Our Cyber Resources

Our Cyber tools can help you achieve and retain Cyber Essentials, Cyber Assurance, GDPR compliance, and ISO 27001 for you business.

Assets Register
7-Day Free Trial
Assets Register
Track and manage all your organisational assets in one central register. Know what you own, where it is, who's responsible, and when it needs updating. Essential for Cyber Essentials, ISO 27001, and good security practice.

What You Get:

  • Hardware asset tracking (laptops, servers, mobile devices)
  • Software inventory (applications, licenses, versions)
  • Data asset classification
  • Owner & location tracking
  • Patch status monitoring
  • Risk assessment per asset
  • Disposal & lifecycle management
  • Export reports for audits

Saves 15+ hours of manual spreadsheet management

Information Asset Register
7-Day Free Trial
Information Asset Register
Document and classify all information assets in your organization. Track data locations, sensitivity levels, owners, and retention requirements. Essential for GDPR Article 30 records and ISO 27001 asset classification requirements.

What You Get:

  • Data asset inventory & classification
  • Information sensitivity levels (Public, Internal, Confidential, Restricted)
  • Personal data identification (GDPR compliance)
  • Data owner & custodian tracking
  • Storage location mapping
  • Retention period management
  • Access control requirements
  • Export for GDPR/ISO 27001 audits

Saves 20+ hours of manual documentation

Company Policy Generator
7-Day Free Trial
Company Policy Generator
Create professionally-written security and compliance policies. Covers Information Security, Data Protection, Acceptable Use, Remote Working, Incident Response, and more. All policies aligned with Cyber Essentials, ISO 27001, and GDPR.

What You Get:

  • 15+ policy templates (Information Security, Access Control, BYOD, etc.)
  • Cyber Essentials & ISO 27001 aligned
  • GDPR-compliant data protection policies
  • Customisation guides & implementation notes
  • Multiple formats (PDF, Word, Markdown)
  • Regular updates when regulations change
  • Policy review schedule recommendations
  • Staff acknowledgment forms included

Saves 40+ hours of policy writing

Security Risk Assessment
7-Day Free Trial
Security Risk Assessment
Identify, evaluate, and manage security risks across your organization. Built-in risk frameworks, likelihood and impact scoring, treatment planning, and residual risk tracking. Required for ISO 27001, IASME, and demonstrating security due diligence.

What You Get:

  • Pre-loaded threat library (cyber, physical, human)
  • Likelihood & impact matrix
  • Automatic risk scoring (Low, Medium, High, Critical)
  • Risk treatment planning (Accept, Mitigate, Transfer, Avoid)
  • Control effectiveness tracking
  • Residual risk calculation
  • Risk register exports for audits
  • ISO 27001 Annex A mapping

Saves 15+ hours per risk assessment

User Access Management
7-Day Free Trial
User Access Management
Manage users, track MFA adoption, monitor inactive accounts, and maintain access controls. Essential for Cyber Essentials User Access Control requirements and demonstrating proper identity management.

What You Get:

  • User account tracking & lifecycle management
  • MFA enrolment monitoring (mandatory for cloud)
  • Role-based access control (User, Manager, Admin)
  • Inactive account detection (>90 days)
  • Privileged account separation tracking
  • Access review scheduling & records
  • Compliance dashboards & reports
  • Export audit evidence

Saves 5+ hours per month on access management

Business Continuity Plan Generator
7-Day Free Trial
Business Continuity Plan Generator
Create a comprehensive business continuity plan in hours, not weeks. Identify critical business functions, assess impact, define recovery strategies, and document procedures. Required for ISO 27001, IASME Cyber Assurance, and resilient operations.

What You Get:

  • Business Impact Analysis (BIA) framework
  • Critical function identification
  • Recovery Time Objective (RTO) planning
  • Recovery Point Objective (RPO) definition
  • Emergency response procedures
  • Communication plans & contact lists
  • Testing & maintenance schedules
  • Export in professional format

Saves thousands in consultancy fees

Legal Document Generator
7-Day Free Trial
Legal Document Generator
Create GDPR-compliant Privacy Policies, Cookie Policies, Terms & Conditions, and Acceptable Use Policies in 15 minutes. Answer a few questions, download professional documents in multiple formats.

What You Get:

  • Privacy Policy (GDPR/UK DPA 2018)
  • Cookie Policy (PECR compliant)
  • Terms & Conditions
  • Acceptable Use Policy
  • Export in PDF & Markdown
  • Implementation guidance included

Saves thousands in legal fees

Security Incident Management
7-Day Free Trial
Security Incident Management
Track, manage, and report security incidents with a professional incident response system. GDPR breach notification support included.

What You Get:

  • Incident logging & tracking
  • Severity classification
  • GDPR breach notification templates
  • Timeline visualisation
  • Stakeholder communication
  • Lessons learned capture

Enterprise incident management

Approved Software List
7-Day Free Trial
Approved Software List
Maintain a comprehensive list of approved and vetted software applications for your organization. Control software installations, track licenses, and prevent shadow IT. Essential for Cyber Essentials malware protection requirements and ISO 27001 change management.

What You Get:

  • Approved application inventory
  • Software categorization (Business, Development, Utilities)
  • License tracking & compliance
  • Version control & update management
  • Security assessment per application
  • Vendor & support contact details
  • Installation authorization workflow
  • Export for compliance audits

Saves 10+ hours managing software approvals