Getting cyber security help is easy

There are two ways we can start to help you. They are:

  1. You contact us requesting help.
  2. We contact you, offering help.

Note: There is no charge for our help. It is purely charitable. Also, we do not ask for private information about your computer system(s) to help you.


If you contact us first requesting help

The process should flow as follows:

  1. You email us asking for help to identify Public Security Issues.
    Note: Public Security Issues means security issues in computer systems intended to be reached from the internet (publicly accessible).
  2. We will review and tell you whether we accept.
  3. We will create a support ticket in our helpdesk system.
  4. We will keep you up-to-date by email throughout the process
  5. Ultimately, we will tell you the issues found and how to fix or minimise them.

If we contact you first offering help

The process should flow as follows:

  1. We will email you offering to help identify Public Security Issues or tell you about issues we know.
    Note: Public Security Issues mean weaknesses in computer systems directly accessible from the internet (publicly accessible).
  2. You should assess and decide whether to accept our support.
  3. We will create a support ticket in our helpdesk system.
  4. We will keep you up-to-date by email throughout the process
  5. Ultimately, we will tell you the issues found and how to fix or minimise them.


Note: The ticket in our helpdesk system will allow you to stay up-to-date in the process and maintain discussions with us.

PLEASE REMEMBER: Security issues we report are found using NON-invasive methods. This also means there is no exploitation or bypassing of any security controls to find those issues.


Do you have a cyber security issue/query?
Send a message to the helpdesk.
Our Policies
Reporting Policy
Learn about what and how we report cyber security issues in public systems.
Privacy Policy
Learn about how we use data shared with us from browsing this site.