Helping organisations focus cyber security efforts and resource on quantified, factual information rather than the wider ‘threat-mania’ industry view.

About Secrutiny

Organisations have become caught in a cycle of annual technology additions and a ‘strength in depth’ belief fed by messages of the volumes of threats that need defensive action propagated by vendors and the media.

Secrutiny has a very different approach…

We offer businesses a way to determine their cyber security risk and exposure, empowering organisations to inform and evidence security improvement priorities, leveraging current investments to secure themselves and augmenting with product only where appropriate.

Our Services

Cyber Risk Audit

Provides valuable insight into your current posture and hygiene to identify risk.

By getting control of hygiene, posture and risk, organisations can embed security within IT operations, rather than as an overlay, significantly reducing the attack surface.

Patrol Managed Services

Provides protection, detection & control capabilities for both operational and technical cyber risks.

Incident Response

When anomalous activity or Indicators of Compromise (IOC’s) are identified, Secrutiny can provide remote and on-site investigation within hours of engagement to significantly reduce the impact of an incident on your organisation.

Case Study


Discover how a top 100 UK law firm moved to a risk reduction security model after realising the importance of IT hygiene, policy enforcement and user education when they fell victim to a targeted attack.
Secrutiny were able to quickly establish the root cause of the attack, raising a level of confidence within our team that undoubtedly helped us achieve a successful outcome.

Head of IT


Careers at Secrutiny

Consultant Engineer
Full Time
Telemarketing Executive
Sales & Marketing
Flexible Hours
Graduate & Post Graduate Roles
Service Desk
Full Time & Placement
Full Time

Secrutiny Blog

Rig Exploit Kit Is Back and up to No Good Again

19 SEPTEMBER 2018 RIG Exploit kit is back and up to no good again RIG Exploit kit (currently the most used exploit kit) is now back, in its fourth upgraded version, and it’s up to no good again. Over the last few weeks, security analysts have been observing a rootkit...

Why Is An Audit Approach The Only Practical Approach To Cyber Security?

18 SEPTEMBER 2018 WHY IS AN AUDIT APPROACH THE ONLY PRACTICAL APPROACH TO CYBER SECURITY? For an industry barely 20 years old, cyber security has become more confusing and complicated each year thanks to competing vendors, resellers and ‘expert opinions’. The...

Microsoft September 2018 Patch Tuesday

12 SEPTEMBER 2018 MICROSOFT SEPTEMBER 2018 PATCH TUESDAY 61 updates were released in yesterday's September 2018 Patch Tuesday to address vulnerabilities in Mircosoft Windows and related programs. Including 17 critical bugs, several flaws already public knowledge and a...

Dark Tequila Malware Designed to Steal your Financial Details

Dark Tequila steals victims’ financial information from a long list of online banking sites, as well as login credentials to popular websites ranging from code versioning repositories to public file storage accounts and domain registrars.

A New Era of SSRF: Exploiting RFI and XSS to Bypass Website Security

Within this blog we will be exploring the use of SSRF by exploiting RFI and XSS methods to bypass website security and port scan webservers and services from a hosted site instead of our local machine.

4 day Cyber 101 Training Course

Secrutiny’s Cyber 101 Training develops the knowledge, skills and techniques of IT Security professionals. This 4-day course covers tools and methods required for effective design, implementation and operation of a responsive security programme in an organisational context.