Helping organisations focus cyber security efforts and resource on quantified, factual information rather than the wider ‘threat-mania’ industry view.

About Secrutiny

Organisations have become caught in a cycle of annual technology additions and a ‘strength in depth’ belief fed by messages of the volumes of threats that need defensive action propagated by vendors and the media.

Secrutiny has a very different approach…

We offer businesses a way to determine their cyber security risk and exposure, empowering organisations to inform and evidence security improvement priorities, leveraging current investments to secure themselves and augmenting with product only where appropriate.

Our Services

Cyber Risk Audit

Provides valuable insight into your current posture and hygiene to identify risk.

By getting control of hygiene, posture and risk, organisations can embed security within IT operations, rather than as an overlay, significantly reducing the attack surface.

Patrol Managed Services

Provides protection, detection & control capabilities for both operational and technical cyber risks.

Incident Response

When anomalous activity or Indicators of Compromise (IOC’s) are identified, Secrutiny can provide remote and on-site investigation within hours of engagement to significantly reduce the impact of an incident on your organisation.

Case Study

CYBER SECURITY IN LEGAL

Discover how a top 100 UK law firm moved to a risk reduction security model after realising the importance of IT hygiene, policy enforcement and user education when they fell victim to a targeted attack.
{
Secrutiny were able to quickly establish the root cause of the attack, raising a level of confidence within our team that undoubtedly helped us achieve a successful outcome.

Head of IT

{

Careers at Secrutiny

Consultant Engineer

Department

Engineering

Contract

Permanent

Experience

Qualified with 1+ years experience

}

Hours

Full Time

Location

Head Office & Customer Sites

Pay

TBA

Intern and Graduate Roles

Department

Service Desk

Contract

Full Time and Placement

Experience

Qualified and Students

}

Hours

Full Time

Location

Head Office

Pay

TBA

Secrutiny Blog

Infographic: Insider Threats Remain a Major Risk to Organisations

Intentional or not, insider threats are on the rise. Don’t take the chance; gain a better understanding in our cyber security infographic.

Locking the Door Is No Longer Enough: Required Capabilities for Identity and Access Threat Prevention

In this blog, we will define the key requirements and capabilities of IATP solutions and the drivers they should support within an organisation.

RDP Exploits on the Rise: Tips for Mitigating Your Exposure

Malicious actors continue to exploit Remote Desktop Protocol (RDP) to gain access to the target computers. Mitigate your exposure now.

All You Need to Know About Microsoft’s Decision to Drop Password Expiration

Microsoft has officially dropped its 60-day password expiration policy from its security baseline, following May’s Window’s 10 updates.

Microsoft Patches Critical WannaCry-like Vulnerability, Including Legacy XP and Windows Server 2003

Microsoft has released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services.

Infographic: Validate Your Cyber Security in 3 Easy Steps

Gain a better understanding of the effectiveness of your cyber security controls in our cyber security validation infographic.