Plain-English cyber, IT, and AI for small charities & SMEs
We fix what's broken, harden what's fragile, enable safe AI. Your consultant-teacher who simplifies complex tech into secure, usable systems.
Secure defaults
Like locking the office and the filing cabinet
Board-ready evidence
Clear reports that trustees understand
Staff confidence
Training that sticks, not technical jargon
Simple language
Plain UK English, no hype or buzzwords
Four ways we help
About Secure and Restore
Your consultant-teacher for cyber, IT, and AI challenges
Our mission
Simplify complex IT, cyber, and AI into secure, usable systems for organisations without internal expertise.
Our values
Clarity
Plain English, no jargon
Compassion
Understanding your pressures
Security
Protection that actually works
Enablement
Building your capability
Integrity
Honest advice, fair pricing
How we work
We're teachers and translators, not just implementers. We fix the problem, show you how it works, then hand back control.
Clear boundaries
We provide advisory services only. We're not an MSP and don't offer 24/7 support.
Where we work
Based in South West UK, serving charities and SMEs who need practical cyber, IT, and AI guidance.
Recent success story
Youth Community Project
Regained control after compromise. ~2,000 bot accounts removed, domain restored, logging enabled, data recovered.
Result: Tenant secured in 48 hours. Board brief delivered.
Read full case study →Recover: Incident Response
Breach or compromise? Need control without blame? We help you stabilise quickly.
What we do
- Containment - stop the spread
- MFA setup - secure the accounts
- Conditional Access - control the access
- Licence/bot clean-up - remove the noise
- Data recovery - get back what matters
- Insurer-friendly evidence pack - for your claims
- 7-day stabilisation - breathing space to plan
Outcomes you'll see
- Clear time-to-contain metrics
- All accounts secured and documented
- Critical data restored where possible
- Board-ready incident brief
Secure: Hardening & Compliance
Build strong foundations. Cyber Essentials prep in plain English.
What you get
- MFA across all critical systems
- Least privilege access controls
- Patching cadence that actually works
- Joiner-mover-leaver process flows
- Backup testing (not just backup hoping)
- Cyber Essentials prep aid in plain English
Deliverable
Board-ready evidence snapshot showing what's protected and how.
Enable: Bespoke AGI Consultation & Implementation
AI saves hours without risking jobs - tailored to your organisation
Our promise
AI saves hours without risking jobs - tailored to your organisation. Bespoke consultation and implementation of AGI tools designed specifically for your needs.
What you get
- Safe prompts that protect sensitive data
- Guardrails to prevent inappropriate use
- Role-specific copilots for your team
- Reviewer logs for governance
- Custom implementation tailored to your processes
Every solution is bespoke
Tailored to your organisation
We don't sell off-the-shelf solutions - we build what works for you.
Consultation-first approach
Ensures perfect fit for your team and workflows.
Specific to your processes
Every solution is designed around how you actually work.
Implementation examples
Cyber Essentials checklist automation
Streamline compliance processes with intelligent guidance
CustomGPT assistants with governance logs
Bespoke AI assistants with full audit trails
Role-specific AI copilots
Tailored assistants for different team roles
CSV to dashboard automation
Transform spreadsheets into interactive insights
Meeting minutes to board pack conversion
Automated transformation of notes into professional reports
Process workflow automation
Intelligent automation of routine administrative tasks
Document analysis and summarisation
Smart document processing with human oversight
Risk assessment automation
Intelligent risk evaluation with built-in safeguards
Important: AI outputs are advisory drafts; human sign-off required.
Empower: Training & Advisory
Build internal capability. Bronze, Silver, Gold tiers available.
Advisory tiers
Bronze
Essential guidance for small teams
Silver
Regular support for growing organisations
Gold
Comprehensive advisory for complex needs
What's included
- Practical training sessions
- Easy-to-follow playbooks
- Quarterly board updates
Clear boundary: We're not an MSP. No emergency callouts without separate incident response agreement.
Pricing Guidance
Recover – Contain, Stabilise & Post Incident Review
7-day incident response package
Secure – Baseline
Essential hardening package
Enable – Bespoke AGI Implementation
Consultation included
Price varies based on complexity and requirements
Empower – Bronze Advisory
Essential ongoing guidance
Charity fairness commitments
We offer discounts for registered charities, phased delivery options, and will always de-scope before over-charging.
Remember: Prices are guidance only; quotes depend on circumstances.
Case Study: Youth Community Project
How we helped a youth charity regain control after a security breach
The challenge
Youth Community Project discovered their Microsoft 365 tenant was compromised. Suspicious activity, potential bot accounts, and loss of domain control left them vulnerable.
What we did
- Emergency containment and assessment
- Removed ~2,000 bot accounts
- Restored domain control
- Fixed DKIM authentication
- Enabled comprehensive logging
- Recovered critical data
Results delivered
- 48 hours: Tenant fully secured
- Board brief: Clear, jargon-free incident report
- Domain restored: Full control returned
- Data recovered: No operational loss
Lessons for others
- Enable logging before you need it
- Split admin responsibilities
- Block access from risky regions
Get in touch
Ready to secure today and enable tomorrow?
When to contact us
- Security breach or compromise
- Need hardening and compliance help
- Want to explore AI opportunities safely
- Building internal cyber capability
What to prepare
- Your tenant domain name
- Approximate user count
- Primary goal or challenge
What to expect
Business-hours response only. We'll get back to you within one working day with next steps.
Frequently Asked Questions
Quick answers to common questions
Are you an MSP?
No. We're advisors who teach and implement, then hand back control. No 24/7 helpdesk.
How much does it cost?
Prices are guidance only. Quotes depend on your specific circumstances and requirements.
How do you keep our data safe?
We work within your tenant with least-privilege access. No data leaves your environment.
How long does implementation take?
Recover: 7 days. Secure baseline: 2-3 weeks. Enable: 4-12 weeks depending on complexity.
Can you help with Cyber Essentials?
Yes, we translate technical requirements into plain English and help with evidence gathering.
Do you sign off on AI outputs?
No. AI outputs are advisory drafts. Your team must review and approve all recommendations.
What if we need changes mid-project?
Extras go via Change Request. If ≤3 days work, we use a Mini-SOW process.
Still have questions?
Book a free 20-min consult