Home

Are you happy with your IT? Do the words “Cyber  Security” make you feel uneasy? It’s an area that can be complex, technical, and expensive – and the marketing typically dwells on the worst-case outcomes if things go wrong.

It doesn’t have to be like that. With over 30 years experience, we help organisations of all shapes and sizes to adopt a proportionate and risk-managed approach to IT that enables them to function effectively, safely and securely.

As a micro business, the solutions we offer are both flexible and cost-effective, and we are more than happy to undertake small, stand-alone pieces of work.

Call us on 07753 832169 or email us to discuss how we can help protect your information, your finances and your reputation.

About

Our services are provided by John Hall. John is an independent IT Consultant and Information Security Professional, based in Exeter, offering pragmatic advice and assistance based on over 30 years experience of IT generally, and information and cyber security specifically. He has worked with organisations in both the private and public sectors, ranging in size from micro-businesses to global corporations. He spent a number of years with IBM, where his clients included many household names.

John is a Certified Information Systems Security Professional (CISSP), and he was also an accredited adviser to the public sector under the UK Government’s CLAS scheme.

John’s practical experience will help you to use IT effectively, safely and securely.

Blog

Cloud is a hot topic and so is cyber security. What happens when the two meet?

When Cloud meets Cyber? Cloud is a hot topic and so is cyber security. What happens when the two meet? The popularity of cloud computing continues to grow. One recent report found that 92% of organisations now use at least one public cloud. Amongst the reasons for this are savings in time and money, and the …

Cyber security and information risk guidance for Audit Committees

The National Audit Office has published ‘Cyber security and information risk guidance for Audit Committees’. It provides a checklist of questions and issues covering: The overall approach to cyber security and risk management Capability needed to manage cyber security Specific aspects, such as information risk management, network security, user education, incident management, malware protection, monitoring, …