Everything you need to know about cyber security services, pricing, and protecting your business.
6 Categories 26 Questions Answered
Getting Started
I can typically begin within 24-48 hours of our initial consultation. For emergencies, I offer same-day response. After a brief discovery call to understand your needs, I'll provide a clear proposal and can start immediately upon approval.
Simply reach out via the contact form or give me a call. We'll schedule a free 15-minute discovery call where I'll learn about your business, current security posture, and concerns. From there, I'll provide a tailored proposal with clear pricing and timeline.
Not necessarily, but it helps if you can share: a brief overview of your tech stack, any specific concerns or recent incidents, and your budget range. Don't worry if you're not technical—I'll guide you through what I need to know.
Absolutely. I regularly collaborate with in-house IT teams and managed service providers. I can provide guidance and recommendations for your team to implement, or work alongside them on more complex projects. Clear communication and defined responsibilities ensure smooth collaboration.
Services & Process
I specialize in API security assessments, server hardening, penetration testing, security audits, and incident response. My core focus is protecting web applications, APIs, and server infrastructure. I also offer ongoing monitoring and security retainer packages for continuous protection.
A typical assessment includes: vulnerability scanning and manual testing, configuration review, risk analysis and prioritization, a detailed written report with findings, actionable remediation recommendations, and a follow-up call to discuss results. The exact scope depends on what you need assessed.
Duration depends on scope. A focused API assessment typically takes 3-5 days. A comprehensive penetration test of multiple systems might take 1-2 weeks. I'll provide a clear timeline in your proposal. You'll receive regular updates throughout the engagement.
I take extreme care to minimize disruption. Most testing can be done safely on production systems during normal business hours. For more aggressive testing, we can schedule off-peak windows. I'll always discuss the approach beforehand and agree on acceptable risk levels.
Yes. My Ongoing Protection package includes monthly security reviews, real-time monitoring setup, priority support, and regular vulnerability scanning. This proactive approach catches issues before they become breaches and ensures your security posture improves over time.
Pricing & Packages
Security assessments start from £500 for a basic API or server review. Most small-to-medium businesses invest between £750-£2,000 depending on scope and complexity. I always provide a fixed quote upfront—no surprise charges. Every engagement includes a detailed report and actionable recommendations.
For larger engagements, I can offer milestone-based payments. Typically 50% upfront and 50% upon completion. For ongoing retainer packages, monthly billing is available. I'm flexible and happy to discuss arrangements that work for your cash flow.
Never. I provide fixed-price quotes for defined scopes of work. If additional work is needed beyond the original scope, I'll discuss it with you first and provide a separate quote. You'll never receive an unexpected invoice.
Consider that the average data breach costs UK businesses £3.86 million. Even a 'minor' incident can cost £10,000+ in downtime, recovery, and reputation damage. A security assessment costing £1,000-2,000 that prevents even one incident delivers massive ROI. Plus, many clients find security improvements lead to operational efficiencies.
Yes, I offer reduced rates for early-stage startups and registered non-profits. I believe every organization deserves good security regardless of budget. Reach out and let's discuss what's achievable within your constraints.
Technical Questions
APIs (Application Programming Interfaces) are how your software systems communicate. They often handle sensitive data like user credentials, payment information, and business logic. Poorly secured APIs are the #1 attack vector in modern applications. I help identify vulnerabilities like broken authentication, injection flaws, and data exposure before attackers do.
Server hardening means configuring your servers to minimize attack surface. This includes: removing unnecessary services, configuring firewalls and access controls, implementing proper authentication, setting up logging and monitoring, applying security patches, and following security benchmarks like CIS. The goal is making your servers as difficult to compromise as possible.
A vulnerability scan is automated—software checks for known vulnerabilities. It's fast and cost-effective but has limitations. A penetration test involves manual, creative testing by a security professional who thinks like an attacker. Pen tests find complex, chained vulnerabilities that scanners miss. Most organizations benefit from both.
Yes. Cloud security is a core specialty. I assess cloud configurations, IAM policies, storage permissions, network security groups, and more. Common issues include overly permissive S3 buckets, misconfigured security groups, and excessive IAM privileges. Cloud misconfigurations are responsible for many high-profile breaches.
Emergency & Incidents
Call me immediately. I offer emergency incident response with under 1-hour response time. I'll help contain the breach, assess the damage, preserve evidence, and guide you through recovery. Don't wait—the faster we act, the less damage occurs.
First, don't panic. Document what you've observed. Avoid turning off systems (this can destroy evidence). Limit the spread by isolating affected systems if possible. Don't communicate about the incident over potentially compromised channels. Then call me immediately for professional guidance.
Yes. I provide emergency ransomware response including containment, impact assessment, recovery planning, and guidance on communication. I generally advise against paying ransoms, but will help you evaluate all options. Prevention is better—let's talk about backup strategies and security hardening before an incident occurs.
Working Together
I specialize in working with small and medium-sized businesses. Unlike large consultancies, I provide personalized, direct service without the enterprise price tag. Whether you're a solo founder or a growing team, I tailor my approach to your budget and specific needs.
I'm based in Swadlincote, Derbyshire, and regularly serve clients across the East Midlands including Derby, Burton-on-Trent, Nottingham, Leicester, and Birmingham. Most security work is done remotely, but I'm available for on-site visits when needed.
Yes. The majority of security work can be done remotely. I've worked with clients across Europe and beyond. Time zone differences are manageable with good communication. For remote engagements, we'll use secure communication channels and scheduled video calls.
Extremely seriously. All engagements are covered by NDA. I never share client information, findings, or even client names without explicit permission. My professional reputation depends on absolute discretion. Your sensitive information stays between us.
You'll receive a comprehensive report with all findings and recommendations. I offer a follow-up call to discuss the results and answer questions. Many clients choose ongoing retainer packages for continuous protection. Even without a retainer, I'm available for questions and will proactively reach out if I become aware of relevant threats.
Still Have Questions?
Can't find what you're looking for? I'm happy to answer any questions about your specific situation.