We help organisations of any size leave less to chance by supporting them to assess, prevent and respond to modern day cyber attacks and threats.
Forensic Control is a cyber security consultancy, launched in 2008, by Jonathan Krause. Following his career in the Metropolitan Police as a digital forensic investigator. Today Forensic control are certificated Cyber Essentials partners and provide a number of services to organisations in the UK and globally.
Our model is simple.
Understand your security posture and any risks that need addressing.
Employ and obtain the necessary solutions to safeguard against attacks.
Know how to respond in an event to ensure safe and effective forensic investigation.
How we help you leave less to chance
Our goal is to assess, prevent and respond to cyber threats and data breaches, giving our clients peace of mind that they will be supported – every step of the way.
Today Forensic control is proud to partner with IASME to deliver the government-backed Cyber Essentials and Cyber Essentials Plus certifications to a range of organisations throughout the UK. We support our clients with:
- Cyber Essentials
- Cyber Essentials Plus
- IASME Cyber Assurance
- Penetration Testing
- Vulnerability Testing
- Security Posture Reviews
- Security Consultancy
- Digital Forensic Investigations
Cyber Essentials and Cyber Essentials Plus
Our core service starts with helping organisations achieve Cyber Essentials and Cyber Essentials Plus accreditation, the UK’s most popular cyber security standards. Our team of expert assessors walk our clients through the entire process, ensuring minimum stress and maximum results. We provide unlimited support to ensure that all applicants can pass – first time.
To save time and money ask about our combined package for Cyber Essentials and Cyber Essentials Plus!
IASME Cyber Assurance
Formerly known as IASME Governance, this certification assesses your information security governance, and works as a major step towards ISO 27001.
As with Cyber Essentials, there are two levels: a ‘self-assessment’, and an audited version. We help our clients throughout the process with our unlimited and tailored support.
Security Posture Reviews
We carry out a detailed assessment of your full security posture, covering policy, processes and technology platforms.
- We analyse your security posture versus industry best practices and standards, such as the NCSC 10 Steps, or the NIST Cyber Security Framework
- We also interview stakeholders in your organisation to help understand and reduce the gaps in your security posture
- Our report recommendations are scored to better assist you in prioritising the required remediations
Digital Forensic Investigations
We provide expert forensic investigation of cyber attacks, IP theft, fraud, or any other area of dispute. Our discreet service ensures our clients are provided with an in-depth, independent report needed to settle disputes, including being used as evidence in court. We also have years of experience in forensically collecting data from Microsoft 365, Google Workspace and other cloud platforms in legal discovery work.
With expert consultancy from our Cyber Security team, we work with our clients on a range of projects; from general advice about their Cyber security posture, to monthly advisory calls and remote IT/CISO services.
Our CREST-qualified penetration testers use a number of tools to search for exploitable issues and provide tailored remediation recommendations for security issues identified on your web apps, APIs, firewalls and websites. We recommend that this is conducted at least quarterly – and ideally monthly – giving you peace of mind that emerging exploits will be identified and patched before they cause problems.
Scans are automated scans of devices, IPs and URLs. They are typically run against a network of end user devices (usually laptops), and help to quickly identify vulnerabilities in software and operating systems. Such vulnerabilities can usually be fixed by applying the latest security patches. We recommend that vulnerability scans are conducted on a monthly basis, and used in conjunction with penetration testing.
While prices for Cyber Essentials and IASME Cyber Assurance are set, our other services are bespoke depending on our clients needs, and the scope of the project. Our process is simple:
- Book a discovery call
- Send scoping materials or proposal
- Agree the project with a Statement of Work
- Our technical team works closely with the client(s)
- Report and certification handover
- Review of any remediation and recommendations for ongoing support.