// Solutions

START WITH
YOUR SITUATION.

Every business is different. These briefs are written around the problems we're most often asked to solve — find yours and see exactly how we'd approach it.

01
New Company
02
M365 Security
03
Google Workspace
04
Defence Sector
05
Cyber Essentials
06
After an Incident
07
Strategy Review
01
Starting Up

I'M SETTING UP
A NEW COMPANY.

// Get security right from day one — not retrofitted later

Most founders treat security as something to fix later. The problem is that "later" usually means after a contract is lost, an investor due diligence surfaces a gap, or an incident forces the issue. The cost — financial, reputational, and operational — is always higher when it's reactive.

We work with new businesses to build the right security foundation from the start. That means deploying a properly hardened cloud environment, establishing baseline policies, achieving the certifications your customers and partners will expect, and embedding security into the way you operate — not bolted on as an afterthought.

We understand the constraints of an early-stage business. Our approach is proportionate to your stage and budget — giving you what you need now, and a clear path to scale as you grow.

Talk to Us About Your Setup
// What We Typically Do
VANGUARD — Free M365 health check to baseline your current posture before we build on it
MIDAS Micro / Micro+ — Proactive hardening and managed security for your M365 environment, sized for early-stage headcount
Cyber Essentials certification — Often the first thing customers and investors ask for; we get you there fast
View All Services →
// Client Example

shadowlink, a newly launched dual-use defence tech company, had a fully hardened Microsoft 365 environment live on day one and Cyber Essentials certification within the week.

Read the case study →
02
Microsoft 365

I WANT TO IMPROVE
MICROSOFT 365
SECURITY.

// The most common starting point — and the biggest unmanaged risk

Microsoft 365 is where most businesses run: email, documents, collaboration, identity. It's also where most cyber incidents start. Default configurations leave significant attack surface exposed — phishing, identity compromise, lateral movement, and data exfiltration all flow through a poorly secured M365 tenancy.

The problem isn't usually a lack of tools — Microsoft 365 includes powerful security capabilities at most licence levels. The problem is configuration and ongoing management. Most IT providers aren't security specialists, so these settings sit at default — or get configured once and never reviewed.

We assess your current M365 posture, identify the highest-risk gaps, harden your configuration against Microsoft and NCSC best practice, and then manage it continuously — updating controls as your environment changes and as new threats emerge.

Arrange free M365 assessment
// What We Typically Do
VANGUARD — Free tenant configuration review that shows you exactly where you stand before any commitment
MIDAS — Proactive hardening, 24/7 detection and response, email security, device monitoring, phishing simulations and DLP — scaled to your team size
ATLAS (optional add-on) — For organisations where M365 is part of a broader estate including on-prem systems, OT, or other cloud platforms
Explore MIDAS Tiers →
03
Google Workspace

I WANT TO IMPROVE
GOOGLE WORKSPACE
SECURITY.

// Security-by-default isn't the same as security-by-design

Google Workspace is a secure platform — but that doesn't mean your configuration is secure. Default admin settings, over-permissioned third-party app integrations, weak MFA enforcement, and unmonitored sharing permissions leave most Workspace tenants significantly more exposed than their administrators realise.

We assess your Workspace environment against Google and NCSC best practice — reviewing identity controls, admin policies, app permissions, data sharing settings, and device trust configurations. We then harden the environment and establish ongoing monitoring so you have visibility of what's happening inside your tenancy.

For businesses running Workspace alongside other infrastructure, our ATLAS SIEM/SOAR service can ingest Workspace logs alongside other data sources — giving you a unified view across your whole estate.

Book a Workspace Assessment
// What We Typically Do
Workspace Configuration Review — Deep assessment of your admin console, identity settings, app integrations, and sharing policies
Hardening & Remediation — We implement fixes directly, not just a list of recommendations for your team to work through
ATLAS — SIEM/SOAR integration for ongoing monitoring and detection across Workspace and the rest of your estate
EXPERTIS — Strategic advisory if you need a security framework built around your Workspace-centric environment
04
Defence Sector

I WANT TO ENTER
THE DEFENCE
SECTOR.

// Meet the MOD's requirements — and prove it

Winning defence contracts requires demonstrating you meet the MOD's Cyber Security Model (CSM v4) and, increasingly, Defence Cyber Certification (DCC) at the appropriate level. These requirements apply across the supply chain — prime contractors, sub-contractors, and specialist suppliers alike.

Understanding what's required at each Cyber Risk Profile level, which controls you already have in place, and what gaps need closing is where most businesses get stuck. The framework is detailed, the requirements are technical, and the consequences of getting it wrong range from losing a bid to failing a contract audit.

