Helping organisations focus cyber security efforts and resource on quantified, factual information rather than the wider ‘threat-mania’ industry view.

About Secrutiny

Organisations have become caught in a cycle of annual technology additions and a ‘strength in depth’ belief fed by messages of the volumes of threats that need defensive action propagated by vendors and the media.

Secrutiny has a very different approach…

We offer businesses a way to determine their cyber security risk and exposure, empowering organisations to inform and evidence security improvement priorities, leveraging current investments to secure themselves and augmenting with product only where appropriate.

Our Services

Cyber Risk Audit

Provides valuable insight into your current posture and hygiene to identify risk.

By getting control of hygiene, posture and risk, organisations can embed security within IT operations, rather than as an overlay, significantly reducing the attack surface.

Patrol Managed Services

Provides protection, detection & control capabilities for both operational and technical cyber risks.

Incident Response

When anomalous activity or Indicators of Compromise (IOC’s) are identified, Secrutiny can provide remote and on-site investigation within hours of engagement to significantly reduce the impact of an incident on your organisation.

Case Study


Discover how a top 100 UK law firm moved to a risk reduction security model after realising the importance of IT hygiene, policy enforcement and user education when they fell victim to a targeted attack.
Secrutiny were able to quickly establish the root cause of the attack, raising a level of confidence within our team that undoubtedly helped us achieve a successful outcome.

Head of IT


Careers at Secrutiny

Consultant Engineer

Full Time

Telemarketing Executive

Sales & Marketing
Flexible Hours

Graduate & Post Graduate Roles

Service Desk
Full Time & Placement
Full Time

Secrutiny Blog

Technical Demonstration: Defend against stealthy web server data exfiltration

Once an attacker is inside your network and has access to your data they face one major challenge, data exfiltration. Malicious actors are more and more frequently turning to built-in resources to achieve data exfiltration…

Did you see us at Infosec?

Last week, Secrutiny attended InfoSec in the DCMS Cyber Innovation Zone after being selected as one of the UK’s Most Innovative Small Cyber Security Company…

Coca-Cola breach impacts 8,000 workers

The Coca-Cola company suffers a data breach after a former employee was found to be in possession of an external hard drive containing employee personal data…

Cisco discover more critical vulnerabilities

Cisco has released 16 security advisories, including three vulnerabilities which are classified as Critical and are rated 10/10 on the CVSS (Common Vulnerability Scoring System) scale…

Roaming Mantis now targets iOS devices and PC users

Widespread routers’ DNS hijacking malware which targeted Android devices has now upgraded its capabilities to target iOS devices and desktop users, which now infects people across Europe and the Middle East…

WinstarNssmMiner is spreading like there’s no tomorrow

A new cryptominer dubbed WinstarNssmMiner is spreading quickly with more than 500,000 attacks in only three days. The group behind the operation has already acquired 133 Monero which is equivalent to $28,000…

Keep Up To Date

Join our mailing list to receive the latest news and updates from Secrutiny.


Keeping you up-to-date

*We’d love to keep you up to date with security alerts, free tools & techniques, event invites and company updates. We’ll always treat your details with the utmost care and will never sell them to other companies for marketing purposes. Remember you can change your preferences and opt-out at any time.