Authorised testing
Penetration Testing and Security Testing
Structured, authorised testing of websites, web applications, local environments, and exposed services to identify weaknesses before they become real business risk.
- Helps: business owners, project teams, and system owners with clear permission to test.
- Outcome: prioritised findings, plain-English risk context, and practical remediation guidance.
- Scope: testing only proceeds with written authorisation and agreed boundaries.
Pricing: Contact me for pricingAuthorised scope required
Monitoring support
Managed Detection and Response Support
Practical support for monitoring suspicious activity, reviewing alerts, and improving response workflows without adding unnecessary noise.
- Helps: teams with alerts, suspicious logins, endpoint signals, or unclear response priorities.
- Outcome: better triage, clearer escalation, and more confident defensive decisions.
- Scope: defensive review, containment planning, and practical workflow improvement.
Pricing: Contact me for pricingDefensive monitoring focus
Exposure reduction
Managed Vulnerability Scanning
Regular vulnerability review to identify outdated software, missing patches, exposed services, and known weaknesses that need prioritised action.
- Helps: small businesses and teams that need a clearer view of patch and exposure risk.
- Outcome: risk-based prioritisation, remediation tracking, and less guesswork.
- Scope: authorised scanning and review of agreed systems only.
Pricing: Contact me for pricingRisk-based review
Uptime-sensitive environments
OT Network Threat Monitoring
Security monitoring guidance for operational technology and critical environments where uptime, safety, segmentation, and change control must be respected.
- Helps: operators and managers responsible for sensitive, availability-focused networks.
- Outcome: clearer visibility goals, safer monitoring patterns, and practical risk reduction.
- Scope: defensive monitoring concepts, segmentation review, and planning support.
Pricing: Contact me for pricingUptime-sensitive environments
Traffic visibility
Network Traffic Analysis
Analysis of network behaviour to identify suspicious patterns, unusual connections, brute-force attempts, and signs of possible compromise.
- Helps: teams dealing with suspicious traffic, VPN anomalies, or unclear network signals.
- Outcome: stronger context for investigation, containment, and reporting.
- Scope: defensive review of provided logs, telemetry, and agreed traffic data.
Pricing: Contact me for pricingVisibility-led approach
Exposure monitoring
Dark Web Intelligence
Defensive review of exposed credentials, brand impersonation risk, leaked information, and cybercrime mentions relevant to an organisation or individual.
- Helps: organisations concerned about leaked data, credential exposure, or impersonation.
- Outcome: triaged findings, validation steps, and recommended defensive response actions.
- Scope: ethical exposure awareness and defensive remediation only.
Pricing: Contact me for pricingDefensive exposure monitoring
Threat context
Threat Hunting and Threat Intelligence Services
Proactive review of indicators, suspicious behaviours, and emerging threats that may matter to the organisation's environment, suppliers, users, or exposure profile.
- Helps: defenders and leaders who need signal, not headline noise.
- Outcome: prioritised intelligence, hunting ideas, and executive-safe summaries.
- Scope: defensive interpretation of available indicators and telemetry.
Pricing: Contact me for pricingPrioritised threat context
People and culture
Security Awareness Training
Practical awareness sessions that help people recognise phishing, social engineering, AI voice scams, QR phishing, password risks, and fake login pages.
- Helps: staff, executives, families, and community groups who need clear examples.
- Outcome: safer verification habits and better reporting of suspicious activity.
- Scope: approachable, defensive training without fear-based messaging.
Pricing: Contact me for pricingPlain-English delivery
Leadership support
Board and Executive Cyber Briefings
Plain-English cyber risk briefings for boards and executives who need confidence, context, and practical decision support without technical theatre.
- Helps: leaders making decisions about risk, investment, readiness, and assurance.
- Outcome: clearer priorities, better questions, and board-ready language.
- Scope: incident readiness, Essential Eight, AI risk, and business impact briefings.
Pricing: Contact me for pricingExecutive-safe communication
Maturity planning
Cyber Maturity Assessment
Review current controls against practical frameworks such as the ACSC Essential Eight and broader cyber hygiene principles.
- Helps: organisations that need a practical baseline and a realistic improvement path.
- Outcome: gap analysis, prioritised actions, and a roadmap that respects constraints.
- Scope: maturity discussion, evidence review, and defensive roadmap planning.
Pricing: Contact me for pricingRoadmap and prioritisation
AI risk
AI Cyber Risk Readiness
Helping organisations prepare for AI-driven cyber risks, including phishing, impersonation, deepfakes, unsafe tool use, automated reconnaissance, and social engineering.
- Helps: teams adopting AI tools or facing more convincing AI-assisted scams.
- Outcome: clearer policy, safer workflows, and better verification routines.
- Scope: governance, awareness, data handling, and defensive monitoring guidance.
Pricing: Contact me for pricingGovernance and awareness
Practical response
Incident Support and Account Investigation
Support for people or organisations that suspect they have been phished, compromised, or exposed and need calm, practical next steps.
- Helps: people dealing with suspicious logins, email compromise, or account takeover concerns.
- Outcome: recovery priorities, evidence preservation guidance, and safer follow-up actions.
- Scope: defensive support only; do not send secrets or sensitive evidence in first contact.
Pricing: Contact me for pricingRapid practical support