Helping organisations focus cyber security efforts and resource on quantified, factual information rather than the wider ‘threat-mania’ industry view.

About Secrutiny

Organisations have become caught in a cycle of annual technology additions and a ‘strength in depth’ belief fed by messages of the volumes of threats that need defensive action propagated by vendors and the media.

Secrutiny has a very different approach…

We offer businesses a way to determine their cyber security risk and exposure, empowering organisations to inform and evidence security improvement priorities, leveraging current investments to secure themselves and augmenting with product only where appropriate.

Our Services

Cyber Risk Audit

Provides valuable insight into your current posture and hygiene to identify risk.

By getting control of hygiene, posture and risk, organisations can embed security within IT operations, rather than as an overlay, significantly reducing the attack surface.

Patrol Managed Services

Provides protection, detection & control capabilities for both operational and technical cyber risks.

Incident Response

When anomalous activity or Indicators of Compromise (IOC’s) are identified, Secrutiny can provide remote and on-site investigation within hours of engagement to significantly reduce the impact of an incident on your organisation.

Case Study

CYBER SECURITY IN LEGAL

Discover how a top 100 UK law firm moved to a risk reduction security model after realising the importance of IT hygiene, policy enforcement and user education when they fell victim to a targeted attack.

{

Secrutiny were able to quickly establish the root cause of the attack, raising a level of confidence within our team that undoubtedly helped us achieve a successful outcome.

Head of IT

{

Careers at Secrutiny

Consultant Engineer

Engineering

Permanent

}

Full Time

Basingstoke

Telemarketing Executive

Sales & Marketing

Permanent

}

Flexible Hours

Basingstoke

Graduate & Post Graduate Roles

Service Desk

Full Time & Placement

}

Full Time

Basingstoke

Secrutiny Blog

The Cyber Threats to the Legal Sector

Organisations in the legal sector handle significant amounts of confidential data and sensitive information. Ensuring this data is well protected is extremely important, a cyber attack can have a devastating effect both financially and reputationally. 

Intel Issue Three Fixes For Bug Vulnerabilities

Intel patches up three vulnerabilities, linked to their smart sound technology device. The vulnerabilities could have allowed a local attacker to execute code on Intel Core and Atom processor-based PCs.

Patching operating systems to prevent exploitation

‘Patching’ is considered something you do when there is a hole in your trousers or top, this is exactly the same within the technology world but instead, patching involves the operating systems or the computer program…

Lights Camera Chrome

WARNING latest discovery states that Chrome and now Firefox are recording your every click…

There’s a lot of big phish in a small pond

Phishing has been seen to be one of the most common attack vectors used by cybercriminals due to its simple but effective techniques…

New destructive RedEye ransomware

A new ransomware created by the same developer as Annabelle has been discovered, dubbed ‘RedEye’…

Keep Up To Date

Join our mailing list to receive the latest news and updates from Secrutiny.

GET IN TOUCH…

Keeping you up-to-date

*We’d love to keep you up to date with security alerts, free tools & techniques, event invites and company updates. We’ll always treat your details with the utmost care and will never sell them to other companies for marketing purposes. Remember you can change your preferences and opt-out at any time.