about us

we're here for you



why exactly do so many people find it difficult to grasp the concept of cyber security?  we think it's because technology is moving too quickly to keep up with, that we all just bury our heads in the sand with it.  


that may be true, but truth be told, it's not really that difficult to catch up with and actually make yourself secure.  looking at daily life, you lock your door when you leave, yeah?  how about we lock down our digital accounts when we leave them?​


open source guardian was created to give everyone a chance to understand the ins and outs of the cyberverse (cyber universe if that wasn't clear).  we'll be doing the heavy lifting by understanding all the aspects of cyber security and translate it into things much more understandable.  


let's face it, anyone who has ever spoken to an IT guy tends to drift off because we don't understand, or even care, about what they are telling us.  that's not to say it's not interesting or important - we just only care about the end result.  we don't necessarily give too much thought to how things work under the hood.




who we help


Corporate

Your business needs a proper defence.  There are many things to consider when setting things up.  Don't panic though, we're here to help.

Education

Knowledge is power.  So we aim at the source and guide students through comprehensive and easy-to-grasp training to properly protect themselves.  


Individual

It might not seem it, but Cyber Security is a personal thing.  Over 90% of attacks are caused by human error, so the individual needs to be armed correctly.

our process



business as usual isn't really our thing, and it's not in our best interest to provide you something that you didn't ask for or need.  therefore, we've stripped things back to the essentials and then can build things up from there.



step 1

discovery.  we need to know what the problem is.  this could be something that has happened before, or you're trying to prevent an issue from happening (smart move, by the way).  we'll consult with you to establish some goals and go from there.


step 2

implementation.  once we've established some goals, we need to get to work achieving them.  there are several ways to do this, from user training to simulated phishing tests, but it does determine the results of step 1.  


step 3

monitoring.  once we've implemented the tools to achieve your goals, we don't leave you hanging.  we're here for the long haul.  cyber security is only as good as we make it.  with the pace that it moves, we'll all be left behind if we leave it for even a day.  therefore, we keep on top of things.


step 4

relaxation... sort of.   we've got everything up and running, and all is going well, but we don't take our foot off the pedal.  whilst it feels like the pressure is off, we're constantly in the background keeping up to date with what is going on.  however, you're free to relax for us with the knowledge that you're more secure than you were yesterday.