Cyber Security Audit

On site audit of current IT infrastructure and security.



  • Firewall configuration

  • Full Vulnerability scan (over 60,000 known hacks tested for) including remedial action

  • Workstation software firewall config checked

  • Antivirus setup, reliability and tested

  • Assessment of server reliability

  • Disaster recovery procedures

  • Disaster recovery testing

  • Backup procedures

We use the same tools used by hackers to check and test your network. We of course issue a full report which includes advice and guidance for any required remedial action points. Cybershelter work with your existing IT provider giving you an independent view for your current IT investment. Although your servers are working can they handle a hardware failure ? Should you suffer a data loss or breach are your current procedures robust enough for your business ? Will your data backups work, it's imperative backups are actually tested.

Secure Email Hosting

Secure Email Messaging is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated organizations to effectively protect, control, and manage communications.

At its core, Secure Email Messaging makes it simple to send and receive secure messages directly within email apps (including Outlook, Office 365, and Gmail) using existing email addresses. It is fully functional on mobile devices. In addition, Secure Email Messaging’s robust feature set enables real-time message tracking and control, large file transfers, secure e-signature validation, and regulatory compliance and archiving capabilities.

On sending an encrypted email the recipient receives a link to click on. Once they authenticate then they have access to the mail. Any recipient can be sent an encrypted email, if they are a first time recipient then they go through a simple sign on process.

GDPR Audit and Compliance

Audit of your Companies procedures, systems and security to bring you up to the standard required by the Information Commissioners Office (ICO), the Data protection Act 1998 and GDPR (Due May 2018)



  • Definition of Personal Data

  • Special Catagories of Data

  • Staff overview of Data handling

  • What you can and cannot do with Personal Data

  • The Right to view

  • The Right to be forgotten

  • Data identification, storage and Access

  • Role of Data Protection Officer, Data Controller and Data Processor

  • Definition of a Data Breach, what to do and when

The Audit can be quite quick, depending on the companies size and what the company does, in some cases it can even consist of one of our forms being completed by us with you remotely. Larger companies will require an on site Audit. On completion you will recieve a Certificate of Compliance from CyberShelter, valid for 12 months. The Audit includes quarterly calls/visits to ensure ongoing compliance.

Disaster Recovery Planning

When business is running the way it should then it's easy to forget that things can go wrong. Critical IT hardware should be configured in such a way as to ensure that when hardware fails (and it will fail at some point) then business can continue with little or no interruption. The least reliable parts of a Server are the hard disks and the power supply. A correctly specified Server will continue operation even with a hard disk or power supply failure. Even with correctly specified and configured hardware backups should be taken via cloud providing an off site backup (protecting against fire or theft). Cloud backups can also allow remote  access to business critical data. 


The correct DR (Disaster Recovery) Plan can ensure business continues even though hardware has failed, providing access to replicated servers either locally or ideally via cloud services, the set up does of course need to be appropriate for the organisation.

Cyber Essentials and Cyber Essentials plus

Cyber Essentials is a minimum standard that recognises a company has undergone an IT security Audit and is compliant with a number of IT specific security standards. It is a government endorsed scheme. The compliance standard is technically based and ensures you have secure protocols and procedures in place, going some way to ensure a cyber attack is much more difficult than it otherwise would be. CyberShelter will manage this entire process for you. As long as our advice is followed we guarantee compliance.

Cyber Essentials plus is an extension to the Cyber Essentials scheme, it includes a more robust internal and external network vulnerability scan, additional testing of AV and browser protection systems and more in depth analysis of software that is in use by the client.

Cyber Essentials - further information


©2017 by CyberShelter. Proudly created with

156 Brinkburn Street, Hoults Yard, Newcastle upon Tyne, United Kingdom, NE6 2AR


0330 223 4090