Oops! Sorry!!

This site doesn't support Internet Explorer. Please use a modern browser like Chrome, Firefox or Edge.

cyber security made easy

    Congratulations on taking Action: The Next Steps


    Know Your Risk

  • Book a meeting

  • I will be in touch to find the best time to meet you. 

  • Gather data

  • An audit conducted through survey, direct questions and observation.

  • Plan

    Create the Plan

  • Understand

  • Crunch the data

  • Report


  • Produce your cyber security gap analysis and implementation action list

  • Knowledge

  • Help you understand the report and what is required.

  • Prioritize Effort

  • Prioritize the implementation with you to be cyber protected as fast as possible while considering your resources. 


    Power Your People

  • Action

  • Continued engagement to help your business be cyber safe

Cyber Security Elements

for Audit

  • Hardware all electronic devices. Networking, servers, cloud, desktop, and mobile. Owned and BYOD

  • Physical security. Desktop, premises, cabinets

  • Access.  Authentication, passwords, accounts

  • People, awareness, training, culture, contractors, 

  • Network. Fixed and WIFI, video, communication, gateways 

  • Software. Known, unknown, cloud, browser extensions

  • Social, websites, marketing, CRM

  • Backup and disaster recovery

  • Risk analysis

  • Logging and Monitoring

  • Policies and procedures

  • Legislation. Industry specific, National and global requirements

  • Environment. Supply chain, customer