Wellis Technology draws on over 40 years of experience in software engineering, security standards, and professional computing communities.
Practical protection for teams of 1–50. We start with quick wins that stop common attacks, then help you grow into recognised baselines like Cyber Essentials and align with ISO/IEC 27001 when you’re ready.
Free Cyber Security Starter Packs for Small and Micro Businesses
To help small organisations improve their cyber resilience, Wellis Technology has created a free Cyber Security Starter Pack.
This practical resource includes:
• A Small Business Cyber Security Guide
• A Cyber Security Checklist
• A Cyber Security Self-Assessment
The guide explains the most important security steps every small business should take, based on widely recognised UK guidance and real-world experience supporting organisations.
Download the free starter packs here.
What we deliver
- Baseline hardening and Cyber Essentials prep — gap check, remediation plan, evidence pack. See Cyber Essentials.
- Secure configuration and updates — laptops, mobiles, servers; multi-factor authentication where practical. Based on the NCSC Small Business Guide.
- Backups and recovery drills — offline or immutable copy, quarterly test restores, clear recovery objectives in plain English.
- Email and domain security — phishing training; SPF, DKIM and DMARC roadmap.
- Access control and admin lock-down — least privilege, separate admin accounts, joiners-movers-leavers.
- Incident basics — first-hour checklist, isolation steps, reporting route to Action Fraud.
- Policy starter pack — acceptable use, password/MFA, update policy, backups, BYOD.
- Standards alignment — map your controls to ISO/IEC 27001 so you can formalise later.
Top tips for small businesses (start here)
- Enable multi-factor authentication on email, Microsoft/Google, finance tools, cloud admin and VPN.
- Automate updates for operating systems, browsers, apps and device firmware (including routers).
- Back up and test restores — keep one offline or immutable copy; do a real restore every quarter.
- Harden email — phishing filter, clear “report suspicious” route, short refresher training.
- Protect your domain — set up SPF, DKIM and DMARC (start with monitoring, then enforce).
- Use least privilege — remove shared logins; separate admin accounts; quarterly access reviews.
- Endpoint protection — reputable security software, disk encryption, firewall on, screen-lock policy.
- Secure configurations — change defaults; close unused ports/services; disable legacy protocols.
- Remote work safely — SSO plus MFA; avoid exposing remote desktop to the internet; approved devices only.
- Supplier and service resilience — record critical suppliers, contacts and workarounds if one is down.
- Logging and monitoring — keep basic auth/admin/email logs; review alerts for high-risk events.
- Vulnerability scanning — scan public-facing services; fix high/critical issues promptly.
- Document essentials — short policies people will actually follow.
Typical outcomes in 30–60 days
- MFA rolled out; updates automated; backups verified with a successful test restore.
- Phishing brief completed; DMARC monitoring in place.
- Cyber Essentials application ready or submitted.
Grow your maturity when you’re ready
Cyber Essentials path
- Scope and gap-check against the five controls.
- Remediation with evidence capture.
- Submission support and upkeep.
ISO/IEC 27001 alignment
- Lightweight risk register and asset list.
- Annex A control mapping scaled for small teams.
- Readiness plan if certification becomes a goal.
If something goes wrong
- Isolate the affected device or account; change passwords and enable MFA.
- Preserve basic evidence (timestamps, user, screenshots) before wiping devices.
- Restore from known-good backups; prioritise critical services first.
- Report fraud or cybercrime to Action Fraud (0300 123 2040).
- Follow NCSC response and recovery guidance.
Trusted UK resources
- NCSC Small Business Guide
- Cyber Essentials (overview)
- Incident response and recovery (NCSC)
- Exercise in a Box (free incident exercising)
- Action Fraud (report cybercrime)
Cyber Security Health Check
If you are unsure about your organisation’s cyber security posture, Wellis Technology can provide a simple review to identify the most important improvements.
We can help you:
• implement practical protections
• prepare for Cyber Essentials
• improve resilience and recovery
Book a Cyber Security Check-Up to discuss your organisation’s needs.
