of large organisations within the UK have suffered a security breach


The average cost of a breach to large organisations in the UK


of large organisations have been attacked by unauthorised outsiders


of large organisations haven’t carried out any form of security assessment

Facts and figures taken from UK government information security breaches survey 2015

Logically Secure – trusted business-orientated technical security consultancy

We are passionate about what we do and how we do it. We live and breathe security, technology and bring our tenacity, vigour and enthusiasm to every engagement.

Logically Secure was founded in 2006 to provide penetration testing services to the music industry, computer game organizations and technical advice to HMG departments.

We are passionate about what we do and how we do it. We live and breathe security, technology and bring our tenacity, vigor and enthusiasm to every engagement.

Our services are personally configured, designed around you and delivered by the person who scoped the work.  We are still small enough to be agile and dynamic as we offer a bespoke service to several of the world’s largest technical and engineering based companies.

We never cookie-cut our service and every engagement is just as important to us as your security is to you.

Logically Secure Digital Forensics and penetration testing

Digital Forensics & Incident Response

We pride ourselves on being able to help organisations from SMEs to multi-national corporations during all stages of the cyber incident management lifecycle.

Our Digital Forensic and Incident Response consultants can assist you through all stages of the incident lifecycle, from management through to deep dive forensics and analysis. We don’t judge your IT skills, efforts and infrastructure, we focus on securing your environment instead.

  • Identifying the attackers’ entry point.
  • Identifying vulnerable and compromised systems.
  • Addressing the immediate breach issues.
  • Gathering evidence relating to the attack.
  • Imaging systems (disk and RAM) to snapshot the systems allowing for analysis.
  • Deploying sensors and collectors to gather network evidence.
  • Identifying malware and rootkit installations.
  • Communicating all this to management so they actually understand the risks and scope.
  • Planning to prevent further compromises.

If you’re experiencing a breach, or have experienced a breach, and our looking to mitigate future risks to your organisation, then get in touch today to see how Logically Secure can help you!

The concept for CyberCPR was driven by Logically Secure’s need to efficiently collaborate, plan and support their clients. We found that email and spreadsheets were too heavily relied upon, which often leads responders and executives to miss out on getting crucial information they need fast and in a centralised location.

By centralising evidence and incident related information, teams can operate faster and more efficiently resulting in quicker incident remediation and reduced organisational risk.

The brainchild of Steve Armstrong, a SANS Certified Instructor and former RAF Provost Officer, it’s been architected and developed with the help of Mike Antcliffe and Ed Tredgett.

Download a FREE Trial Today! 

Cyber CPR. Incident Management and Response

Security Services

Logically Secure have highly skilled consultants with a diverse range of skill sets that have helped organisations big and small identify the risks, as well as simulate attacks they may be exposed to. We pride ourselves on the relationship we have built with our clients. At Logically Secure we also assist in continuing to help our clients build a greater awareness of the risks associated with the changing demands of their organisation.

£1.46m – £3.14m

£75k – £311k

average costs of large (top) and small (bottom) organisations that have suffered a security breach


of the worst security breaches were caused partly by senior management giving insufficient priority on security

  • Network Vulnerability Assessments
  • Network Penetration Testing
  • Wireless Security Assessment
  • Wireless Penetration Testing
  • Web Application Penetration Testing
  • Web Application Security Audits
  • Mobile Application Security Assessments
  • Code Review
  • Database Security
  • Regulatory Compliance

Contact us


+44(0) 1242 220040

Logically Secure Ltd

Festival House



GL50 3SH

Don’t wait until you’re the next victim. Be proactive and protect your organisation!

Your Name (required)

Your Email (required)

Company Name

Telephone Number

Enquiry Type (required)

Your Message (required)

Latest on the Blog

December 17, 2015 in Conference

Infosecurity 2015 Presentation

Thank you to everyone who attended Steve’s presentation at Infosec on Tuesday 2 June, it was good to see you there and we hope you gained some valuable information. For those…

Read More
December 17, 2015 in Security, Testing

Crack a WPA key using just the client device

This short video demonstrates how it's possible to gain a WPA handshake and perform offline attacks against it using just the client. Read More