[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"blog-10-things-a-scaleup-business-could-do-right-now-to-improve-business-security":3,"services-list":18},{"id":4,"slug":5,"title":6,"description":6,"hero_image_url":7,"hero_image_alt":6,"body_html":8,"category":9,"author":10,"published_at":11,"reading_time_minutes":12,"featured":13,"is_active":14,"sort_order":15,"created_at":16,"updated_at":17},"92e19b09-917b-43fb-914e-8e66173342a0","10-things-a-scaleup-business-could-do-right-now-to-improve-business-security","10 things a scaleup business could do right now to improve business security","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F6fb90844680c.png","\u003Cp>Almost half of businesses (46%) and a quarter of charities (26%) report having cyber security breaches or attacks in the last 12 months, and the&nbsp;\u003Cstrong>average cost to a small business when this happens is £3,230 in direct costs for each occurrence\u003C\u002Fstrong>.\u003C\u002Fp>\u003Cp>With an increase in home working, we assume that the most common breaches will be more effective as we communicate as teams more remotely and asynchronously.\u003C\u002Fp>\u003Ch2>Common Attacks\u003C\u002Fh2>\u003Cp>According to the&nbsp;Cyber Security Breaches Survey 2020, these are the most common attacks\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F2d852e4d0946.png\">\u003Cp>Credit: gov.uk\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>86%\u003C\u002Fstrong>: Fraudulent emails or being directed to fraudulent websites\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>26%\u003C\u002Fstrong>: Others impersonating organisation in emails or online\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>16%\u003C\u002Fstrong>: Viruses, spyware or malware\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>9%\u003C\u002Fstrong>: Hacking or attempted hacking of online bank accounts\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>8%\u003C\u002Fstrong>: Ransomware\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>6%\u003C\u002Fstrong>: Unauthorised use of computers, networks or servers by outsiders\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>3%\u003C\u002Fstrong>: Unauthorised use of computers, networks or servers by staff\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>\u003Cstrong>Below are a set of easy steps you could take to better protect yourself, and your business, or highlight areas of risk to mitigate with further information.\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>1.&nbsp;&nbsp;&nbsp;&nbsp; Add external email warning banners\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F3816d164ba8c.png\">\u003Cp>It’s fairly simple for a malicious actor to send you an email pretending to be one of your colleagues.&nbsp; An example of this is a CFO or financial controller getting an email from the ‘CEO’ asking for urgent payment of an invoice, or other valuable information.\u003C\u002Fp>\u003Cp>A quick way to make this scam obvious is to automatically add a warning to all incoming emails which are not from within the organisation.\u003C\u002Fp>\u003Cp>A banner like this is hard to miss, and a clear warning to be careful.&nbsp; Backing this with the education of staff members on how to spot phishing attempts, will help you mitigate 86% of reported attacks.&nbsp;&nbsp;NCSC have a great article&nbsp;on spotting and mitigating these attempts, this should be circulated to staff.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendations:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Set up an external recipient\u002Fsender warning\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Gmail external recipient reply warning\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Office 365 external sender warning\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>2.&nbsp;&nbsp;&nbsp;&nbsp; Check email security and anti-spoofing is configured correctly\u003C\u002Fh2>\u003Cp>You may check this yourself&nbsp;here, all you need to do is add your website address (from which your emails are sent), and submit it.&nbsp; If you get a red banner back, speak with your IT\u002Femail provider about correctly configuring SPF, DKIM and DMARC, more info&nbsp;here.\u003C\u002Fp>\u003Cp>\u003Cstrong>Good\u003C\u002Fstrong>\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F2a1ffa3b311e.png\">\u003Cp>\u003Cstrong>Bad\u003C\u002Fstrong>\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F4135c91f79e9.png\">\u003Cp>If you have a Gmail account, you may also send that an email from the email account you want to test, and follow the instructions below to ensure your anti spoof protection (SPF, DKIM and DMARC) are set correctly.\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fdece692103dd.png\">\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F08139d137b1b.png\">\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>- Check that this is configured correctly, and if you get an error back, speak with your IT provider and ask them to rectify it\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>3.&nbsp;&nbsp;&nbsp;&nbsp; Use Stack or Teams for internal communication, rather than email\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fb0c4f9d73c3d.png\">\u003Cp>Credit: Slack\u003C\u002Fp>\u003Cp>If email is not used for internal communication, it can be ruled out completely as an attack vector.\u003C\u002Fp>\u003Cp>Slack&nbsp;and&nbsp;Teams&nbsp;provide hubs for real time internal communication, leaving email just for interfacing with the outside world.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>- Consider using a different tool than email for communicating internally for day to day acitivities, reserving email for speaking with the rest fothe world\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>4.