Dedicated to creating and protecting value

Our passion is data security and privacy solutions for small or medium sized business.

We specialize in helping clients understand, implement and meet data security and privacy requirements – reducing financial and reputational risk.

Assess your riskTalk to an expert

Business Woman
Step One: Assess Your Risk

Define your legal obligations and build a program tailored to your business needs, resources, and risks.


Today’s small business (SMB) must comply with laws regulations, industry standards, ethical obligations and contractual requirements. For SMBs, this can be complicated and expensive.

Assess your risk

Legal

Legal

The increasing number of security requirements from state and federal laws creates a complex landscape for businesses.

Civil

Civil

Hacks, data breaches, and data leaks can be followed by costly lawsuits with million-dollar payouts. Are you taking “reasonable” steps to protect your data?

Business

Professional

Ethical obligations, business contracts, and your professional reputation depends on maintaining client, patient, and customer confidentiality.

Recovery

Recovery

Cybersecurity is an investment. $1 invested before a cyber incident can save you $100 or more to recover from a preventable attack.

Assess Your Risk

Define your legal obligations and build a program tailored to your business needs, resources, and risks.


Your business and profession has its own laws and regulations, industry standards, and ethical obligations. For SMBs, this can be complicated and expensive.

Assess your risk

Meeting
Step Two: Build Policies & Education

Customize a solution and educate your team.


We can help you to design and document your security and privacy solutions, and train your team how to protect your business, avoid cyber risks, and recover from any incidents that may occur.

Assess your risk

Build & Education

Nothing provides greater protection for your business than a well-designed security program. Nothing ensures success of that program more than an educated team.


We can help you to create or improve your cybersecurity program and train your team how to protect your business, avoid cyber risks, and recover from any incidents that may occur.

Assess your risk

Network

Network

Protect confidentiality, integrity, and accessibility of data and computer networks including firewalls, intrusion detection, and virtual private networks.

Incidents

Incidents

Plan for the “what ifs” by having plans, Policies, and procedures in place for business continuity, managing customers, and cyber events.

Data

Data

Define what you collect, how it is handled, how and where it is stored. Great for internal and external stakeholders.

Organisational

Organizational

Assign roles to manage cyber risk and plan for ongoing education of your staff to prevent the most common threats to your business.

Step Three: Build Policies & Education

“Take action! An inch of movement will bring you closer to your goals than a mile of action.” Steve Maraboli


We can help you make data security and privacy plan a reality. Putting your plan in action is the secret to protecting your business and your customer.

Assess your risk

building
Organisational

Organisational

Assign roles to manage cyber risk and plan for ongoing education of your staff to prevent the most common threats to your business.

Organisational

Organisational

Assign roles to manage cyber risk and plan for ongoing education of your staff to prevent the most common threats to your business.

Organisational

Organisational

Assign roles to manage cyber risk and plan for ongoing education of your staff to prevent the most common threats to your business.

Organisational

Organisational

Assign roles to manage cyber risk and plan for ongoing education of your staff to prevent the most common threats to your business.

Build Policies & Education

Policies and procedures will contribute most to protecting your business and team.


We can help you to create or improve your cybersecurity program and train your team how to protect your business, avoid cyber risks, and recover from any incidents that may occur.

Assess your risk

Steve Duckworth
LinkedIn Profile

Steve Duckworth

30+ years of experience in the construction and restoration industry, Steve has built a reputation for integrity, quality craftsmanship, and rapid response in times of crisis.

Benjii Creevey
LinkedIn Profile

Benjii Creevey

Decades of experience across telecoms, IT and GRC - Benjii brings extensive experience in risk management, cybersecurity and complaince across multiple industries.

Thomas Schultz
LinkedIn Profile

Thomas Schultz

30 year career as an accountant, lawyer and former FBI agent focussing on risk management, cybersecurity and forensics.

Michael Brooks
LinkedIn Profile

Michael Brooks

40+ years in imaging technologies, Michael is retired FBI scientific support bringing extensive technical skills in forensic, training and business sectors.

Benjamin Shapira
LinkedIn Profile

Benjamin Shapira

30 years in the digital advertising, marketing and product development space, Ben is a tech founder, brand expert, UX/UI specialist and an Adjunct Professor at Swiburne Univertity of Technology.

Jason Durrant
LinkedIn Profile

Jason Durrant

20 years of experience in the IT industry focussing on providing insights across various levels of business solutions. With a background in software development and business analysis Jason understands the challenges as well as clearly identify proposed solutions.