We’re always happy to talk through your security needs, answer questions, or help you find the right service.
Whether you’re looking for advice, support, or a full security review — we’re here to help.
Conveniently located in the heart of the Worcestershire countryside, with trasport links to the South West for Bristol and Gloucestershire, and to the North for Birmingham and the West Midlands.
Unit 16, Peachley Farm Business Park
Lower Broadheath
Worcestershire
WR2 6QR
This is our postal address, and used as our central location. Generally, however, we do not work from here and would normally come to you, or operate remotely. We do have access to fully facilitated meeting rooms, close by, if what we need to discuss, requires a more interpersonal setting.
Our Meeting Rooms (By Appointment only):
Top Barn Business Centre
Top Barn, Holt Heath
Worcestershire
WR6 6NH
Email:
Office Phone: +44 (0) 1905 886 233
Monday - Friday 9 am - 5 pm
Saturday - Sunday Closed
Bank Holidays Closed
We don’t offer generic solutions — we build security that fits your business, your risks, and your goals. If you’re looking for a partner who takes your protection seriously, you’re in the right place.
Whether you’re looking for guidance, support, or a full security review, our team is ready to help. Reach out and let’s start building a safer, more resilient IT environment for your business..
We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
OpenAI has rolled out a new Pro subscription that costs $100 and is in line with Claude's pricing, which also has a $100 subscription, in ad…
Read more → 11 Apr 2026An international law enforcement action led by the U.K.'s National Crime Agency (NCA) has identified over 20,000 victims of cryptocurrency f…
Read more → 11 Apr 2026Analysis of 1 billion CISA KEV remediation records reveal a breaking point for human-scale security. Qualys shows most critical flaws are ex…
Read more → 10 Apr 2026The attack surface targeted by Iranian-linked hackers in cyberattacks against U.S. critical infrastructure networks includes thousands of In…
Read more → 10 Apr 2026Hackers gained access to an API for the CPUID project and changed the download links on the official website to serve malicious executables …
Read more → 10 Apr 2026Unknown threat actors compromised CPUID ("cpuid[.]com"), a website that hosts popular hardware monitoring tools like CPU-Z, HWMonitor, …
Read more → 12 Apr 2026Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the&n…
Read more → 12 Apr 2026Hungarian domestic intelligence, the national police in El Salvador, and several U.S. law enforcement and police departments have been …
Read more → 11 Apr 2026Cybersecurity researchers have flagged yet another evolution of the ongoing GlassWorm campaign, which employs a new Zig dropper that's …
Read more → 10 Apr 2026While much of the discussion on AI security centers around protecting ‘shadow’ AI and GenAI consumption, there's a wide-open …
Read more → 10 Apr 2026New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.…
Read more → 07 Apr 2026Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and auth…
Read more → 07 Apr 2026The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.…
Read more → 31 Mar 2026The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Polic…
Read more → 30 Mar 2026UK organisations encouraged to take immediate action to mitigate two recently disclosed vulnerabilities affecting Citrix NetScaler ADC and C…
Read more → 25 Mar 2026I spotted an interesting piece of JavaScript code that was delivered via a phishing email in a RAR archive. The file was called  
Read more → 10 Apr 2026In a previous diary [1], we looked to see how numbers were used within passwords submitted to honeypots. One of the items of inte…
Read more → 09 Apr 2026This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#&…
Read more → 08 Apr 2026One question that often comes up when I talk about honeypots: Are attackers able to figure out if they are connected to a honeypot? Th…
Read more → 08 Apr 2026Phone: +44(0)1905 886233
E-mail: