Welcome

Founded in Bournemouth and Poole, we have extensive knowledge and experience in providing expert computer security services across the UK.

We know that to describe ourselves as being "passionate" about the product we provide is generally considered cliché, but we really do care deeply about ensuring that the keys to your information remain securely in your hands.

Half of all small businesses are the victims of cyber attacks each year, and with the costs of data breaches as high as they are, can you afford to leave the security of your data up to chance?

Featured Services:

Education

Technology alone cannot protect your data confidentiality completely. Our services include instruction on how to use the software safely, as well as an ongoing relationship with information on software updates.

home-2.3.2.jpg

Encrypted Communications

Don't make life easy for snoopers. Use end to end encryption to protect the confidentiality of your messages.

signal square(1)

Secure Operating Systems

Stop malicious actors in their tracks! We can install and harden operating systems including Linux that are proven to be more secure than Windows.

linux-windows-vs-hosting

Case Study

Robert worked in a profession where public reputation is important, and any leak of embarrassing information would have negatively impacted his career. Because of his professional requirement for privacy, he had already been taking steps to safeguard his privacy online like opting out of data sharing and choosing stricter privacy settings on websites, although those efforts were somewhat uncoordinated.

Robert shared his concerns with a trusted colleague and they recommended our services having worked with us in the past. Following some research, Robert got in touch with us to arrange a meeting where we discussed his concerns, talked about his current system and got a sense of his level of computer competency, which was fairly high. Robert felt quite comfortable with learning new technologies if required.

Considering the potentially very high cost of a breach of his information confidentiality, we decided together to implement several changes to the way Robert used communications technology and how he stored data. We reinstalled Robert’s Windows Operating System and put all his work based files back on it, and that OS is now solely used for business work so it never gets mixed with his personal life.

On a separate storage drive in the PC (Robert had a tower type PC which could hold multiple drives) we installed Linux Mint with LUKS disk encryption so that the contents would be inaccessible to anybody who might steal the machine. Using our guidance Robert created an extremely strong passphrase for the disk encryption which he understood he should never reuse for other services.

We chose Linux Mint based on a report by GCHQ comparing the security of various operating systems at the time which listed Ubuntu Linux as the most secure, as well as a lot of online research getting a feel for the opinions of other security experts. Mint is itself derived from Ubuntu so enjoys the same level of security, with the main differences being improvements in the graphical user interface that would make it easier for Robert to transition to Linux.

Other steps we took included:

  • We created an encrypted volume on an external drive for backups using Veracrypt and taught Robert how to use it. Robert chose a volume passphrase of similar strength to his full disk encryption passphrase.
  • Installed open source software for Robert to complete all of his tasks on and made sure that the software wouldn't send information about how it was used over the internet using a whitelist firewall.
  • We installed encrypted communications software. At the time the best software available on the market was the Pidgin messenger. We conducted a review of the code ourselves to ensure that there were no obvious backdoors before installing it.

When Robert wants to do business work he can now log into the Windows part of the PC as per normal, but he can alternately select the Linux drive when booting up the computer for personal tasks which are now completely separated from his real identity.

Posted with permission. The client name has been changed to preserve their privacy.

Next Steps...

Contact us to arrange a consultation or visit Services for more information.