Plain-English cyber, IT, and AI for small charities & SMEs

We fix what's broken, harden what's fragile, enable safe AI. Your consultant-teacher who simplifies complex tech into secure, usable systems.

Secure defaults

Like locking the office and the filing cabinet

Board-ready evidence

Clear reports that trustees understand

Staff confidence

Training that sticks, not technical jargon

Simple language

Plain UK English, no hype or buzzwords

Book a free 20-min consult

Four ways we help

Recover

Incident response. Regain control without blame.

Learn more →

Secure

Hardening & compliance. Build strong foundations.

Learn more →

Enable

Bespoke AGI consultation. Tailored to your needs.

Learn more →

Empower

Training & advisory. Build internal capability.

Learn more →

About Secure and Restore

Your consultant-teacher for cyber, IT, and AI challenges

Our mission

Simplify complex IT, cyber, and AI into secure, usable systems for organisations without internal expertise.

Our values

Clarity

Plain English, no jargon

Compassion

Understanding your pressures

Security

Protection that actually works

Enablement

Building your capability

Integrity

Honest advice, fair pricing

How we work

We're teachers and translators, not just implementers. We fix the problem, show you how it works, then hand back control.

Clear boundaries

We provide advisory services only. We're not an MSP and don't offer 24/7 support.

Where we work

Based in South West UK, serving charities and SMEs who need practical cyber, IT, and AI guidance.

Book a free 20-min consult

Recent success story

Youth Community Project

Regained control after compromise. ~2,000 bot accounts removed, domain restored, logging enabled, data recovered.

Result: Tenant secured in 48 hours. Board brief delivered.

Read full case study →

Recover: Incident Response

Breach or compromise? Need control without blame? We help you stabilise quickly.

What we do

  • Containment - stop the spread
  • MFA setup - secure the accounts
  • Conditional Access - control the access
  • Licence/bot clean-up - remove the noise
  • Data recovery - get back what matters
  • Insurer-friendly evidence pack - for your claims
  • 7-day stabilisation - breathing space to plan

Outcomes you'll see

  • Clear time-to-contain metrics
  • All accounts secured and documented
  • Critical data restored where possible
  • Board-ready incident brief

What's not included

  • No 24/7 hotline
  • Deep forensics needs separate scope

Change control: Extras via Change Request; Mini-SOW if ≤3 days.

Request a Rapid Assessment

Secure: Hardening & Compliance

Build strong foundations. Cyber Essentials prep in plain English.

What you get

  • MFA across all critical systems
  • Least privilege access controls
  • Patching cadence that actually works
  • Joiner-mover-leaver process flows
  • Backup testing (not just backup hoping)
  • Cyber Essentials prep aid in plain English

Deliverable

Board-ready evidence snapshot showing what's protected and how.

What's not included

  • Break-fix support
  • 24/7 monitoring

Change control: Extras via Change Request; Mini-SOW if ≤3 days.

Book a free 20-min consult

Enable: Bespoke AGI Consultation & Implementation

AI saves hours without risking jobs - tailored to your organisation

Our promise

AI saves hours without risking jobs - tailored to your organisation. Bespoke consultation and implementation of AGI tools designed specifically for your needs.

What you get

  • Safe prompts that protect sensitive data
  • Guardrails to prevent inappropriate use
  • Role-specific copilots for your team
  • Reviewer logs for governance
  • Custom implementation tailored to your processes

Every solution is bespoke

Tailored to your organisation

We don't sell off-the-shelf solutions - we build what works for you.

Consultation-first approach

Ensures perfect fit for your team and workflows.

Specific to your processes

Every solution is designed around how you actually work.

Implementation examples

Cyber Essentials checklist automation

Streamline compliance processes with intelligent guidance

CustomGPT assistants with governance logs

Bespoke AI assistants with full audit trails

Role-specific AI copilots

Tailored assistants for different team roles

CSV to dashboard automation

Transform spreadsheets into interactive insights

Meeting minutes to board pack conversion

Automated transformation of notes into professional reports

Process workflow automation

Intelligent automation of routine administrative tasks

Document analysis and summarisation

Smart document processing with human oversight

Risk assessment automation

Intelligent risk evaluation with built-in safeguards

Important: AI outputs are advisory drafts; human sign-off required.

Start with consultation

Every project begins with understanding your specific needs, processes, and goals.

Price varies based on complexity and requirements.

Change control: Extras via Change Request; Mini-SOW if ≤3 days.

Book a free 20-min consult

Empower: Training & Advisory

Build internal capability. Bronze, Silver, Gold tiers available.

Advisory tiers

Bronze

Essential guidance for small teams

Silver

Regular support for growing organisations

Gold

Comprehensive advisory for complex needs

What's included

  • Practical training sessions
  • Easy-to-follow playbooks
  • Quarterly board updates

Clear boundary: We're not an MSP. No emergency callouts without separate incident response agreement.

Change control: Extras via Change Request; Mini-SOW if ≤3 days.

Book a free 20-min consult

Pricing Guidance

Prices are guidance only; quotes depend on circumstances.

Recover – Contain, Stabilise & Post Incident Review

£2,500

7-day incident response package

Secure – Baseline

£1,800

Essential hardening package

Enable – Bespoke AGI Implementation

Bespoke Quote

Consultation included

Price varies based on complexity and requirements

Empower – Bronze Advisory

£600/month

Essential ongoing guidance

Charity fairness commitments

We offer discounts for registered charities, phased delivery options, and will always de-scope before over-charging.

Remember: Prices are guidance only; quotes depend on circumstances.

Book a free 20-min consult

Case Study: Youth Community Project

How we helped a youth charity regain control after a security breach

The challenge

Youth Community Project discovered their Microsoft 365 tenant was compromised. Suspicious activity, potential bot accounts, and loss of domain control left them vulnerable.

What we did

  • Emergency containment and assessment
  • Removed ~2,000 bot accounts
  • Restored domain control
  • Fixed DKIM authentication
  • Enabled comprehensive logging
  • Recovered critical data

Results delivered

  • 48 hours: Tenant fully secured
  • Board brief: Clear, jargon-free incident report
  • Domain restored: Full control returned
  • Data recovered: No operational loss

Lessons for others

  • Enable logging before you need it
  • Split admin responsibilities
  • Block access from risky regions

By the numbers

48h
Time to secure
~2,000
Bot accounts removed
0
Data lost
Book a free 20-min consult

Get in touch

Ready to secure today and enable tomorrow?

When to contact us

  • Security breach or compromise
  • Need hardening and compliance help
  • Want to explore AI opportunities safely
  • Building internal cyber capability

What to prepare

  • Your tenant domain name
  • Approximate user count
  • Primary goal or challenge

What to expect

Business-hours response only. We'll get back to you within one working day with next steps.

Contact form

Frequently Asked Questions

Quick answers to common questions

Are you an MSP?

No. We're advisors who teach and implement, then hand back control. No 24/7 helpdesk.

How much does it cost?

Prices are guidance only. Quotes depend on your specific circumstances and requirements.

How do you keep our data safe?

We work within your tenant with least-privilege access. No data leaves your environment.

How long does implementation take?

Recover: 7 days. Secure baseline: 2-3 weeks. Enable: 4-12 weeks depending on complexity.

Can you help with Cyber Essentials?

Yes, we translate technical requirements into plain English and help with evidence gathering.

Do you sign off on AI outputs?

No. AI outputs are advisory drafts. Your team must review and approve all recommendations.

What if we need changes mid-project?

Extras go via Change Request. If ≤3 days work, we use a Mini-SOW process.

Still have questions?

Book a free 20-min consult