About  Us


Long story short

Our clients become secure, compliant and profitable


How do they hack systems?”  “How do they get in?”  “Surely it can’t be that easy?

It is VERY easy to hack a computer system and steal data – after attended a very intensive and practical training course that covered the theory of the art of “hacking” – I became a qualified Ethical Hacker (an oxymoron if ever there was one) – if I practise what I was taught, I might even become a good hacker!

There are many VERY good hackers in the world, some are luckier than others; but, like everything in life, with hard work and perseverance, the hackers will often succeed

You, as a business owner, must understand how they operate and how you can prevent them from gaining access to your data. This is where we come into the equation


In 1999 I was hired as a “UNIX contractor” by the a UK Government department – travelling the world as a “highly cleared techie” – I had periods of work for several other UK Government departments – even met James Bond (or so I thought); then, sadly , as all good things do, the contracts ended during the slump in Government budget spending around 2011/2012

The one common thread throughout those twelve years was “secrecy” and “security” – data security and secrecy – it became part of my working ethics – 4ITSec Ltd was formed in 2012 to ensure that the knowledge of “secure working” was passed onto businesses in East Anglia as I was astonished at the careless way businesses treated data

Re-training to Certified Information System Security Professional (CISSP) and as a Certified Ethical Hacker ensured that the knowledge and expertise was definable and proven

We offer discrete and direct cyber security advice to businesses in East Anglia; we can scan IT systems for issues and vulnerabilities (always an eye-opener), we can scan for regulatory compliance, we can organise PEN testing, help you with Cyber Essentials and to be compliant with Data Protection Laws

We can scan for all the “Personally Identifiable Information (PII)” – held within your existing data systems – the first major step in becoming, and continuing to be, compliant with GDPR (General Data Protection Regulation) – May 25th 2018 into UK Law

We work alongside several IT suppliers (both large and small) in the region, we have links into Europe and good working relationships with other specialised IT Security groups and people

We can help your business stay secure, compliant and profitable

You’ve nothing to lose have you?