top of page

Cyber Security & Resilience Services

Our integrated range of cyber security services are designed to help businesses assess, build and manage online networks. They also assist businesses and their staff to have the right strategies to respond to incidents efficiently and to mitigate any potential damage a cyber-attack may create.


Through Cyber PATH, local university students are trained and mentored by senior ethical hackers, to deliver all our services and to work with staff to build their cyber awareness, understand the latest cyber threats and secure the business's online environment. 

Security Awareness Training

Employees are a company's greatest asset. With security awareness training, they can also become highly effective barriers to cyber crime.


Our security awareness training helps staff understand their working environment, giving them the confidence to speak up when something doesn’t look right.

The training is focused on those with little or no cyber security or technical knowledge and is delivered in small, succinct modules using real world examples. 


Awareness training is tailored to each individual audience to provide the right level of skills and context for your business. The trainers are highly knowledgeable, personable and friendly and pride themselves on providing the right environment for your people to feel comfortable and to ask questions.

To request a quote, contact us below. 

First Step Web Assessment

There are many types of website attacks and whilst it might seem impossible to defend yourself from them, we provide a simple and really affordable service that will help you to determine the vulnerabilities and possible entry points for cybercriminals.

What is a First Step Web Assessment?

The ‘First Step Web Assessment’ has been designed by our private-sector experienced security team to provide you with an initial assessment of your website at a really affordable price.


This service offers high-level insight into the risks associated with continuing to present their website online. Our Cyber Security students, shadowed by an expert use a collection of tried and trusted assessment tools and techniques to assess the website against current industry recognised best practice. The team will assess the website against known vulnerabilities, issues with configuration, risks relating to the software and risks relating to your website’s functionality.

The FSWA is considered an initial light touch assessment of the website compared to the complete Web App Testing service that we also offer. This service focuses on the reconnaissance stage for the site.

Reconnaissance is the first stage a cyber criminal would undertake to identify a vulnerable site. Both passive and active reconnaissance techniques will be used to assess the site. However, the majority of the assessment will be passive. Passive reconnaissance is where we attempt to gain information about your site without actively engaging with it. Through the reconnaissance stage, outdated components and sensitive data exposure can be identified highlighting additional risks. 

The service also undertakes automated scans to identify vulnerabilities at a high overview level. Automated scans can be considered active reconnaissance as we will conduct scans against the site to gain further information.

At the end of the allotted assessment time, a short non-technical report (2-3 pages) is created for you to show the risk to the site tested and the mitigations needed against the criteria of the FSWA. The report will allow you to consider the risk and encourage further discussion with the site's developer/IT/host provider to bolster your security further.​

What FSWA assesses:

Domain and DNS records

SSL Certificates

Email protections

Security Headers

Outdated components

Directory discovery 

Vulnerabilities shown through automated scan ​

The FSWA is not:

An overhaul of the site to assess the full functionality and settings within the site

A detailed assessment of the site compared to the Web App Testing Service, which follows the OWASP methodology.

First Step Web Assessment
bottom of page