&nbsp;&nbsp;&nbsp;&nbsp; Make sure you are alerted if you, or your staff, have an account which is compromised in a data breach\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fd64c1fc67f69.png\">\u003Cp>Credit: HaveIBeenPwned\u003C\u002Fp>\u003Cp>Chances are you and all your staff members have had account details compromised.&nbsp; If you have a LinkedIn, Dropbox or Adobe account it’s almost certain.\u003C\u002Fp>\u003Cp>HaveIBeenPwned&nbsp;is a free service which allows you to monitor your personal and work emails, and gives you a detailed summary of which services have leaked account details linked to you.\u003C\u002Fp>\u003Cp>You may also use this to configure notifications for your personal\u002Fwork email addresses, or to automatically alert you if any of your staff have been compromised.&nbsp; This ensures they are able to change their compromised passwords quickly to minimise impact.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendations:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Set up monitoring for your own personal email addresses\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Use the&nbsp;Domain Search&nbsp;feature to receive notifications if any of your staff member email addresses are compromised\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>5.&nbsp;&nbsp;&nbsp;&nbsp; Use a password manager to securely store and share passwords, and sensitive information\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F458e280f0671.png\">\u003Cp>Credit: LastPass\u003C\u002Fp>\u003Cp>Password reuse across services, and using weak\u002Fguessable passwords, are a major reason why accounts are compromised.&nbsp; If HaveIBeenPwned has flagged a compromised account, and you’ve used the same password for that as other accounts in other services, you’re at high risk of compromise there too.\u003C\u002Fp>\u003Cp>All a malicious actor has to do is copy your known email\u002Fpassword combination from the breached service, and try in on other services, like LinkedIn, your bank account or your email account.&nbsp; This is called&nbsp;Credential Stuffing, and it’s dangerous because it’s easy.\u003C\u002Fp>\u003Cp>The easiest way to prevent this, is to use a unique password for every service you use.&nbsp; The best way to manage that is with a password manager.&nbsp; Then, you only need to remember one strong password (for your password manager), and the password manager will automatically create and save very strong passwords for all your other accounts.&nbsp;\u003C\u002Fp>\u003Cp>If you’re not using one already, set a target to start using one.&nbsp; As a brucey bonus, you’ll be able to share passwords amongst your team securely, no more sticky notes or emailing passwords.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Use one of the following services:\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>https:\u002F\u002Fwww.lastpass.com\u002F\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>https:\u002F\u002F1password.com\u002F\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>https:\u002F\u002Fwww.dashlane.com\u002F\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>https:\u002F\u002Fwww.okta.com\u002Ftopic\u002Fpassword-management\u002F\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>6.&nbsp;&nbsp;&nbsp;&nbsp; Enable Multi Factor Authentication (MFA) for everything\u003C\u002Fh2>\u003Cp>MFA means that to log into a service, you need a password, and&nbsp;\u003Cem>something else\u003C\u002Fem>&nbsp;to prove you are you.&nbsp; This is normally a phone app,&nbsp; physical device, or a code SMSed to you.\u003C\u002Fp>\u003Cp>MFA is a second line of defence, an attacker must compromise your password and a physical device to break into your account, which would be highly targeted and difficult.&nbsp; This looks like:&nbsp;\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F68471ba74f07.png\">\u003Cp>Credit: NIST\u003C\u002Fp>\u003Cp>Nearly every major service has this option, and this should be enabled ASAP.&nbsp; It will most likely be in your account settings, there is a LinkedIn example below:\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fce146d007846.png\">\u003Cp>You can pair this with a phone app like&nbsp;Authy&nbsp;to automatically generate codes for your accounts, these change every 30 seconds:\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fa077b9433e62.png\">\u003Cp>Credit: Authy\u003C\u002Fp>\u003Cp>When you pair this option with a physical&nbsp;YubiKey&nbsp;(which you plug in and press), you’ve got a really solid process for securing all of your accounts in a convenient way, especially combined with a password manager.\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F2b0f81f5379b.png\">\u003Cp>Credit: Yubikey\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendations:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Protect all services with MFA\u003Cbr>undefinedundefinedundefined\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Use&nbsp;Authy&nbsp;(or a similar app) to generate MFA codes\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Use&nbsp;YubiKey&nbsp;as a physical alternative to Authy (great if you lose access to your phone), and usually quicker than Authy\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Make it policy that all staff must do this for every service, naming business critical accounts which must be protected\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>You may read more on&nbsp;MFA at NIST here.\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>7.&nbsp;&nbsp;&nbsp;&nbsp; Enable device encryption for all devices\u003C\u002Fh2>\u003Cp>\u003Cbr>\u003C\u002Fp>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002Fbb0a190d3cd5.png\">\u003Cp>If a laptop was lost or stolen, what data\u002Faccess\u002Fcredentials would be on it which would cause you sleepless nights?\u003C\u002Fp>\u003Cp>Mitigate that risk by encrypting anything which leaves the office, and preferably everything which stays there too.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Microsoft, Android and Apple have made it super easy to encrypt devices, you may follow the guides below to achieve that:\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Android\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>iOS\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>MacOS\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Windows\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>8.&nbsp;&nbsp;&nbsp;&nbsp; Ensure all key files are backed up regularly and stored safely\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F4f7499293fd9.png\">\u003Cp>Credit: Dropbox\u003C\u002Fp>\u003Cp>Ransomware is an attack whereby the malicious actor encrypts all your data on your computer, and then blackmails you, usually restoring the data when you pay up.&nbsp;\u003C\u002Fp>\u003Cp>The internet is rife with horror stories, such as ‘Hackers steal data for 15 million patients, then sell it back to lab that lost it’ - imagine explaining that to your customers!\u003C\u002Fp>\u003Cp>If you have a shared network drive with no backup capability, and then one user with access is compromised, you are all toast.\u003C\u002Fp>\u003Cp>A quick way to resolve this may be to migrate your shared file system over to a cloud storage provider such as Dropbox, One Drive or Google Drive.\u003C\u002Fp>\u003Cp>Dropbox business provides 180 days version history, and the&nbsp;rewind&nbsp;feature allows you to revert whole files and folders to a previous point in time, so reversing the damage of a ransomware attack may be a trivial activity, if configured correctly.\u003C\u002Fp>\u003Cp>It should be noted that a cloud storage system in itself is not a backup solution, but if you have nothing now, this will be better than that.&nbsp; It will depend on your tolerance for risk, but if the data is business critical, consider backing that up into Amazon S3 or Backblaze.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>If you have no backup solution in place, start with a cloud storage provider for a quick solution, and seek advice from a professional IT company.\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>9.&nbsp;&nbsp;&nbsp;&nbsp; Avoid public Wi-Fi, or Wi-Fi networks you do not trust\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F58c2341a7aad.png\">\u003Cp>Credit: NCSC\u003C\u002Fp>\u003Cp>Open Wi-Fi networks create an easy opportunity for other parties to snoop.&nbsp; Under the right conditions, it is possible for another user to see everything you do.&nbsp; Sitting on airport or café Wi-Fi creates risk.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendations:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Only connect to networks you trust, and never a Wi-Fi network which requires no password\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>If you must connect to unsecured Wi-Fi, use a VPN which you trust\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Prefer tethering your phone, and connecting to the internet via 4G\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>10. Ban all removeable storage devices\u003C\u002Fh2>\u003Cimg alt=\"\" src=\"https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fblog\u002F56ba6eeae98e.png\">\u003Cp>USB storage creates 2 key risks:\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Transmission method for viruses\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>A loss of control of the data which is stored on them, who knows where it will end up.&nbsp;Edward Snowden famously ransacked the NSA with a USB thumb drive.\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>In today’s world, it’s easy to securely share data using cloud storage services, and they generally provide logs for auditing purposes.&nbsp; You could still encrypt this data before sharing when using cloud storage, to offer similar privacy as an encrypted USB.\u003C\u002Fp>\u003Cp>\u003Cstrong>Recommendation:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>- Ban the use of removable media throughout the business\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>Other Considerations\u003C\u002Fh2>\u003Cp>This article only tackles the easy wins, there will be value in also considering the following:\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>Ensuring all devices have firewalls and Anti-Virus enabled\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Ensure all key services are protected by a&nbsp;Virtual Private Network&nbsp;or&nbsp;Zero Trust security\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Ensure only trusted devices are used in your business. Staff working from home using personal devices creates risk, they are not likely as secure\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>Establish what your ‘Crown Jewels’ are, what data\u002Fservice MUST you protect at all cost, and what do you need to do to protect that?\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>If you have any internally created software, pen test this on a schedule\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>Will Working from Home change things?\u003C\u002Fh2>\u003Cp>It’s a sensible assumption that the answer is ‘Yes’.&nbsp; There are several avenues to consider:\u003C\u002Fp>\u003Cp>\u003Cstrong>Changes in climate create tension, and tension creates exploitable opportunities\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>NCSC has flagged an increase is COVID-19 related scams&nbsp;and phishing emails, scaring recipients to open malicious URLs and file attachments.\u003C\u002Fp>\u003Cp>\u003Cstrong>Working from Home may be new territory for some, security has been weakened\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Businesses new to this way of working, may not have mature policy and process for securely allowing staff to conduct their day to day activities from home.&nbsp; It’s a reasonable assumption that some businesses may have weakened their security to allow for this, such as bypassing VPNs or allowing use of personal devices.&nbsp; Businesses which have not before needed to securely share data in a remote way, may now need to.\u003C\u002Fp>\u003Cp>Risk in these areas must be considered, and mitigated, or businesses create avenues for exploitation.\u003C\u002Fp>\u003Cp>\u003Cstrong>We are communicating less in person, and more asynchronously and online\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>This creates opportunity for malicious actors to impersonate people of authority and socially engineer others into doing things they should not.&nbsp; A common scam right now is to trick staff into paying rogue invoices or handing over data, this may trend up.\u003C\u002Fp>\u003Cp>&nbsp;\u003C\u002Fp>\u003Ch2>Conclusion\u003C\u002Fh2>\u003Cp>Cyber security is hard.&nbsp; To be compromised, you only must get one thing wrong, and an attacker, one thing right.\u003C\u002Fp>\u003Cp>However, with some quick and simple steps, you’re able to help mitigate a lot of risk.\u003C\u002Fp>\u003Cp>\u003Cstrong>In summary:\u003C\u002Fstrong>\u003C\u002Fp>\u003Cul>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>Reduce impact of phishing\u002Fspear phishing attacks\u003C\u002Fstrong>\u003Cbr>undefinedundefinedundefined\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>Reduce impact of account hijacking\u002Funauthorised access\u003C\u002Fstrong>\u003Cbr>undefinedundefinedundefined\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>Reduce chance of unauthorised use\u002Faccess of devices\u003C\u002Fstrong>\u003Cbr>undefinedundefinedundefinedundefined\u003C\u002Fp>\u003C\u002Fli>\u003Cli data-preset-tag=\"p\">\u003Cp>\u003Cstrong>Reduce impact of ransomware\u003C\u002Fstrong>\u003Cbr>undefinedundefined\u003C\u002Fp>\u003C\u002Fli>\u003C\u002Ful>\u003Cp>\u003Cstrong>What next?\u003C\u002Fstrong>\u003C\u002Fp>\u003Cp>Has Cyber Security become more of a focus in your organisation?\u003C\u002Fp>\u003Cp>Feel free to reach out to us to send us your thoughts!\u003C\u002Fp>","Digital Strategy & Scaleup Growth","Anoushka Badola","2025-02-25T00:00:00+00:00",10,false,true,0,"2026-05-05T23:46:53.253267+00:00","2026-05-05T23:46:53.3+00:00",[19,96,173,247,321,395],{"id":20,"sort_order":21,"icon":22,"title":23,"slug":24,"tag":25,"tag_color":26,"headline":27,"description":28,"details":29,"image_url":35,"is_active":14,"created_at":36,"outcome_statement":37,"problem_heading":38,"problem_points":39,"benefits":44,"process_steps":57,"differentiators":70,"faq_items":80,"risk_mitigation":93,"testimonial_id":94,"secondary_image_url":95},"804df37c-c81d-4d70-8f61-e74f8ff19404",1,"🏗️","Tech Product Development","tech-product-development","Core Service","#4368fa","Turn your proven expertise into a market-disrupting platform.","We take the knowledge, processes, and IP that make your business exceptional and engineer it into a scalable tech product your customers can access directly - without you having to be in the room for every delivery.",[30,31,32,33,34],"Full-stack product engineering across web and mobile","Scalable cloud architecture designed for licensing and growth","UX & UI design that converts and retains users","Multi-year product roadmaps aligned to your commercial objectives","Ongoing iteration based on user behaviour and market feedback","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771581940383_Joey_Divya_Hoodies.png","2026-02-20T09:57:49.133845+00:00","Turn your proven expertise into a market-leading SaaS platform that generates recurring revenue.","Sound familiar?",[40,41,42,43],"Your revenue is capped by the number of people you can hire and the hours they can deliver","You've tried no-code tools or spreadsheets and hit a ceiling","Clients keep asking for a platform but you don't know how to build one","You know there's a product in your business but every conversation with dev agencies leaves you more confused",[45,48,51,54],{"label":46,"value":47},"Recurring revenue","Move from project-based billing to a scalable subscription model that compounds over time",{"label":49,"value":50},"Reduced founder reliance","A product that delivers value without business owners being personally involved in every engagement",{"label":52,"value":53},"Exit optionality","Tech businesses exit at 5–12x revenue vs 2–5x profit for service businesses",{"label":55,"value":56},"Market leadership","A platform their competitors can't easily replicate, built on your unique domain expertise",[58,61,64,67],{"label":59,"value":60},"Product architecture","We design the technical foundation - data model, integrations, user experience - so it scales from day one",{"label":62,"value":63},"Iterative build","Focused development sprints with regular demos. You see real progress every two weeks, not after twelve months",{"label":65,"value":66},"User testing","Real users on the platform early, giving feedback that shapes the product around actual behaviour",{"label":68,"value":69},"Launch & scale","We help you launch, onboard early adopters, and build the feedback loops that make the product get better over time",[71,74,77],{"label":72,"value":73},"B2B product specialists","We build B2B SaaS platforms - not websites, not apps. This is all we do and we're very good at it.",{"label":75,"value":76},"Outcome-obsessed","We measure success by your success metrics, not by lines of code",{"label":78,"value":79},"Long-term partner","We don't disappear after launch. We stay with you through scale, iteration, and growth.",[81,84,87,90],{"label":82,"value":83},"How long does it take to build a product?","A first release is typically 3–6 months after Discovery. We prioritise getting a valuable product in front of users fast, then iterate.",{"label":85,"value":86},"How much do I need to invest?","It depends on complexity, but we're transparent about investment up front. Discovery gives you a clear budget before you commit to Build.",{"label":88,"value":89},"Do we need a CTO or technical co-founder?","No. We act as your fractional product and technology team. You focus on the business and the market.",{"label":91,"value":92},"What technology do you use?","We have a highly scalable and proven stack that's already serving millions of users - this is Laravel, Vue & AWS, highly tuned by Wubbleyou to deliver performance. Our focus is on proven, scalable technologies that won't paint you into a corner.","We build iteratively with fortnightly demos - so you see real progress at every stage. Combined with Discovery, you never invest in Build without a validated plan. If something isn't working, we catch it in weeks, not months.","f111406d-2d2e-43d5-9d90-fd8ab1b2d95e",null,{"id":97,"sort_order":98,"icon":99,"title":100,"slug":101,"tag":102,"tag_color":103,"headline":104,"description":105,"details":106,"image_url":111,"is_active":14,"created_at":112,"outcome_statement":113,"problem_heading":38,"problem_points":114,"benefits":119,"process_steps":135,"differentiators":148,"faq_items":158,"risk_mitigation":171,"testimonial_id":172,"secondary_image_url":95},"5f0aedc2-2c9f-4ec4-b7a7-8f5d7f7560bc",2,"🧭","Discovery Journey","discovery-journey","De-risk First","#1fcce8","Shape the right problem before you spend a penny on building.","Our intense 6–8 week discovery process is designed to give you absolute clarity on what to build, for whom, and in what order. It's the most important thing we do -  and it typically saves clients 5 figures on product builds by eliminating the wrong assumptions early.",[107,108,109,110],"Stakeholder and user research interviews","Product blueprint and feature prioritisation","Technical scoping and architecture recommendations","Commercial model and pricing strategy validation","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771551490383_1721753344239.jpg","2026-02-19T21:21:26.524359+00:00","Building the wrong product is an expensive mistake - before investing a single penny in development.",[115,116,117,118],"You know there's a product in your business but you don't know where to start","You've had conversations with agencies before and left more confused than when you started","You're worried about building the wrong thing at the wrong time","Your team is too busy delivering to step back and think strategically about product",[120,123,126,129,132],{"label":121,"value":122},"Validated opportunity","A clear, evidence-based assessment of whether your product idea has legs - before you commit budget",{"label":124,"value":125},"Clear blueprint","A detailed product specification and technical roadmap you can take to any development partner",{"label":127,"value":128},"A prototype product","A product that you can actually use, showing how the user journey and product works",{"label":130,"value":131},"De-risked investment","Confidence that you're building the right thing for the right market, with the right approach",{"label":133,"value":134},"Aligned stakeholders","Everyone in the business understands the vision, the plan, and what success looks like",[136,139,142,145],{"label":137,"value":138},"Deep-dive sessions","We immerse ourselves in your business - your expertise, your clients, your operations - to understand what makes you different",{"label":140,"value":141},"Finding Value","We understand the value in your business, and work out what assets\u002FIP you have which translate well into productisation",{"label":143,"value":144},"Product definition","We define the core product - features, user journeys, technical architecture - in enough detail to build from",{"label":146,"value":147},"Blueprint delivery","You get a comprehensive blueprint: product spec, roadmap, and usable prototype - ready to act on",[149,152,155],{"label":150,"value":151},"Strategic, not just technical","We think about your business model, your market, and your exit - not just the technology",{"label":153,"value":154},"Founder-focused","We've guided dozens of service-led founders through this exact transition. We speak your language, not tech jargon",{"label":156,"value":157},"Genuinely de-risked","Discovery exists to protect you from the most expensive mistake in tech: building the wrong thing",[159,162,165,168],{"label":160,"value":161},"How long does Discovery take?","Typically 6–8 weeks. Intensive enough to be thorough, short enough to maintain momentum.",{"label":163,"value":164},"What do I get at the end?","A comprehensive product blueprint including specification, usable prototype, and a phased roadmap we can jointly act on immediately.",{"label":166,"value":167},"What if we already know what we want to build?","Even experienced founders benefit from Discovery. It pressure-tests assumptions, uncovers blind spots, and ensures you're building for your market - not just your instinct.  There can be a difference between what a founder wants, and what they need.  We are productisation experts, and we listen - you will see significant benefit when we take your ideas and thinking, and distil them with our own ability.",{"label":169,"value":170},"Can we skip Discovery and go straight to Build?","We always recommend it, but if you have an existing spec or have completed a thorough discovery elsewhere, we'll assess it honestly and tell you if it's ready. Our experience is that others do not do discovery as well as us for B2B tech products - we are very good at it.  