A modern table setup with a terracotta bowl, a white book titled 'ICNE', a round white lamp on a beige wooden base, and a hand holding a fan of color swatches or paint sample cards.

What We Offer

We offer a range of services to meet the needs of every client. Have something else in mind? We'd be happy to work with you to create a custom quote.

  • What this includes

    • Short intake to understand your environment

    • Review of email platform security settings (Microsoft 365 or Google Workspace)

    • Multi-factor authentication status check

    • Password and account recovery review

    • High-level device and user access overview

    • Backup existence and basic validation check

    • Network and Wi-Fi configuration overview

    • Identification of the top five security and operational risks

    What you receive

    • One-page findings summary in plain language

    • Prioritized action list with clear next steps

    • Practical recommendations focused on risk reduction

    Fee is credited toward implementation services if you proceed.

  • Implementation of essential security and technology controls to establish a strong, stable baseline and reduce common business risks.

    What this includes

    • Proper enforcement of multi-factor authentication

    • Email security hardening and account protection

    • Password management standardization

    • Secure configuration of user access and permissions

    • Device baseline security configuration

    • Backup strategy setup or validation

    • Basic incident response guidance for staff

    • Optional onsite visit if required

    What you receive

    • A documented secure baseline for your office

    • Clear ownership and admin access structure

    • Simple staff guidance for day-to-day use

    • Reduced exposure to common threats such as email compromise and ransomware

    Final scope and pricing are confirmed after the initial review.

  • Lightweight, ongoing oversight to ensure protections remain effective over time.

    Available after initial setup.

    What this includes

    • Monthly review of user accounts and access

    • Patch and update verification for core systems

    • Backup status and restore verification

    • Quarterly staff security awareness session

    • Priority business-hours support

    • Clear monthly status update

    What you receive

    • Ongoing accountability

    • Early identification of issues before they become incidents

    • Peace of mind that the basics are being maintained

    No long-term contracts required.

  • Available as needed after an initial engagement.

    • Onsite support visits

    • New workstation or device setup

    • Secure network and router upgrades

    • Camera system design and implementation

    • Digital signage and AV system setup

    • Staff security training sessions

    • Incident response support

    Pricing for optional services is discussed based on scope.

Pricing Notes

Pricing reflects typical small office environments. Larger or more complex organizations may require additional scoping.

Two people shaking hands, with only the torsos and hands visible, against a plain beige wall.
Let’s Work Together

If you're interested in working with us, complete the form with a few details about your project. We'll review your message and get back to you within 48 hours.