How our pricing works

1. Choose your IT & Cyber Security Plan

All our IT & Cyber Security plans include a fully Managed IT & IT Support service

2. Choose your Compliance & Security packs

Enhance your compliance and cyber security with our advanced and flexible services

Our IT & Cyber Security plans...

IT & Cyber Security Plan Comparison

Starter
Get started on your Cyber journey
£45
/month, per user
Essentials
The essential Cyber Security service
£60
/month, per user
Grow
For complex business needs
£70
/month, per user
Custom
Speak to us about custom solutions
Enquire Now
Get in touch for your price
Plan Information
Commitment 30-days 12-months 12-months Tailored
On-boarding feei

Plain English
Unlike other Cyber Security and IT companies, we don't charge to bring you onboard into our monthly service.

No onboarding fee No onboarding fee No onboarding fee No onboarding fee
Renewal termi

Tech Speak
The agreement will automatically renew based on the renewal term. This may be on an annual or monthly basis, and will ensure continuous, unhindered access to the service.


Plain English
Automatic annual or monthly rolling renewals ensure you can keep using our IT service. This ensures you have ongoing tech support without breaks.
Monthly Annual Annual Tailored
Technical audit to Cyber Essentials standardi

Tech Speak
A cyber security audit evaluates digital systems against the NCSC's Cyber Essentials standard, identifying vulnerabilities and providing recommendations to improve overall security.


Plain English
We check your digital systems using the UK's National Cyber Security Centre's Cyber Essentials standard to find weak spots and suggest ways on how to make them safer.
Initial audit Initial audit, updated and reviewed quarterly Initial audit, updated and reviewed monthly Tailored
Unlimited Remote IT Supporti

Tech Speak
Provision of technological assistance and problem resolution through virtual channels. We utilise remote access tools, and various communication platforms to ensure optimal IT infrastructure functionality.


Plain English
What is good Cyber Security without good IT? All our Cyber Security plans including unlimited IT support. Helping you and your staff fix tech issues without coming to your office, using internet tools and calls to guide you or resolve the problems online.
Tailored
Response timesi

Tech Speak
The framework of time as stipulated in the service contract as the allowable interval netween the initiation of a service request and the initial response from our IT Support team.


Plain English
How quickly we promise to get back to you after you ask us for help with a tech problem. Support tickets are prioritised by us as Critical, High or Medium.
Critical 2 hours, High 4 Hours, Medium End of Next Business Day Critical 1 Hour, High 2 Hours, Medium 8 Hours Critical 0.5 Hours, High 1 Hour, Medium 8 Hours Tailored
Out of hours IT support i

Tech Speak
Provision of IT support services beyond the predefined operational timeframes, addressing critical incidents or facilitating non-standard service access during off-peak or non-business hours.


Plain English
Helping you with tech issues outside our regular "opening" hours, like evenings, weekends, or holidays.
Optional Optional Tailored
Regular technology and business strategic reviewi

Tech Speak
A regular and comprehensive evaluation and future-planning exercise, encompassing an assessment of existing technological ecosystems, followed by the formulation of a strategic IT trajectory, optimally aligning technology investments with organisational goals.


Plain English
We take a close look at your current tech setup, then help plan your tech future, ensuring the technology and systems you invest in help your business grow and succeed.
Annual 6-Monthly Quarterly Tailored
Features & Benefits
Service description Included in Starter? Included in Essentials? Included in Grow? Available?
Microsoft 365 Risky Sign-on detectioni

Tech Speak
Microsoft 365 risky sign-on detection is a services that uses machine learning algorithms to analyze user sign-in behavior, identifying suspicious activities or potential security risks within the Microsoft 365 environment. These are escalated to us for investigation and remediation.


Plain English
Our Microsoft 365 risky sign-on detection service watches how users log in and flags any strange or risky behavior, helping keep your Microsoft accounts safe from hackers.
Tailored
Endpoint health monitoring and problem resolutioni

Tech Speak
Endpoint health monitoring and problem resolution involves continuous tracking of performance and health metrics of individual endpoint devices (computers, laptops) within a network, along with proactive measures to identify and address any issues that may arise.


Plain English
We keep an eye on each computer in your business to make sure they're running smoothly and safely. If there's a problem, we'll jump in to fix it before it causes any trouble.
Tailored
Software patchingi

Tech Speak
Operating system and application patching is the process of regularly updating software to fix known vulnerabilities and bugs, ensuring systems remain secure and functional.


Plain English
We make sure your computer programs and systems stay up-to-date with the latest fixes and improvements, so hackers can't exploit any known weaknesses.
Tailored
Next-Gen anti-virus with XDRi

Tech Speak
Next-Gen anti-virus with XDR (Extended Detection and Response) is an advanced security solution that combines traditional antivirus capabilities with proactive threat detection and response features, utilizing cross-layered visibility and analytics to defend against sophisticated cyber threats. Most cyber insurance policies require XDR functionality.


Plain English
Our advanced antivirus system doesn't just stop viruses; it also identifies suspicious activity and new threats that can harm your computer. Using this smart technology, threats can be identified more quickly.
Tailored
Windows and macOS device encryptioni

Tech Speak
Windows and macOS device encryption is a security feature that protects data on computers by converting it into unreadable code, ensuring confidentiality and integrity even if the device is lost or stolen.