If your existing spec has issues, we will be up front - if we like it, we'll be equally as up front!","Discovery is designed to be the lowest-risk entry point. You invest a fraction of a full build investment and together we create a validated plan - if you learn during discovery that this is not a viable strategy, we pivot - you're not locked into an expensive build","82fa0220-2d70-4be2-aca5-0c1e603086e2",{"id":174,"sort_order":175,"icon":176,"title":177,"slug":178,"tag":179,"tag_color":180,"headline":181,"description":182,"details":183,"image_url":189,"is_active":14,"created_at":112,"outcome_statement":190,"problem_heading":38,"problem_points":191,"benefits":196,"process_steps":209,"differentiators":222,"faq_items":232,"risk_mitigation":245,"testimonial_id":246,"secondary_image_url":95},"d6c3eb2c-929d-4662-8ad3-cdce5fe36bfe",3,"🤖","AI Augmentation","ai-augmentation","Competitive Edge","#22c55e","Implement AI, which actually works","We build AI that actually works inside your business and your product, and solves real world problems. We have a unique 'building block' approach, which means we start by solving small problems quickly, and build in time into safely solving big things.",[184,185,186,187,188],"Custom AI agent design and development","LLM integration (OpenAI, Anthropic, and others)","Internal workflow automation and intelligent routing","AI-assisted product features for your B2B platform","AI strategy and implementation roadmap","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771551565494_Mark_Divya_Emily_Joey.png","Embed AI into your product or operations to unlock efficiency gains your competitors can't match.",[192,193,194,195],"You know AI could help your business but you're overwhelmed by the hype and don't know where to start","You've seen competitors talk about AI and worry you're falling behind","Your team spends hours on repetitive tasks that feel like they should be automated","You're nervous about getting AI wrong - the wrong investment, the wrong approach, the wrong timing",[197,200,203,206],{"label":198,"value":199},"Competitive advantage","Capabilities your competitors don't have - embedded into your product or workflow, not bolted on",{"label":201,"value":202},"Operational efficiency","Automate the repetitive, high-volume work that consumes your team's time and energy",{"label":204,"value":205},"Scalable intelligence","AI that gets better as your data grows - a compounding asset, not a one-off tool",{"label":207,"value":208},"Practical, not theoretical","Working AI in your product within weeks, not a research project that never ships",[210,213,216,219],{"label":211,"value":212},"AI opportunity audit","We map your processes and product to identify where AI creates genuine value - not where it just sounds impressive",{"label":214,"value":215},"Proof of concept","A focused prototype that proves the approach works with your real data, before you commit to full integration",{"label":217,"value":218},"Production integration","We build the AI into your product or workflow properly - secure, scalable, and maintainable",{"label":220,"value":221},"Optimisation & learning","We monitor, tune, and improve the AI based on real usage data so it keeps getting better",[223,226,229],{"label":224,"value":225},"Practical, not hype-driven","We only recommend AI where it creates measurable value. If a simpler solution works better, we'll tell you.",{"label":227,"value":228},"Integrated, not bolted on","AI is built into your product architecture from the start - not a fragile add-on that breaks",{"label":230,"value":231},"B2B context experts","We understand B2B workflows, compliance requirements, and the practical constraints of real businesses",[233,236,239,242],{"label":234,"value":235},"Do we need a data scientist?","No. We handle the technical complexity. You bring the domain expertise and business context.",{"label":237,"value":238},"What kind of AI are we talking about?","It depends on the problem - document processing, intelligent automation, natural language interfaces, predictive analytics. We match the technology to the outcome.",{"label":240,"value":241},"Is our data good enough for AI?","Often yes, even if it needs work. It's the first thing we assess - as it's important we avoid a \"garbage in \u002F garbage out\" problem - if we believe a project will fail for this reason - we will be up front.",{"label":243,"value":244},"What about data privacy and security?","We take this seriously. All AI implementations follow data protection best practices, and we work with you to understand your needs to find the model and provider to provide the level of protection you need.","We start with a focused proof of concept using your real data - so you can see actual results before committing to full integration. Whilst theory is a part, it's not the result - our focus is on execution that makes a positive state change in your business. If AI isn't the right answer, we'll tell you before you spend a penny on it.","cb026b97-f41e-4d15-b17b-6d095fc36a47",{"id":248,"sort_order":249,"icon":250,"title":251,"slug":252,"tag":253,"tag_color":254,"headline":255,"description":256,"details":257,"image_url":263,"is_active":14,"created_at":112,"outcome_statement":264,"problem_heading":38,"problem_points":265,"benefits":270,"process_steps":283,"differentiators":296,"faq_items":306,"risk_mitigation":319,"testimonial_id":320,"secondary_image_url":95},"b195ddb0-5fc4-4b21-80b0-5ebf5d081fa2",4,"📊","Business Intelligence","business-intelligence","Clarity","#f59e0b","See your product performance, and make better decisions, faster.","What numbers must improve to achieve your 3–5 year goals? We create that clarity, build the integration layer to unify your data, and surface it in real-time dashboards that make the right decision obvious.",[258,259,260,261,262],"KPI definition and metric framework design","Data integration layer connecting your existing systems","Real-time executive and operational dashboards","Adoption and performance tracking for your tech product","Reporting infrastructure that scales as your business does","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771551590260_divya_joey.png","Get the visibility you need to make confident decisions - without waiting for someone to pull a report.",[266,267,268,269],"You're making important decisions based on gut feel because you can't get the data fast enough","Your numbers live in five different spreadsheets and nobody