We’re always happy to talk through your security needs, answer questions, or help you find the right service.
Whether you’re looking for advice, support, or a full security review — we’re here to help.
Conveniently located in the heart of the Worcestershire countryside, with trasport links to the South West for Bristol and Gloucestershire, and to the North for Birmingham and the West Midlands.
Unit 16, Peachley Farm Business Park
Lower Broadheath
Worcestershire
WR2 6QR
This is our postal address, and used as our central location. Generally, however, we do not work from here and would normally come to you, or operate remotely. We do have access to fully facilitated meeting rooms, close by, if what we need to discuss, requires a more interpersonal setting.
Our Meeting Rooms (By Appointment only):
Top Barn Business Centre
Top Barn, Holt Heath
Worcestershire
WR6 6NH
Email:
Office Phone: +44 (0) 1905 886 233
Monday - Friday 9 am - 5 pm
Saturday - Sunday Closed
Bank Holidays Closed
We don’t offer generic solutions — we build security that fits your business, your risks, and your goals. If you’re looking for a partner who takes your protection seriously, you’re in the right place.
Whether you’re looking for guidance, support, or a full security review, our team is ready to help. Reach out and let’s start building a safer, more resilient IT environment for your business..
We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
Google has announced a new mechanism in Android called Advanced Flow that will allow sideloading APKs from unverified developers for power u…
Read more → 21 Mar 2026The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-ste…
Read more → 21 Mar 2026Microsoft Azure Monitor alerts are being abused to send callback phishing emails that impersonate warnings from the Microsoft Security Team …
Read more → 21 Mar 2026The FBI has issued a public service announcement warning that Russian intelligence-linked threat actors are actively targeting users of encr…
Read more → 20 Mar 2026An information stealer called VoidStealer uses a new approach to bypass Chrome's Application-Bound Encryption (ABE) and extract the master k…
Read more → 22 Mar 2026Threat actors affiliated with Russian Intelligence Services are conducting phishing campaigns to compromise commercial messaging application…
Read more → 21 Mar 2026Oracle has released security updates to address a critical security flaw impacting Identity Manager and Web Services Manager that could be e…
Read more → 21 Mar 2026The threat actors behind the supply chain attack targeting the popular Trivy scanner are suspected to be conducting follow-on attacks that h…
Read more → 21 Mar 2026The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel…
Read more → 21 Mar 2026Trivy, a popular open-source vulnerability scanner maintained by Aqua Security, was compromised a second time within the span of a month to …
Read more → 20 Mar 2026CYBERUK will be delivered by the NCSC and sponsors across four distinct tracks of activity: Resilience, Technology, Threat, and Ecosystem.…
Read more → 12 Mar 2026In response to the evolving events in the Middle East, the NCSC is advising that UK organisations review their cyber security posture.…
Read more → 02 Mar 2026Agencies strongly encourage immediate investigation of potential compromise of Cisco Catalyst SD-WAN.…
Read more → 25 Feb 2026The NCSC encourages local government and critical infrastructure operators to harden their ‘denial of service’ (DoS) defences…
Read more → 19 Jan 2026Russian‑aligned hacktivist groups continue to target UK organisations with disruptive cyber attacks…
Read more → 19 Jan 2026Yesterday, I discovered a malicious Bash script that installs a GSocket backdoor on the victim's computer. I don't know the source …
Read more → 20 Mar 2026This activity was found and reported by BACS student Adam Thorman as part of one of his assignments which I posted his final pap…
Read more → 19 Mar 2026A very popular target of attackers scanning our honeypots is "phpmyadmin". phpMyAdmin is a script first released in the late 90s, before ma…
Read more → 18 Mar 2026Phone: +44(0)1905 886233
E-mail: