Service details

Below is an overview of our core services. Every engagement is tailored to your environment and risk profile, with clear fixed pricing and agreed scope up front.

Microsoft 365 Hardening

We secure your Microsoft 365 tenant using best practices aligned to guidance from Microsoft and common cyber insurance / compliance requirements.

  • MFA and conditional access policies
  • Disabling legacy authentication
  • Admin role and privileged access review
  • Mail flow, anti-phishing and anti-malware configuration
  • External sharing controls for SharePoint, OneDrive and Teams
  • Device compliance checks and baseline policies

Cyber Essentials Pre‑Assessment

A structured review of your environment against the Cyber Essentials controls so you know exactly what needs to be addressed before certification.

  • Asset and device inventory review
  • Patch management and anti‑virus status checks
  • Firewall and network boundary review
  • Admin privileges and access control
  • Microsoft 365 security configuration review
  • Prioritised remediation plan

Network & Wi‑Fi Audit

We look at your wired and wireless network design, configuration and performance to identify bottlenecks, misconfigurations and coverage problems.

  • Wi‑Fi coverage, channel and power analysis
  • Access point placement and configuration review
  • Switch, VLAN and routing design
  • DNS, DHCP and gateway checks
  • Firewall rule and NAT review
  • Clear remediation recommendations and optional implementation project

Azure Landing Zone & Cloud Architecture

We help you create secure, well‑structured Azure environments ready for production workloads.

  • Subscription, management group and resource group structure
  • Networking, VNets, subnets and segmentation
  • Identity and access management design
  • Security baselines and policy
  • Monitoring, logging and alerting setup

Monthly IT & Security Support

For organisations that want ongoing oversight, we provide a lightweight virtual IT and security function.

  • Regular security and configuration checks
  • Patch and vulnerability oversight
  • Review of key alerts and incidents
  • Quarterly roadmap and risk discussion

For bespoke projects or larger pieces of work, please get in touch to discuss your requirements.