What our customers are saying
"Amwell Information Security are a pleasure to work with. They were proactive, knowledgeable and professional throughout the process of achieving our Cyber Essentials certification."
Director, New Group Solutions
"Graham from Amwell made the process as hassle-free as possible - offering pragmatic advice on specific queries; the feedback report was also helpful and I learnt a lot about cyber security along the way. Thoroughly recommended - and not just as a means to get the necessary certificate."
Cyber Essentials applicant
"I really enjoyed the [Cyber Basics Review] session and found it very useful to identify gaps in what we are currently doing and what we can do to improve."
Head of Business Support, Beautiful Information Ltd
"I found the advice from Amwell to be clear, concise and easy to put into practice. I would not hesitate to recommend their services."
Parallel HR Ltd
Achieve recognised certification for your organisation to improve your security processes and earn the trust of customers and partners.
Develop an effective information security management system to ensure your business and client information is kept safe.
Obtain independent verification that your security processes and procedures are working as you intend.
Review and improve how you process, collect, record, store and dispose of personal data within the terms of the General Data Protection Regulation (GDPR).
Maintaining the security of your organisation is very much a team effort and involves EVERYONE. As technical security measures become more and more sophisticated, attackers increasingly focus on the weakest link in the systems: people. As regulatory powers evolve and...
Would your micro business (up to 5 employees) benefit from some free cyber security advice? Head to https://www.hertsgrowthhub.com/cyber-security to register for your FREE Cyber Basics Review, then get in touch with us! Funded by Herts Police and Crime Commissioner in...
A cache containing more than 700 million email addresses and passwords has been located by security researchers. The data has been processed and loaded into the highly respected HaveIBeenPwned? website which has been collecting data from similar breaches since 2013....