agrees on which one is right","You only find out about problems after they've already cost you money","Your board or investors want reporting you can't currently produce without days of manual work",[271,274,277,280],{"label":272,"value":273},"Real-time visibility","See how your business is performing right now - revenue, pipeline, operations - in one place",{"label":275,"value":276},"Confident decisions","Make strategic choices backed by data, not instinct. Faster decisions, fewer regrets.",{"label":278,"value":279},"Early warning systems","Spot problems before they become crises - pipeline drops, churn signals, delivery bottlenecks",{"label":281,"value":282},"Investor-ready reporting","Professional, automated reporting that tells the story your board and investors need to hear",[284,287,290,293],{"label":285,"value":286},"Data audit","We map your data landscape - where it lives, what shape it's in, and what questions you most need it to answer",{"label":288,"value":289},"Architecture & design","We design a data architecture that brings your information together and makes it queryable and reliable",{"label":291,"value":292},"Dashboard build","We build the dashboards and reports you actually need - focused on decisions, not vanity metrics",{"label":294,"value":295},"Training & handover","We make sure you and your team can use, trust, and extend the system independently",[297,300,303],{"label":298,"value":299},"Designed for founders, not analysts","We build dashboards that answer business questions, not ones that require a data degree to interpret",{"label":301,"value":302},"Actionable, not academic","Every metric we surface is connected to a decision you can make or an action you can take",{"label":304,"value":305},"Integrated into your workflow","BI that lives where you work - not another tool you have to remember to check",[307,310,313,316],{"label":308,"value":309},"What data sources can you work with?","Almost anything - CRM, accounting, project management, spreadsheets, databases, APIs. If it holds data, we can likely connect it.",{"label":311,"value":312},"Do we need a data warehouse?","Sometimes, but not always. When we build a product with you, we handle this by default, so it's not something you need to worry about.",{"label":314,"value":315},"How long until we see results?","First dashboards are typically live within 4–6 weeks. We start with your highest-value questions and build outward.",{"label":317,"value":318},"Can our team maintain this themselves?","That's the goal. We build for handover, not dependency. Training and documentation are included.","We start with your highest-value questions and build outward - so you get actionable insights from day one, not after a six-month data warehousing project. If your data isn't ready, we'll tell you honestly and help you fix it first.","b05514e7-0f31-409b-8291-e25115729052",{"id":322,"sort_order":323,"icon":324,"title":325,"slug":326,"tag":327,"tag_color":328,"headline":329,"description":330,"details":331,"image_url":337,"is_active":14,"created_at":112,"outcome_statement":338,"problem_heading":38,"problem_points":339,"benefits":344,"process_steps":357,"differentiators":370,"faq_items":380,"risk_mitigation":393,"testimonial_id":394,"secondary_image_url":95},"cd8895d6-704d-48d2-adad-7c1afc0d80fb",5,"⚙️","Internal Platform Layer","internal-platform-layer","Foundation","#8b5cf6","Build the internal engine that powers your external product.","Productisation without an internal layer creates new chaos. We build the automation, workflow standardisation, and internal tooling that supports your external product - so that as volume grows, your team's effort doesn't grow at the same rate.",[332,333,334,335,336],"Business process analysis and workflow mapping","Automation of repetitive internal operations","System integration across your existing tech stack","Internal tools purpose-built for your team's workflows","The foundation that makes your external product financially viable at scale","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771551603740_Emily.png","Replace the spreadsheets and manual processes holding your business back with a platform that scales with you.",[340,341,342,343],"Your operations run on spreadsheets, email chains, and tribal knowledge that only you understand","You can't delegate confidently because there's no system - just people who know how things work","Every new hire takes months to get productive because nothing is documented or systematised","You've looked at off-the-shelf tools but nothing fits how your business actually operates",[345,348,351,354],{"label":346,"value":347},"Operational clarity","A single source of truth for your core processes - visible, measurable, and not dependent on any one person",{"label":349,"value":350},"Confident delegation","Systems that let your team deliver to your standard without you being in every decision",{"label":352,"value":353},"Scalable operations","Grow your business without proportionally growing your headcount or your stress levels",{"label":355,"value":356},"Founder freedom","Step back from day-to-day operations knowing the business runs to the standard you set",[358,361,364,367],{"label":359,"value":360},"Process audit","We map how your business actually works - not how it should work on paper, but how it runs in reality",{"label":362,"value":363},"Platform design","We design an internal platform that fits your workflows, your team, and your growth plans",{"label":365,"value":366},"Build & rollout","We build iteratively and roll out in phases - so your team adapts gradually, not all at once",{"label":368,"value":369},"Training & embedding","We make sure your team actually uses it. Training, documentation, and ongoing support until it's second nature",[371,374,377],{"label":372,"value":373},"Built for service businesses","We understand the operational challenges of service-led businesses - because that's all we work with",{"label":375,"value":376},"Designed for operators","Built around how your team works, not how a software vendor thinks they should work",{"label":378,"value":379},"Pragmatic, not perfect","We build what you need now and design for what you'll need next - no over-engineering, no bloat",[381,384,387,390],{"label":382,"value":383},"Is this like an ERP system or CRM?","It can be, but it doesn't have to be. We aren't interested in re-inventing platforms which already do a good job.  