Cyber Security

Cyber Security - female colleague completing online training

Whether it's attention grabbing headlines about large scale data breaches or internet fraud perpetrated against vulnerable individuals, cyber threat is an invasive part of life.

No business is too large, or too small, to be at risk - that means your data and access to your systems are under continual peril.

A cyber breach will not only cost you money to rectify, the repetitional damage can be just as, if not more, significant.

Fortunately, you can defend your business with technology and, importantly, by training your people.

Whether it's attention grabbing headlines about large scale data breaches or internet fraud perpetrated against vulnerable individuals, cyber threat is an invasive part of life.

No business is too large, or too small, to be at risk - that means your data and access to your systems are under continual peril.

A cyber breach will not only cost you money to rectify, the repetitional damage can be just as, if not more, significant.

Fortunately, you can defend your business with technology and, importantly, by training your people.

Cyber Essentials

Since 2016, we have served as an IASME-accredited Certification Body to conduct assessments and certifications for the Cyber Essentials / Plus IT Security compliance standards in the UK.

SBRC and
Police Scotland
Trusted Partner

As an original Trusted Partner member of the Scottish Business Resilience Centre, we conduct IT security reviews and offer recommendations for Small & Medium Businesses in Scotland.

IASME Governance Audited

Grant McGregor Ltd is an IASME-accredited Certification Body to conduct assessments and certifications for the IASME Gold IT Governance and Security compliance standard in the UK.

How can we help you?

Safer Business

Safer
Business

Learn more
We put people first - group of diverse people
Safer Devices

Safer
Devices

Learn more
Professional IT Services - Technicians standing in front of server rack
Safer People

Safer
People

Learn more
Safer Data

Safer Data
& Access

Learn more

Book a 15-minute, no-nonsense discovery call
with one of our expert team.

Our honest and clear guidance will help you get the right product at your pace - then our specialist experts are here to help you bring it to life!

What our customers say

5 Stars

IKM were finding that increasingly as part of our tender process companies were being asked to be Cyber Essentials certified and not having the certification excluded us from applying for these tenders. Assisted by Grant McGregor, the application and auditing process was more straightforward as there were many processes already in place, but it was also an ideal opportunity to review our current systems and policies. We are looking to capitalise on our investment in the certification and shall now look to projects that were previously out of our scope.

IKM
5 Stars

We've had Grant McGregor support our IT aspects of our company for several years and the service has delivered more than we expected.  Not only do they continuously monitor our IT security, but they advise on our planned IT upgrades and answer any IT related questions quickly.  They've been especially responsive for our preparing for and attaining the Cyber Essentials security certification, giving us much greater peace of mind and confidence in the IT system that underpins our business.

Chris O'Rourke
User Vision
5 Stars

Proofpoint Essentials was one of the most attractive options according to Gartner at the time we were looking to move, and it has proven to be excellent – it’s reduced the IT management time to an absolute minimum and has given us absolute confidence that our email delivery is about as safe as it’s possible to be.

Euan Cowieson
IT Manager
Findlay Irvine

Essential Resources

If you’re thinking of switching IT support companies, read this guide first

One of the most important relationships your business can make is with its IT partner.

The pandemic has taught that lesson the hard way to many businesses. So much so, we’ve been inundated with new enquiries this last year.

So we wrote this guide to discuss the most common themes. It’s not about us - it’s about all IT companies and the things you should be looking for to ensure a healthy and supportive relationship.

Grab your free copy

You’ll discover:

  • Why you want a partner that thinks strategically
  • The reasons business owners and managers like you switch IT support providers
  • How to protect the most important asset your business owns
  • And why you should be highly sceptical of all IT support businesses (yes, including us)

Our Expert Knowledge
Published Weekly

Why the IT Support Partner You Choose to Work With Could Be Your Biggest Security Risk

Cyber Security - let’s call it what it really means – protecting yourself against Criminals.

Modern cyber crime might be one of the biggest risks your business faces. It could cause you massive disruption, reputational damage or even ultimately to close shop. But how do you know your business is protected as well as it could be – or as well as you need it to be?

26th August 2021

What is the "right" level of security for my business?

So far, 2017 has been the year of the cyber-attack. Cases of cyber-crime and cyber-terrorism are on the rise, but never before have the general public seen the scope and scale of cyber-crime committed by groups on the government and public services.

Now most people know just how insecure data and networks can be, so lots of people are taking extra precautions. But how much protection is the right amount of protection? What hope do small or medium sized businesses have when entire branches of government or large enterprises are falling foul of such criminals?

26th August 2021

Should cyber risk be the responsibility of your Risk Manager or your IT Manager?

Today, IT systems are crucial to the day-to-day operations of many organisations. This makes cyber security risks a significant part of organisational risk management. But where should responsibility fall? Is cyber security risk management the preserve of IT or organisational risk managers?

Before we make a prognosis about where responsibility for cyber risk should lie within an organisation, let’s consider what cyber risk is.