Send us a message
and we'll get back
to you shortly



Information security is about ensuring the confidentiality, integrity and availability of your information assets.

You must be able to identify and locate those assets and put in place suitable measures to protect them from external or internal threats. Cyber security forms part of this strategy. However, deploying tools to protect from cyber threats will not mitigate the risks to information assets that are located away from this protection. Information stored on personal devices for convenience creates vulnerabilities for example. Users are also integral to security, they need to understand the risks and recognise the threats. This then represents a holistic approach to security.

Managed it security service

There are a number of key elements that form the foundation of any security service; anti-virus, malware, web content filtering, patching and e-mail filtering. On Line’s managed IT security service includes all of these as standard. Firewalls are also fully locked down and monitored.

Security Operations Centre (SOC)

A 24/7 service that monitors all devices and will detect and intercept any unexpected behaviours on your infrastructure. Processes are stopped and quarantined and the SOC will take steps to remediate any issues 24/7.

Cyber security services

Cyber Essentials and Cyber Essentials Plus are cyber security standards set out by the National Cyber Security Centre (NCSC) which is part of GCHQ. They are recognised by the Information Commissioners Office (ICO) and we benchmark our cyber security services against them.

IT User awareness training

Users are a weakness in any organisation especially if they are not aware of the risks they are taking with your information assets. Phishing and spoofing, amongst others, are targeted at the users for this very reason. Awareness training for your staff can greatly improve the security of your systems.

IT Security audits

The cyber security threats are constantly evolving and seeking new vulnerabilities in your systems. An IT security audit will highlight any weaknesses and prompt remedial action. Security audits are not a one-off and should be carried out regularly.

ISO 27001 guidance and support

ISO 27001 is an international standard in Information Security. It is a challenging standard to meet and involves all areas of the business. On Line Computing has the expertise to guide and support you through your Information Security journey.

Information Assets

All businesses have information assets ranging from confidential to publicly available. Identifying these assets correctly is key to protecting them and ensuring that your Information security strategy is fit for purpose.


The General Data Protection Regulation was written into the UK statute book coming into force in May 2018. It places responsibility on organisations to identify, manage, protect, use correctly and ensure accuracy of personal identifiable information (PII). We can advise on a suitable management system and appropriate technical controls for you to comply with this legislation.