Cyber Resource
Our Cyber tools can help you achieve Cyber Essentials, Cyber Assurance, GDPR compliance, and ISO 27001 for you business.

Free Tool
Assets Register
Track and manage all your organisational assets in one central register. Know what you own, where it is, who's responsible, and when it needs updating. Essential for Cyber Essentials, ISO 27001, and good security practice.
What You Get:
- ✓Hardware asset tracking (laptops, servers, mobile devices)
- ✓Software inventory (applications, licenses, versions)
- ✓Data asset classification
- ✓Owner & location tracking
- ✓Patch status monitoring
- ✓Risk assessment per asset
- ✓Disposal & lifecycle management
- ✓Export reports for audits
Saves 15+ hours of manual spreadsheet management

Free Tool
Information Asset Register
Document and classify all information assets in your organization. Track data locations, sensitivity levels, owners, and retention requirements. Essential for GDPR Article 30 records and ISO 27001 asset classification requirements.
What You Get:
- ✓Data asset inventory & classification
- ✓Information sensitivity levels (Public, Internal, Confidential, Restricted)
- ✓Personal data identification (GDPR compliance)
- ✓Data owner & custodian tracking
- ✓Storage location mapping
- ✓Retention period management
- ✓Access control requirements
- ✓Export for GDPR/ISO 27001 audits
Saves 20+ hours of manual documentation

Free Tool
Company Policy Generator
Create professionally-written security and compliance policies. Covers Information Security, Data Protection, Acceptable Use, Remote Working, Incident Response, and more. All policies aligned with Cyber Essentials, ISO 27001, and GDPR.
What You Get:
- ✓15+ policy templates (Information Security, Access Control, BYOD, etc.)
- ✓Cyber Essentials & ISO 27001 aligned
- ✓GDPR-compliant data protection policies
- ✓Customisation guides & implementation notes
- ✓Multiple formats (PDF, Word, Markdown)
- ✓Regular updates when regulations change
- ✓Policy review schedule recommendations
- ✓Staff acknowledgment forms included
Saves 40+ hours of policy writing

Free Tool
Security Risk Assessment
Identify, evaluate, and manage security risks across your organization. Built-in risk frameworks, likelihood and impact scoring, treatment planning, and residual risk tracking. Required for ISO 27001, IASME, and demonstrating security due diligence.
What You Get:
- ✓Pre-loaded threat library (cyber, physical, human)
- ✓Likelihood & impact matrix
- ✓Automatic risk scoring (Low, Medium, High, Critical)
- ✓Risk treatment planning (Accept, Mitigate, Transfer, Avoid)
- ✓Control effectiveness tracking
- ✓Residual risk calculation
- ✓Risk register exports for audits
- ✓ISO 27001 Annex A mapping
Saves 15+ hours per risk assessment

Free Tool
User Access Management
Manage users, track MFA adoption, monitor inactive accounts, and maintain access controls. Essential for Cyber Essentials User Access Control requirements and demonstrating proper identity management.
What You Get:
- ✓User account tracking & lifecycle management
- ✓MFA enrolment monitoring (mandatory for cloud)
- ✓Role-based access control (User, Manager, Admin)
- ✓Inactive account detection (>90 days)
- ✓Privileged account separation tracking
- ✓Access review scheduling & records
- ✓Compliance dashboards & reports
- ✓Export audit evidence
Saves 5+ hours per month on access management

Free Tool
Business Continuity Plan Generator
Create a comprehensive business continuity plan in hours, not weeks. Identify critical business functions, assess impact, define recovery strategies, and document procedures. Required for ISO 27001, IASME Cyber Assurance, and resilient operations.
What You Get:
- ✓Business Impact Analysis (BIA) framework
- ✓Critical function identification
- ✓Recovery Time Objective (RTO) planning
- ✓Recovery Point Objective (RPO) definition
- ✓Emergency response procedures
- ✓Communication plans & contact lists
- ✓Testing & maintenance schedules
- ✓Export in professional format
Saves thousands in consultancy fees

Free Tool
Legal Document Generator - Coming Soon
Create GDPR-compliant Privacy Policies, Cookie Policies, Terms & Conditions, and Acceptable Use Policies in 15 minutes. Answer a few questions, download professional documents in multiple formats.
What You Get:
- ✓Privacy Policy (GDPR/UK DPA 2018)
- ✓Cookie Policy (PECR compliant)
- ✓Terms & Conditions
- ✓Acceptable Use Policy
- ✓Export in PDF & Markdown
- ✓Implementation guidance included
Saves thousands in legal fees

Free Tool
Security Incident Management - Coming Soon
Track, manage, and report security incidents with a professional incident response system. GDPR breach notification support included.
What You Get:
- ✓Incident logging & tracking
- ✓Severity classification
- ✓GDPR breach notification templates
- ✓Timeline visualisation
- ✓Stakeholder communication
- ✓Lessons learned capture
Enterprise incident management