what we do?

helping you to improve your IT-Security



Before we can advise and implement security adjustments we need to examine your infrastructure to determine your current level of risk. Offcourse this is done with the highest confidentiality.


When the current level of risk has been determined we will advice you with a set of best practises to harden your IT-Security. This is done by technical and social advise (like social hacking techniques).


After our advise has been given and implemented by your organisation we will check if the current level of risk has been lowered. After all : security is a continuously process !

keep in touch

We value a good relationship with our customers. So it is important to stay in contact. A relationship which is built on trust,confidentiality and result is what counts.


We are a team of IT-Engineers currently also working for government institutions.
Our goal is to harden security at local and semi-government institutions and small to medium companies. We have more than 15 years experience and extensive knowledge of firewalls , operating systems, ethical- and social hacking and penetration tests.

Because of our small team we can offer our services and know-how for a small fee.
We want to make security-advice AFFORDABLE.

Contact us for our current rates.

Latest European Cybernews


Why worry about threats?
Ask yourself.

On a scale from 1 to 100 percent, how much do you think is your company at risk?

Do you know the answer ?

  • ransomware?
  • malware?
  • Hacks?
  • Virus?

RSS Latest threats

  • Microsoft Patch Tuesday – August 2017 August 9, 2017
    This month the vendor has patched 48 vulnerabilities, 26 of which are rated Critical. Publish to Facebook:  No Twitter Card Style:  summary This month Microsoft has patched 48 vulnerabilities, 26 of which are rated Critical. As always, customers are advised to follow these security best practices: read more
  • Latest Intelligence for July 2017 August 4, 2017
    Email malware rate continues to increase and WannaCry, Petya inspire other threats to add self-spreading components. Publish to Facebook:  No Twitter Card Style:  summary read more
  • Attackers are increasingly living off the land July 12, 2017
    The use of fileless threats and dual-use tools by attackers is becoming more common. Background Image on Blogs "Quilted" Page:  SR-EB-Header-image43_4.jpg Publish to Facebook:  No Twitter Card Style:  summary Click to Tweet:  Attackers increasingly using legitimate tools to hide in plain sight All 10 APTs Symantec looked at used system tools in their attacks Click […]

Want to join us ?

We are looking for the following persons to strengthen our team

Member and supporter of the Fuel User Group

Get in touch

and ask what we can do for you.
The Netherlands
Please contact us for more information.