March 12, 2019

The Centric Models


Around 90% of all Information Security incidents begin with human interaction, so no one can deny the importance of awareness and training.

Education is the key to preventing your staff becoming the reason for regulatory non-compliance, and a good standard of cyber security education can help create the “Human Firewall” every company needs.

Here at Centric Security, we aim to help you get your staff thinking about how best to protect their own digital lives, in turn making them aware of the professional digital profiles and protecting your business.

For any further information on the People-Centric side of operations, please get in touch now.


Information is the lifeblood of modern industry. Without the information we need, it is almost impossible to operate in the modern world and it should be treated as digital currency.

Centric Security specialize in the protection of company data and are on hand to help you protect what is important.

With the arrival of the General Data Protection Regulations (GDPR) in May 2018, more companies than ever are taking a stronger stance on Data privacy. We can help you.

We offer consultation services and approach models that can help you bring some clarity to your data, strength to your data protection and regulatory compliance to your procedures.

Please get in touch if you have any questions around how we can help you with Information security.


Technology-Centric services are exactly what you would think, entirely based on your technologies and those technologies potentially available to you.

Centric Security believe that cyber security principles within your technology stack should be considered at the design stage. We work with you to ensure that “Defence in Depth” proves to be more than just a concept that people talk about, and more of a working practice.

However, we are aware that not everyone has the luxury of designing security into their systems at the time of inception. Instead, we are happy to advise and consult with you and your teams to establish what levels of security are required, and indeed what is attainable with your current technologies.