Skip to main content

Services

Cybersecurity

Sensible security for teams without a security team.

Cybersecurity for SMEs is mostly about the basics done well: keeping endpoints protected, catching phishing attempts before they cause damage, and responding quickly when something does go wrong. All of that is included in your £10/user/month plan. We're honest that we're not a security operations centre — but for most 10-50 person businesses, you don't need one.

What's included

  • Endpoint protection queries — help understanding what your existing AV/EDR is telling you, and advice on whether an alert is a real threat or a false positive.
  • Phishing report triage: staff can forward suspicious emails to us; we'll tell them whether it's genuine, advise on next steps, and flag to a UK engineer if credentials may have been compromised.
  • Incident first response: if a staff member's account or device is suspected to be compromised, we'll guide the isolation steps and initiate a password reset sequence immediately.
  • Hardening advice: MFA enforcement recommendations, admin privilege review, browser extension audits, and common SME misconfiguration checks.
  • Cyber Essentials technical readiness checks — see what you'd need to change before a formal assessment (full compliance support in our Compliance Support service).
  • Guidance on secure remote working: VPN queries, public WiFi risks, device encryption status checks.

How it works in practice

A staff member clicks a link in what turns out to be a phishing email and enters their M365 password.

They report it immediately via chat. The AI instantly guides them to change their password and revoke active sessions in M365, and escalates to a UK engineer who checks the account's sign-in log for suspicious activity and reviews whether any data was accessed. The whole initial response takes under five minutes.

Windows Defender flags an alert on a laptop and the user doesn't know if it's serious.

The AI reads the alert details from the endpoint agent, cross-references against known false positive patterns, and either confirms it's benign (with an explanation) or escalates to an engineer for manual review with the full diagnostic context attached.

The business is asking "are we doing the basics right?" before a client audit.

A UK engineer runs through the standard Cyber Essentials control areas — boundary firewalls, secure configuration, access control, malware protection, patch management — and provides a plain-English gap report with prioritised recommendations.

What's not included

We think it matters to be direct about this rather than letting you discover it during an incident.

  • 24/7 security operations centre (SOC) monitoring. We don't continuously monitor your environment for threats around the clock. For that level of coverage, you need a dedicated SOC provider — we'll recommend one if you ask.
  • Penetration testing. We don't carry out ethical hacking or vulnerability assessments. These require scoped engagements with a specialist firm; we can help you understand what to ask for.
  • Incident response retainer or forensic investigation. If you experience a serious breach requiring forensic evidence preservation and legal-grade investigation, that's outside our scope. We'll help with immediate containment and connect you with a specialist IR firm.

Ready to try AI-led IT support?

Sign up, install the agent, and start raising tickets. £10 per user per month. Cancel any time.