We recommend those platforms instead, and focus on building a layer which connects it all together, or solving problems those tools don't.",{"label":385,"value":386},"How disruptive is the transition?","We design for minimal disruption. Phased rollouts, parallel running, and hands-on training mean your business keeps operating while the new system beds in.",{"label":388,"value":389},"What if our processes change?","They will - and that's fine. We build flexible systems designed to evolve with your business, not lock you into today's way of working.",{"label":391,"value":392},"Can this integrate with tools we already use?","Yes. We build to integrate with your existing tools wherever it makes sense - no rip-and-replace required.","We design for how your business actually works - not how a software vendor thinks it should. Phased rollouts mean you never risk your entire operation on a big-bang switch. And because we build iteratively, you see and approve every step before it goes live.","0cf87d40-6d19-4a7d-b2e0-fe82d42107dc",{"id":396,"sort_order":397,"icon":398,"title":399,"slug":400,"tag":401,"tag_color":402,"headline":403,"description":404,"details":405,"image_url":411,"is_active":14,"created_at":112,"outcome_statement":412,"problem_heading":38,"problem_points":413,"benefits":418,"process_steps":431,"differentiators":444,"faq_items":454,"risk_mitigation":467,"testimonial_id":394,"secondary_image_url":95},"f4bf1e19-4a12-4e43-8d60-bb1d6ca9f9ab",6,"🛡","Support & Maintenance","support-maintenance","Long-term Partnership","#64748b","Your product in safe hands, permanently.","Business-critical products need business-critical support. Once your platform is live, our team stays with it - handling security, scalability, disaster recovery, bug resolution, and the ongoing technical care your users rely on.",[406,407,408,409,410],"Continuous security monitoring and vulnerability management","Performance optimisation and scalability management","Disaster recovery planning and incident response","Bug resolution and quality assurance","Infrastructure and hosting management","https:\u002F\u002Fnqvtgsnvkuompyhdclct.supabase.co\u002Fstorage\u002Fv1\u002Fobject\u002Fpublic\u002Ffiles\u002Fservices\u002F1771551647029_Lee_and_Mark_CA.jpg","Keep your product secure, stable, and evolving - without building an in-house dev team.",[414,415,416,417],"Your product is live but the agency that built it has moved on - and you're not sure who's looking after it","You worry about security vulnerabilities but don't have the technical expertise to assess them","Users are requesting features and fixes but you can't iterate fast enough to keep them happy","You're spending more time managing your technology than growing your business",[419,422,425,428],{"label":420,"value":421},"Peace of mind","Know that your product is monitored, maintained, and secure - without it being your problem to manage",{"label":423,"value":424},"Continuous improvement","Regular updates and feature releases that keep your product competitive and your users engaged",{"label":426,"value":427},"Security confidence","Proactive security updates, vulnerability monitoring, and best-practice infrastructure management",{"label":429,"value":430},"Expert on call","A technical team that knows your product inside out, available when you need them",[432,435,438,441],{"label":433,"value":434},"Technical audit","We assess your current codebase, infrastructure, and security posture - whether we built it or someone else did",{"label":436,"value":437},"Support agreement","A clear, transparent support plan tailored to your product's needs and your budget",{"label":439,"value":440},"Ongoing development","Regular sprints to ship fixes, features, and improvements - keeping your product moving forward",{"label":442,"value":443},"Quarterly reviews","Strategic check-ins to assess product health, plan upcoming work, and align on priorities",[445,448,451],{"label":446,"value":447},"We built it or we'll learn it","Whether we built your product originally or inherited it, we take full ownership and accountability",{"label":449,"value":450},"Proactive, not reactive","We don't wait for things to break. Monitoring, updates, and improvements happen continuously.",{"label":452,"value":453},"Strategic partner, not helpdesk","We think about where your product should go next - not just what's broken today",[455,458,461,464],{"label":456,"value":457},"What are your response times?","It depends on the support tier, but critical issues are typically acknowledged within hours. We'll agree SLAs that match your needs.",{"label":459,"value":460},"Can you work on code someone else built?","Yes. We regularly take over products built by other teams. The technical audit gives us - and you - a clear picture of what we're working with.",{"label":462,"value":463},"What's included in support?","It varies by plan, but typically: bug fixes, security updates, performance monitoring, minor feature work, and regular communication. We'll tailor it to your needs.",{"label":465,"value":466},"Is there a minimum commitment?","We typically work on rolling quarterly agreements. Long enough to be effective, flexible enough that you're never locked in.","We start every engagement with a thorough technical audit - so we understand your codebase before making any changes. No surprises, no guesswork. And our rolling agreements mean you're never locked into a long-term contract that isn't working."]