at night? Do the police or other emergency services have… Read More

Continue Reading
View Blog