Our AEGIS service is specifically designed for this. Our team includes experts who contributed to building the MOD's own cyber security requirements — we understand the framework from the inside, which means we help you navigate it efficiently without over-engineering your compliance posture.

Visit the Defence Site ↗
// AEGIS — What We Cover
CSM Readiness Assessment — Free assessment to map your current position against CSM v4 requirements and identify the path forward
CSM Level 0–3 compliance — Full programme delivery from entry-level through advanced compliance, sized to your contract requirements
DefStan 05-138 alignment — Technical controls and documentation mapped to defence standard requirements
SC / DV cleared team — Engagement with cleared personnel where your programme requires it
Free CSM readiness tool ↗
05
Compliance

I NEED TO BE
CYBER ESSENTIALS
COMPLIANT.

// The certification customers, insurers and government buyers require

Cyber Essentials is the UK government's baseline cyber security certification — and increasingly a non-negotiable requirement for public sector contracts, supply chain onboarding, and cyber insurance. Cyber Essentials Plus adds an independent technical assessment layer, required for higher-assurance contexts including many government and defence engagements.

The certification tests five technical controls: firewalls and internet gateways, secure configuration, user access control, malware protection, and patch management. Getting there isn't just about answering a questionnaire — it's about having those controls properly in place and evidenced.

Arrange gap analysis
// What We Typically Do
MIDAS Micro+ or Complete — Includes Cyber Essentials and CE Plus readiness as a built-in tier feature, not a separate engagement
Gap remediation — We fix the technical gaps directly rather than leaving you with a to-do list
Certification support — Guidance through the assessment process with our partner certification body or one you choose
06
Incident Recovery

WE HAD AN
INCIDENT. NOW
WE NEED A PLAN.

// Recovery, closure, and making sure it doesn't happen again

A cyber incident — whether ransomware, business email compromise, data breach, or account takeover — leaves three things behind: operational disruption, unanswered questions, and a security posture that's no longer fit for purpose.

Most businesses in the immediate aftermath are focused on getting back up and running. The harder questions come later: what exactly happened, how did they get in, what did they access, and what do we need to change? Without answers to those questions, the conditions that allowed the incident remain in place.

We support post-incident recovery by helping you understand what happened, closing the gaps that were exploited, and building a security posture that's hardened against recurrence. We don't just restore what you had — we help you build something better from the position you're now in.

Talk to Us Now
// What We Typically Do
Post-incident review — Understanding what happened, the initial access vector, scope of compromise, and what was accessed or exfiltrated
Gap remediation — Closing the specific controls that failed, plus a broader hardening of the estate to reduce ongoing risk
MIDAS — Ongoing managed security to ensure you have detection and response capability going forward
EXPERTIS — Strategic advisory to rebuild your security programme with board-level confidence — particularly important where insurers, regulators or clients require evidence of improved posture
// If you're mid-incident

If you're dealing with an active incident, email us directly at asksecurity@nova-blue.net and mark your message urgent. We'll respond as a priority.

07
Strategic Review

WE NEED A FRESH
LOOK AT OUR
STRATEGY.

// Clarity on where you are, where you need to be, and how to get there

Cyber security programmes drift. Tools accumulate, policies go stale, team structures change, the threat landscape evolves. What made sense two years ago may no longer reflect your actual risk — and a board or investor audience increasingly demands evidence that it does.

A strategic review gives you a structured, evidenced picture of your current security maturity against a recognised framework — and a prioritised, actionable roadmap to close the gaps. It's not a compliance exercise. It's a practical tool for making better security decisions and communicating your posture with confidence.

Our EXPERTIS advisory service is delivered by former GCHQ, MOD and military cyber experts. We've operated at the highest levels of government security — which means we bring a different calibre of judgement to what "good" actually looks like, and what matters most for organisations at your stage.

Explore EXPERTIS
// What We Typically Do
Cyber Security Maturity Assessment — Structured evaluation against NCSC CAF, NIST CSF, or ISO 27001 — producing a clear, evidenced picture of your current state
Strategy Development — Multi-year roadmap tied to your business objectives, risk appetite, and regulatory environment — with a board-ready reporting pack
Fractional CISO — Ongoing strategic security leadership without the full-time cost — particularly valuable around fundraising, due diligence, or regulatory scrutiny
Table-top Exercising — Test your team's real readiness to respond before an incident forces the question
// Not Sure Where to Start?

YOUR FIRST CONVERSATION
IS FREE.

Tell us where you are and what's driving the need. We'll tell you honestly what we'd do — and whether we're the right fit.

Book a Free Assessment