Insurance options unavailable when ‘buy it now’ selected

No finance is available when not all products in the cart have finance

Call for Warranty Quote

Call for Insurance Quote

No excess found for this price

Please Accept terms & conditions before proceeding

Company & Contract Details need to be completed

Error in the form. Review your details and try again later


Cyber Security

Worktools helps you manage critical risks to your business

We are able to provide Information Security as a Managed Service for your business. If you worry about the impact of a breach, be it for legal or regulatory compliance, privacy, reputation, competitive advantage, financial or any other reason we may be able to help. Please give us a call if you recognise any of the challenges below.

Security Challenges facing SMEs



Viruses are usually malicious programs that are designed to infect one machine and then self-replicate, potentially infecting all devices connected to your company network.


Malware is a more general term than virus. It is generally designed with a specific target or set of targets in mind. 

Malware often creates a back door into a system through which the author of the Malware can eavesdrop or gain access to sensitive data. 


As crypto-currencies gain popularity so does ransomware. It's a specific malware that locks down systems until an unlock key is provided. The unlock key is normally delivered to the victim after the payment of a ransom, hence the name. Typically, if the ransom is not paid within a specified period, which can be minutes, hours or days, the victim’s system will be wiped.


The creation, or ‘mining’ of crypto-currencies, requires massive amounts of computational power to solve complex equations. The reward for solving an equation is the unlocking of a unit of that crypto-currency. 

Therefore, it is becoming increasingly common for cyber criminals to attempt to hijack the computational power of thousands of random machines. System compromises are achieved in a number of ways, including ‘drive-by’ malicious programs, which can be silently installed on a computer when the user innocently clicks on fake website advertisements. Once installed, the performance of the infected machine will suffer, and its operational life will be shortened. 


Generally, the name given to people creating viruses, malware, ransomware etc. who aim to profit, usually monetarily, from their actions. 

However, there are also 'ethical-hackers' or 'activist-hackers' who attempt to expose information, such as software vulnerabilities, for the benefit of wider society and often at the expense of criminals or corrupt officials. 

Denial of Service

DDoS attacks harness a large number of internet enabled devices to bring down websites or servers thereby denying access to the target website. 

This can be achieved in a number of ways, but in the age of the 'Internet of Things', devices such as security cameras are often vulnerable to attack and connected to the internet in considerable numbers. These in turn can generate high volume traffic targeted at particular websites or servers, which will crash the target rendering it inaccessible to legitimate users and inflicting financial and reputational damage on the victim business. 

Malicious Websites

Malicious websites can attempt to crypto-hijack your computer, install Ransomware or other ‘drive-by’ malicious programs or force you to download malware. 

They can also send sensitive information you've inputted to malicious actors who can then use it against you or profit from it – especially when, for example, the stolen information is card or banking details. 


Password Management

In spite of numerous warnings to avoid using simplistic passwords (which are easy to hack) people continue to do so and even write them down, making passwords one of the top ranking cybercrime vulnerabilities. 

We recommend using a password manager to auto-generate and securely store complex passwords /pass-phrases that are nearly impossible to crack. 

Phishing Attacks

Phishing attacks attempt to get you to hand over login credentials or other sensitive information. They masquerade as legitimate emails, phone calls or websites and can be so convincing that you deem it safe to hand over your confidential information.

Social Engineering

Social engineers create scenarios that are believable, so the user feels that it is safe to hand over confidential information. As with phishing, social engineering scams can occur online and frequently over the phone - or even in person.

Insider Threat

A disgruntled or angry employee is the most common insider threat. A typical scenario is where they attempt to obtain sensitive commercial or personal data from their employer’s database. 

Such activity can negatively impact businesses through the loss of revenue or customers but can also create legal and regulatory issues when customer data is stolen. 

Human Error

People make mistakes, and as businesses become ever more reliant on technology, mistakes can have far reaching consequences. When employees are granted higher permissions than are necessary to fulfil their roles the potential for unintended negative system issues increases exponentially.

Theft and Loss

If a device is lost or stolen it will likely fall into the hands of a malicious actor, significantly increasing their ability to gain entry to sensitive business systems. It is therefore essential that when such an event occurs companies have an immediate and easy method of wiping devices remotely.

Media Control

The ability to connect removable media, such as USB Flash drives to company devices should be tightly controlled. When access controls are not enforced the risk of data theft and /or the injection of malicious programs into business systems is significantly increased.


Data Loss Prevention

In an age where your data is often your most valuable asset you need to prevent sensitive data being transmitted outside of your network, or to other than approved, designated people.

