Home  | Online Chat

Information Security

Protection against malicious data loss and theft is a key consideration for business leaders today. The traditional perimeter protection approach no longer serves well, as the workplace has become more mobile, the threats more flexible and the economic pressures more intense.

Similar to the military sphere, in which we are also active, the threat is from everywhere all the time, and only flexible and sound principle based strategies will survive the challenge.


We take a holistic view of security - it must needs cover all the attack vectors, however there are three main areas of protection that we strongly recommend you consider as a starting position - not all will be needed in all cases and some companies need additional protection:


Staff The biggest threat to security remains the human element, especially in management, road warriors and (controversially) IT departments, where there is need or ability to depart from normal protection. This takes the form of training, and empowerment by information - true stories, compelling reasoning and security policies that are proportionate to the need give every level of personnel the opportunity avoid being scammed.

Computers & Personal Devices

BYOD Contrary to some pundits views, we believe there is still a definite need for protection at device level, functioning with updated cloud based information, but still protecting when network connectivity is lost. Performing all the traditional AV functions (regular scanning, on-access scan, behavourial monitoring, rootkit detection, and then adding protection for today's persistent threats - compromised web pages, removeable drives, browser hacks and prompting users to encrypt sensitive data before allowing transfer.

Physical Network - Firewall

Firewall The true cost of a serious hardware firewall is now so low that we recommend this even for small businesses of 5 users and over. So called 'Next Gen' firewalls lock down malware in new and creative ways, and give visibility and logging so you can trace suspicious behaviour, view staff browsing patterns, or simply maximise your connectivity.