Call us on 03450 21 21 51

It’s not a Dark Art: how we demystify cyber security
The SRM Blog

It’s not a Dark Art: how we demystify cyber security

Julia Wailes-Fairbairn

Written by Julia Wailes-Fairbairn

15th March 2019

Share this article

It’s easy to see why many people think cyber security is a mysterious Dark Art. After all, it has a language of its own, full of acronyms, jargon and obscure technical terms. In fact some cyber security experts actually encourage this myth. But if you feel you are being baffled and blinded, being kept in the dark, you are probably talking to the wrong type of expert. At SRM, our mission is to demystify the world of cyber security for our clients.

Of course there are specific technical terms which are peculiar to our industry. But while our consultants are fully conversant with every nuance, they understand that our clients may not necessarily be familiar with the inner workings of JavaScript or the precise details of Web Application Testing. Because we are not simply technical wizards, however, our expertise does not end there and nor does our client communication. That is because we not only understand cyber security, we also understand business.

When explaining a proposed plan of action, we talk in terms of business deliverables; a language we can all understand. Focusing on the specific threats and vulnerabilities relating to each business, we explain our strategy through measurable goals and achievable results. Although we don’t patronise our clients by dumbing down, we don’t attempt to baffle either; we aim to explain and educate.

That’s because knowledge is power. If our clients understand the risks they face and the steps that can be taken to safeguard their business, we are then empowering them to make wise decisions. Because we provide them with the level of business intelligence they require, they are never pressured into buying in services they do not need or to buy products which will not provide substantial benefits. It is our business model to engineer a precisely scoped, expertly delivered cyber security solution which delivers ‘what it says on the tin’.

Advising prospective clients in this way means that our business relationships are built on trust. We are in it for the long haul, not just a quick sale. Working in partnership with us, our clients know that everything we recommend is a sound investment which produces tangible ROI, underpinned by comprehensive reporting.

We are pragmatic and realistic, however, and will not hide the realities of the threats faced. All too frequently we read about organisations which have suffered catastrophic breaches. This is the nature of today’s cyber environment. With hackers becoming increasingly ingenious and manipulative, even the best protected business will face the real possibility of a breach.

So if asked to look at the whole company’s security posture, we would include Incident Management, Disaster Recovery and Business Continuity Plans to provide a roadmap of actions. We will educate the appropriate staff in all aspects of these as well as guiding and acting on their behalf in the event of a breach. Through these expertly set up business management plans we ensure that, in a breach scenario, the impact is minimised and swiftly mitigated.

Our ethos for plain-speaking stands us in good stead. We have had long-standing working relationships with organisations of all sizes and sectors. Trusted by key Government departments, FTSE 100 organisations and third sectors we have a coveted reputation for supporting even the most mature information security teams. But our ability to de-mystify cyber security is also valued equally by startups and SMEs.

To discuss your cyber security requirements please call Laura Chatton on 03450 21 21 21 or email

Follow us on Linkedin or visit our website.

Download our free-to-download jargon-free PCI eBook here.

Or read more from our blog:

Virtual CISO: too good to be true?

PCI is like car maintenance: it’s not just an annual event

Putting 2019 into sharp focus – the benefits a fresh set of eyes brings to information security

Back to top