About  Us

 

Long story short

Our clients become secure, compliant and profitable

……

How do they hack systems?”  “How do they get in?”  “Surely it can’t be that easy?

It is VERY easy to hack a computer system and steal data – after attended a very intensive and practical training course that covered the theory of the art of “hacking” – I became a qualified Ethical Hacker (an oxymoron if ever there was one) – if I practise what I was taught, I might even become a good hacker!

There are many VERY good hackers in the world, some are luckier than others; but, like everything in life, with hard work and perseverance, the hackers will often succeed – practice makes perfect.

You, as a business owner, must understand how they operate and how you can prevent them from gaining access to your data. This is where we come into the equation

……

In 1999 I was hired as a “UNIX contractor” by a UK Government department – travelling the world as a “highly cleared techie” – I had periods of work for several different security groups and departments – even met James Bond (or so I thought); then, sadly , as all good things do, the contracts ended around 2011/2012

The one common thread throughout those twelve years was “secrecy” and “security” – data security and secrecy – it became part of my working ethics – 4ITSec Ltd was formed in 2012 to ensure that the knowledge of “secure working” was passed onto businesses in East Anglia as I was astonished at the careless way businesses treated data

Re-training to Certified Information System Security Professional (CISSP) and as a Certified Ethical Hacker ensured that the knowledge and expertise was definable and proven.

The addition of “Cyber Essentials Plus” ensures that the data systems we use have been ratified as secure by a third party

We offer discrete and direct cyber security advice to businesses in East Anglia; we can scan IT systems for issues and vulnerabilities (always an eye-opener), we can scan for regulatory compliance, we can organise PEN testing, help you with Cyber Essentials and to be compliant with Data Protection Laws

We can scan for all the “Personally Identifiable Information (PII)” – held within your existing data systems – the first major step in becoming, and continuing to be, compliant with GDPR (General Data Protection Regulation) – May 25th 2018 into UK Law

We work alongside several IT suppliers (both large and small) in the region, we have links into Europe and good working relationships with other specialised IT Security groups, individuals and compliance organisations

Secure, compliant and profitable