We’re always happy to talk through your security needs, answer questions, or help you find the right service.
Whether you’re looking for advice, support, or a full security review — we’re here to help.
Conveniently located in the heart of the Worcestershire countryside, with trasport links to the South West for Bristol and Gloucestershire, and to the North for Birmingham and the West Midlands.
Unit 16, Peachley Farm Business Park
Lower Broadheath
Worcestershire
WR2 6QR
This is our postal address, and used as our central location. Generally, however, we do not work from here and would normally come to you, or operate remotely. We do have access to fully facilitated meeting rooms, close by, if what we need to discuss, requires a more interpersonal setting.
Our Meeting Rooms (By Appointment only):
Top Barn Business Centre
Top Barn, Holt Heath
Worcestershire
WR6 6NH
Email:
Office Phone: +44 (0) 1905 886 233
Monday - Friday 9 am - 5 pm
Saturday - Sunday Closed
Bank Holidays Closed
We don’t offer generic solutions — we build security that fits your business, your risks, and your goals. If you’re looking for a partner who takes your protection seriously, you’re in the right place.
Whether you’re looking for guidance, support, or a full security review, our team is ready to help. Reach out and let’s start building a safer, more resilient IT environment for your business..
We specialise in IT Security Solutions from Design to Back-end Storage and Hosting, and focusing on the audit, compliance, training, testing and protection of IT Infrastructure and Data Security to help protect your business and prevent you from getting hacked or your data breached.
Subscribe to our Security Newsletter here - we promise no SPAM just updates on how the world around is turning.
SubscribeOver 1,300 Microsoft SharePoint servers exposed online remain unpatched against a spoofing vulnerability that was exploited as a zero-day an…
Read more → 22 Apr 2026A Linux variant of the GoGra backdoor uses legitimate Microsoft infrastructure, relying on an Outlook inbox for stealthy payload delivery. […
Read more → 22 Apr 2026France Titres, the government agency in France for issuing and managince administrative documents has disclosed a data breach after a threat…
Read more → 21 Apr 2026Microsoft has released out-of-band (OOB) security updates to patch a critical ASP.NET Core privilege escalation vulnerability. [...]…
Read more → 22 Apr 2026A previously undocumented data-wiping malware dubbed Lotus was used last year in targeted attacks against energy and utilities organizations…
Read more → 21 Apr 2026Microsoft has released out-of-band updates to address a security vulnerability in ASP.NET Core that could allow an attacker to escalate priv…
Read more → 22 Apr 2026Cybersecurity researchers have discovered a new variant of a known malware called LOTUSLITE that's distributed via a theme related to India'…
Read more → 22 Apr 2026A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code executio…
Read more → 22 Apr 2026Threat actors associated with The Gentlemen ransomware‑as‑a‑service (RaaS) operation have been observed attempting to deploy a known proxy m…
Read more → 21 Apr 2026Cybersecurity researchers have identified 22 new vulnerabilities in popular models of serial-to-IP converters from Lantronix and Silex that …
Read more → 21 Apr 2026As the technology landscape develops, the definition of cyber security is expanding with it.…
Read more → 21 Apr 2026New advisory warns cyber threat group APT28 have exploited vulnerable edge devices to support malicious operations.…
Read more → 07 Apr 2026Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and auth…
Read more → 07 Apr 2026The NCSC has issued actions for individuals at risk of targeted attacks against messaging apps.…
Read more → 31 Mar 2026The NCSC is encouraging UK organisations to mitigate an unauthenticated remote code execution vulnerability affecting F5 BIG-IP Access Polic…
Read more → 30 Mar 2026&#;x26;#;x5b;This is a Guest Diary by L. Carty, an ISC intern as part of the SANS.edu Bachelor&#;x26&#…
Read more → 22 Apr 2026There have been reports of threat actors using a .wav file as a vector for malware.
…
Read more → 21 Apr 2026Every morning, security people around the world face the same ritual: opening their vulnerability feed to find a lot of new CVE entries tha…
Read more → 20 Apr 2026Phone: +44(0)1905 886233