Regulatory Compliance

Each industry has a range of compliance standards which, if breached, can incur significant fines and reputational damage.

Chain of Custody

Knowing where your data is and being able to trace its chain of custody is essential preventative behaviour. The ability to monitor who has accessed it, when and how often is key to maintaining a secure system architecture.


GDPR (the EU General Data Protection Regulation) is the most important change in data privacy regulation in 20 years. GDPR impacts nearly every company throughout Europe and dictates how companies handle customer data. Failure to adhere to this regulation will incur significant and deleterious consequences.

Encryption Key Management

Data encryption is a basic and mandatory security standard for any company concerned about cyber security. Secure encryption key storage and management ensures that authorised company personnel are able to maintain secure access to their company’s database.

Separation of Roles & Duties

No one user should be able to initiate significant changes on a system. A ‘least privilege’ policy should be in place ensuring that each user has the minimum access required to successfully perform their role, keeping both them and the company secure.



Step 1: Prevent breaches from happening, balancing the cost of security with the financial, reputational and operational cost of a breach.

  • Next Generation AI Endpoint Protection

  • Next Generation AI Network Firewall

  • User & Device Security Policy Enforcement

  • User Awareness Campaigns

  • Multi-factor Authentication

  • Vulnerability Scanning

  • Device Sterilisation

  • Password Management

  • Web Access Filtering

  • Business / Personal App Separation

  • Virtual Private Networking

  • Encryption Management


Step 2: In the event of an Incident, detect the breach early and respond quickly. 

  • Behavioural Analysis with Deep Learning

  • Security Operations Centre

  • 24 hour real-time alerting

  • Scam Assistance

  • Device Isolation

  • Remote Device Lock & Wipe

  • Asset Geolocation


Step 3: Learn from mistakes and continually assess if Steps 1 & 2 are adequate to mitigate the Cyber Risks you face.

  • Audit Reporting

  • Phishing Simulation

  • NCSC & Industry Threat Monitoring

  • Risk Analysis and Mitigation Planning

  • Business Continuity Planning

  • Role-based Access Control

  • Penetration Testing

  • 03330 508 805



How will implementing cyber security controls impact my business & employees?

We believe that the most an end user should have to do is login. We handle the setup, management, and improvement of the system with minimal impact to users. 

How long does this take to deploy?

The setup process is divided into three stages:

- The initial consultation and agreement of required policies typically takes no longer than a week.

- The next step is the implementation of a test user batch, and the monitoring of initial results.

- Full implementation typically takes no longer than two weeks. 

I'm not sure I have any sensitive data, do I need cyber security controls? 

Every company creates sensitive data that is vital to its ongoing business. We can provide a quick consultation to discuss your current setup & how our managed service would protect your business interests. 

Where are you based, and can I visit you in person?

Our offices are in London. We are happy to meet with you there, or at your office location.

Do you have any pricing information?

Yes, please refer to the pricing page here

IT Support

Worktools supports people, using technology

We provide a refreshingly new approach to IT Support. We don't just fix problems, we help plan and manage your technology estate so that all your costs are predictable. No hidden surprises. We specialise in Apple and Microsoft devices with added cloud management expertise to boot. If you recognise any of the IT Support lifecycle challenges below, then please get in touch to see if we can help.

IT Support Challenges facing SMEs


Hardware, Software & Firmware Issues

New devices, software, and updates can cause issues that interrupt work.  

Monitoring if it's safe to update is a mammoth task - but it's what we do.

Software conflicts

Some software can't run when other software programs are installed, but what if you need to use both?  We deploy the tools that ensure you will always have access to the software you need. 

Data recovery

Damaged devices can often hold the only copy of sensitive or important data. We can help recovering data that may otherwise be lost. 

Website & Server issues often go unnoticed

Every week numerous vulnerabilities are discovered that affect systems used by millions of websites around the globe. 

Checking to see if you're protected can often be difficult, but we make sure that you are.

Limited ability to support mobile devices

Many software applications have inherent compatibility or security issues that impair their running natively on mobile devices. 

This can negatively impact your employees’ ability to work when away from the office. Our service makes sure that employees’ mobile devices can run every program your business needs for its successful operation. 

Poor software performance is often never resolved

We believe you should be able to log an issue within minutes and have immediate access to an audit trail that detail the action taken

Reducing Capital Expenditure

A large IT team requires significant investment in both salaries and equipment. Companies often look to IT first when trying to cut costs, which in the long term can impair overall performance, especially as today’s employees want easy, collaborative work options that require up-to-date devices. Our tax efficient leasing and support plans ensure your company always has the latest technology backed up by expert IT support.