Plain English
We use special technology to scramble all the information on your computer, so even if someone tries to access it without permission, they won't be able to see or read your data.
Tailored
Microsoft 365 / Google data backupi

Tech Speak
Microsoft 365 / Google data backup is a service that regularly copies and stores critical information from Microsoft 365 or Google Workspace applications, ensuring data availability and recovery in the event of accidental deletion, corruption, or cyberattacks.


Plain English
We regularly save important stuff from your Microsoft 365 or Google Workspace accounts, so if something goes wrong like accidental deletion or a cyberattack, we can bring it back for you.
Tailored
Security awareness trainingi

Tech Speak
ecurity awareness training involves educating employees on various cybersecurity threats, best practices, and policies to help them recognize and respond appropriately to potential security risks, ultimately reducing the likelihood of successful attacks.


Plain English
We teach your team about online dangers and how to stay safe, like spotting suspicious emails or keeping passwords strong. It's like giving them a superhero cape against cyber villains!
Tailored
Domain & DNS managementi

Tech Speak
Oversight and administration of domain name registrations, renewals, and Domain Name System (DNS) configurations, ensuring correct domain resolution, safeguarding against latency, and maintaining coherent internet presence and connectivity.


Plain English
We manage your website’s name and its address book (DNS) to ensure people can easily find your site on the internet, your email is reliably and safely delivered, and key email security settings are put into place.
Tailored
Network & Wi-Fi supporti

Tech Speak
Resolving network connection and configuration issues, ensuring a reliable and secure connection to your resources and the internet.


Plain English
We help keep your IT networks running smoothly, fixing any issues and making sure data flows securely and quickly where it needs to. We also support your team if connection problems arise.
Tailored
Joiner & leaver actionsi

Tech Speak
Implementation and administration of IT protocols for onboarding and offboarding personnel, encompassing access provisioning and de-provisioning, credential management, and resource allocation or reallocation to ensure secure and compliant IT operation.


Plain English
We manage tech tasks when someone joins or leaves your business, like setting up accounts for new people or removing access for those who've left, ensuring things stay secure and organised. This is tailored to your business's unqiue needs.
Tailored
Remote device & profile setupi

Tech Speak
End-to-end orchestration and configuration of user devices and profiles, entailing hardware/software setup, policy enforcement, and personalised user environment creation, to facilitate usability and adherence to your business IT standards.


Plain English
We get your team's devices and accounts set up right, making sure everyone has what they need to work effectively and securely on their devices from day one.
Tailored
Network device managementi

Tech Speak
Network device management encompasses the configuration, monitoring, and maintenance of network devices such as routers, switches, and firewalls to ensure optimal performance, security, and reliability of the network infrastructure.


Plain English
We take care of all the devices that make your internet work smoothly, making sure they're set up right, watching to catch any problems, and keeping everything running safely.
Tailored
MDM monitoring & maintenancei

Tech Speak
Monitoring and management of the mobile device management (MDM) environment (such as Microsoft Intune), ensuring the seamless operation of mobile and endpoint management, policy adherence, and secure application deployment across enterprise mobile devices and workstations.


Plain English
We watch over and manage your MDM platform, making sure all your work devices are managed safely and efficiently, keeping apps and settings secure and up-to-date.
Tailored
Configure and ship servicei

Tech Speak
End-to-end device provisioning and deployment services, encompassing initial configuration, installation of requisite software, and physical despatch of IT assets to predetermined locations, ensuring operational readiness upon receipt by the end-user.


Plain English
We set up your tech devices with all the software and settings they need, then pack them up and send them wherever they need to go, so they’re ready to use straight out of the box.
Tailored
3-year IT budgeting and planning (vCIO)i

Tech Speak
Strategic co-creation and development of a 3-year IT financial plan, entailing collaborative forecasting, allocation, and optimisation of technological expenditures, aligning with organisational goals and ensuring fiscal prudence and sustainability.


Plain English
Working together, we’ll plan and create your tech spending plan for the next three years, making sure it aligns with your business goals and keeps your IT expenditure predicatable.
Tailored
Additional services
Service Starter Essentials Grow Custom
On-site service/supporti

Tech Speak
Provision of technical assistance and troubleshooting services delivered physically at your office location, enabling hands-on problem resolution, hardware maintenance, and technical support directly at the site where the issue or task arises.


Plain English
We send a tech expert to your location to help you with any problems that can't be solved remotely, ensuring quick and hands-on solutions.
£125 p/hr, minimum of 2 hours As Starter, less 10% As Starter, less 15% Tailored
Managed Network/Firewalli

Tech Speak
End-to-end management of network infrastructure and firewall devices, encompassing configuration, monitoring, and maintenance to ensure robust network security, performance optimization, and protection against unauthorized access or cyber threats.


Plain English
We take care of your network and firewall, making sure they're set up right, watch over them, and fix any issues to keep your data and systems safe and running smoothly.
from £179 from £179 from £179 Tailored
Cyber incident remediationi

Tech Speak
This is the process of addressing and resolving cybersecurity incidents, including containment, eradication, and recovery activities, to minimize the impact, prevent further damage, and restore normal operations following a security breach.


Plain English
We take action to stop and fix any security issues that occur, so your systems and data are safe, and things can get back to normal as quickly as possible after a cyber attack.
Cyber insurance required Cyber insurance required Cyber insurance required Cyber insurance required

Add-on Packs