The Disciplines Plate IV Cybersecurity
Cybersecurity.
Security that protects without getting in the way.
MSc-level cyber, applied with a light hand. Posture reviews, hardening, secrets management, monitoring — the kind of security that fits the scale of the business, not the anxiety of the vendor.
Return to the workshopCybersecurity doesn't have to be complicated or expensive — but it does have to be effective. We focus on practical measures that protect your business without creating friction for the people who actually have to use the systems every day.
No scare tactics. No selling you things you don't need. No framing "Cyber Essentials" as a complete security program. Just sensible controls appropriate for your size, your industry, and your real risk profile — delivered by someone who's spent two decades inside security organisations and holds an MSc in the discipline.
§ What we protect
-
I.
Infrastructure security
Secure server configuration, properly configured firewalls, intrusion detection, automated patching, vulnerability scanning. Your infrastructure hardened against the common attack vectors that actually get exploited.
-
II.
Application security
Secure coding practices, input validation, protection against SQL injection and XSS, proper authentication and session management. Applications built with security assumed from day one.
-
III.
Access control
MFA, password policies that don't drive people to post-its, role-based access, least privilege. The right people with the right access — and nobody else.
-
IV.
Data protection
Encryption at rest and in transit, secure backups, retention policies, GDPR compliance where required. Your data — and your customers' data — protected properly.
-
V.
Email security
SPF, DKIM, DMARC configured correctly. Spam filtering, phishing protection, secure gateway setup. Business email compromise is one of the most common routes in — we close it.
-
VI.
Security monitoring
Log analysis, intrusion detection, anomaly detection, alerts tuned to matter. We watch for suspicious activity and respond before incidents become breaches.
§ The approach
-
Step 1
Security assessment
Evaluate your current posture. What are you protecting? What are the realistic threats? Where are the gaps? Forms the foundation of a practical plan — not a vendor's wish list.
-
Step 2
Risk-based priorities
Not all risks are equal. We prioritise by likelihood and impact. Resources go to protecting what's actually valuable and vulnerable — not to ticking boxes nobody reads.
-
Step 3
Implementation
Deploy controls systematically — technical (firewalls, encryption), administrative (policies, procedures), physical where relevant. Layer defences for depth.
-
Step 4
Training & awareness
Your team is the first line of defence. Practical training on phishing recognition, secure password practices, reporting suspicious activity. Security becomes everyone's concern.
-
Step 5
Ongoing monitoring
Not set-and-forget. Continuous monitoring, regular updates, periodic reviews, adaptation to new threats.
-
Step 6
Incident response
If something does happen, we have a plan. Documented procedures, clear escalation paths, communication protocols. Hope for the best, prepare for the worst.