Enabling effective Team Working

Today’s employees want easy collaborative working options, but these pose security risks. 

We have developed systems that will allow your employees to safely collaborate whenever and wherever they need to. 


Maintenance can conflict with users’ working patterns

No business would want its employees to experience a major windows update at 9am on a Monday morning. 

Ensuring updates and security patches are performed is critical. We ensure that necessary maintenance is performed with intruding on employees. 

Mobile and remote workers are often difficult to support

Some legacy systems, like intranets, were designed before laptops & phones were in widespread use. 

How you support remote workers, and how they get the support they need can often be a resource drain. 

Best endeavours support with foggy accountability

When knowledgeable people are nominated as the office IT go-to person, on top of their other responsibilities, structure and policy is often ignored. 

This can mean that when things go wrong it is often difficult to determine a cause and take appropriate action to prevent a repeat of the incident in the future. As a result, issues can accumulate until critical systems and the whole company is affected. 

Growing backlog of issues

Maintaining IT systems and resolving issues is often considered a lower priority than other, seemingly more revenue related business functions. 

However, nothing can negatively affect revenue as much as when critical systems and consequently the whole company is affected. 

Dedicated specialists increase staff costs

Hiring permanent employees to fulfil IT functions will incur a significant increase in admin and fixed costs. It also creates logistics issues, such as what happens when the IT person is on holiday or has taken ill?

Outsourcing your IT removes all logistical issues whilst delivering expert, immediate support at competitive prices. 

Self-Service support can be inefficient

If your primary interest isn't IT, then figuring out what's going wrong can be very hard.

Handing over to an experienced IT professional removes the issues from the user & allows for faster resolution. 

Single points of expertise

A single point of expertise becomes a single point of failure when they're away or unavailable and should be avoided.


Inaccurate or missing documentation

A poor knowledge base leads people down the wrong track, meaning they waste time & resources. 

Employee turnover leads to loss of critical information

Workflows become inefficient when information isn’t stored in easily accessible locations. This can frustrate employees’ attempts to collaborate. But investing in scalable system architecture is very expensive. A private, outsourced cloud network with dedicated IT support permits businesses to set fixed budgets and avoid unexpected and costly surprises.

Support staff knowledge lags behind the speed of technology adoption

New technology is often underutilised due to a lack of knowledge on how to make the most of its functionality. We can provide the support and training to ensure your employees are up to speed on the capabilities of your tech.

Lack of resources to support BYOD

Employers today often encourage their employees to bring their own devices to work (BYOD). This practice encourages uninterrupted work habits and greater efficiencies. However, without seamless integration of employee’s devices with their companies’ legacy systems the potential for enhanced functionality will be lost.

Missing IT Support Management Info

Are you fixing the symptoms or the causes of an issue? And can you accurately map the data of an issue? 

Predicting IT costs

Every business wants fixed and stable costs. By outsourcing your IT requirements, you can achieve this and avoid unexpected demands on your budget.



Step 1: Preventative maintenance means fixing root causes early before users experience the symptoms

  • Apple MacOS Management

  • Microsoft Windows Management

  • iOS & Android Management

  • Server Management

  • Network Management

  • AWS, Azure & Google Cloud Platform Management

  • Internet Access Management

  • Peripheral Management

  • BYOD Management

  • AdWords Management 

  • Office 365 & GSuite Management

  • Domain Management

  • Other SaaS Management


Step 2: Triage important issues for immediate action whilst bundling lower priority niggles to a time that suits

  • IT Helpdesk

  • Remote Access issue resolution

  • On-Premises issue resolution

  • Network Operations Centre

  • Service Level Agreements

  • 24x7 real-time device health reporting

  • Disaster & Data recovery services

  • Asset Discovery & Management

  • Out of Hours issue resolution


Step 3: Identify systemic issues that keep causing problems and lower the burden for Steps 1 and 2

  • Hardware Upgrades

  • Hardware Leasing

  • Software Licensing

  • Software and Firmware upgrades

  • Quarterly IT Checkup

  • Ticket Analysis to identify repeating issues

  • Professional documentation of your IT Estate

  • Supplement your existing IT staff 

  • User feedback & surveys

  • Application usage reporting

  • Onboarding and offboarding for your staff

  • 03330 508 805



Is out of hours support available?


What devices do you support?

We support any Windows devices running Windows 7 or higher, and all macOS devices running macOS Sierra or higher. Other OS support requirements can be accommodated if required. 

What are your SLAs?

All of our plans include a 1 hour response SLA for critical issues. Top tier support customers have the option of defining custom SLA agreements.