Common Objections and Rationalisations: “Our production systems are completely isolated from outside access.” “Our system is secure because it would be impossible for an outsider to understand it.” “We’re not a likely target. We’re not important or interesting enough to attract hackers.” “We’ve never had a problem. There has been no intrusion or disruption in our production network.” “It hasn’t happened yet, so it seems unlikely. I don’t think it will happen.” “We can’t justify the expense and manpower.” Being Vulnerable is not your fault. Staying vulnerable definitely is... Cyber Security is much more than a matter of IT... Passwords are like underwear: Don’t let people see it, Don't leave them lying around and Change them regularly... It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.. Technology trust is a good thing, but control is a better one... No technology that’s connected to the Internet is unhackable. Social engineering bypasses all technologies, including firewalls. Phishing is a major problem because there really is no patch for human stupidity. If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you. My message to companies that think they haven’t been attacked is: ‘You’re not looking hard enough. Never underestimate the determination of a kid who is time-rich and cash-poor. Time is what determines security. With enough time nothing is unhackable. Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.

Follow On Social

Jack Da Conaz

COO: Business Consulting Expert

Chopa Kendalo

Director: Cyber Program

Naushad Hunter

CTO/CISO: Cyber Security Specialist

Kevin Smith

Business Consulting Expert

Ian Bell

Business Consulting expert

Alester Cook

Business Consulting expert

  • 00

    k

    Projects Completed

  • 00

    %

    Happy Customers

  • 00

    m

    3,280 avg rating

WHY CHOOSE

Why Choose SecOp Team

SecOp will work with your team and conduct a combination of interviews, workshops, policy and process reviews and technical testing — always taking a positive approach to help you manage your cyber security issues.

To strategically enable your ongoing transformation, SecOp brings an uncommon combination of strengths — cyber expertise, in-depth business understanding and extraordinary people that deliver innovative thinking and practical implementation to the automated world. We’ll use our strengths to help you get an enviable combination of your own: confidence, agility and resilience..

Latest thinking

A well-protected business has the potential to be confident and the most innovative. .

  • Building trust through cybersecurity

  • ZeroTrust: Assume nothing, verify everything.

  • Enablers of digital transformation

SecOp Logo