Stop Common Threats Before They Become Downtime
+ You want baseline protection that covers the biggest real-world SME risks
+ Your team is seeing phishing emails or suspicious login attempts
+ MFA isn’t fully enforced across email and cloud systems
+ You have backups—but you’re not 100% sure they’d save you in a real incident
+ You want a security foundation that supports Cyber Essentials and insurer expectations
Get the baseline cyber protection every business needs—email security, identity hardening, endpoint protection, and reliable backups—aligned to recognised best practice and built for SMEs. No jargon. No pressure. Clear next steps.
Most SMEs don’t fail because they lack IT. They fail because a simple event—like a phishing click or stolen password—turns into a disruption that stops the business.
The most common pattern we see is:
A user account gets compromised
Attackers move quietly inside systems
Data gets encrypted or deleted
The business loses days to recovery and uncertainty
Essential Security prevents the common attacks that cause the majority of SME cyber losses.
| Features: | Purpose: | Includes: |
|---|---|---|
| Email Security & Domain Protection | Stop phishing, spoofing and malicious email before it reaches users — and protect your domain reputation | + DMARC management (SiSekela takeover + ongoing control) + Mail Assure email security (filtering + threat blocking) + Email continuity / protection baseline (Mail Assure) + DMARC domain traffic visibility (inbound + outbound email activity) |
| Identity & Access Baseline (Microsoft 365) | Detect and stop malware/ransomware on devices before it spreads | + EDR per endpoint + Centralised EDR policy management + Threat detection + containment baseline + Endpoint security reporting |
| Endpoint Protection (EDR) | Stop malware and prevent uncontrolled spread | + Backups for Servers + Backups for Workstations + Microsoft 365 backups: Teams, SharePoint, Exchange, OneDrive + Offsite backup storage included (fair use policy applies) + Backup monitoring (success/failure alerts) |
| Backup & Recoverability (Server + Workstations + Microsoft 365) | Ensure your business can recover quickly if ransomware, deletion, corruption or failure occurs | + Encrypted backups (daily) + Offsite backup storage + Backup monitoring (success/failure alerts) + Baseline restore validation (light-touch) |
| Reporting & Visibility | Provide proof of protection, activity, and security posture | + Monthly/regular EDR report + Monthly/regular Mail Assure report + DMARC domain traffic reporting (email in + out) |
| Security Awareness Training (Baseline) | Reduce human risk and improve phishing resilience | + Free security awareness training + No certificate + Limited branding + 1 session per user |
Average Cost per User/Device : R233.21 ex.
Cut down on malicious emails getting through, with fewer successful compromises and far less time spent responding to suspicious messages.
Enforce identity controls like MFA and conditional access so only the right users, on the right devices, can access business-critical systems.
Every device is secured to the same standard — reducing gaps, misconfigurations, and “weak link” machines that attackers exploit.
Encrypted offsite backups ensure your data stays safe and recoverable — even in the event of ransomware, accidental deletion, or hardware failure.
Put measurable controls in place that insurers and auditors look for, with evidence-based security posture improvements.
Establish a solid baseline that supports growth — so security doesn’t become more fragile as your team, devices, and systems expand.
Step 1 — Assess
We review your current exposure across email, access, devices, and backups to identify the biggest risk gaps.
Step 2 — Implement
We deploy and configure essential controls, standardise policies, and ensure protections are consistently applied across users and devices.
Step 3 — Manage & Improve
We monitor, report, and continuously improve the baseline—so protection stays aligned as the business grows.
Implementation timeline (small callout)
Typical rollout: 5-7 days depending on environment size and complexity.
Essential Security supports alignment with:
Cyber Essentials (baseline control coverage)
ISO 27001 (foundational Annex A controls)
NIST CSF (Identify + Protect domains)
Important note:
Compliance isn’t the goal—reduced business disruption is. Compliance becomes a byproduct of doing the fundamentals properly.
Yes. Antivirus alone doesn’t stop phishing, credential compromise, or modern ransomware. Essential Security covers the full baseline: email, identity, endpoints, and backups.
No. The goal is strong security with minimal friction. Most controls run quietly in the background, and MFA is implemented in a user-friendly way.
Yes. We can work alongside internal IT or your MSP. The framework clarifies ownership and ensures baseline controls are consistently applied.
It reduces ransomware likelihood, but ransomware survivability requires tested recovery and immutability, which is part of Cyber Resilience.
Yes. This pillar aligns strongly to Cyber Essentials requirements and gives you the structure to support certification readiness.
Get baseline cyber protection that reduces risk today and gives you a clear path to stronger maturity tomorrow.