Our Services.

Do you need Staff Phishing Simulation?

At LG CyberSec, we’re exploring a low-cost, high-impact phishing simulation service designed for small and medium-sized businesses (100-400 employees). Each month, we send realistic, customised phishing emails to your staff and track who interacts with them. At the end of that month, you receive a clear, actionable report showing click-through rates and exactly who took the bait — helping you target future training where it’s needed most.

We’re aiming to make enterprise-grade security awareness testing affordable for everyone starting from £50/month for companies with 200 or less employees.

Do you need help with your threat detections?

LG CyberSec’s Detection Engineering service is built for organizations that understand prevention isn’t enough. We can help design, build, and optimize detection capabilities that empower your security operations to catch what others miss — faster, smarter, and with less noise.

Also, watch this space, as we are working on building a large repository of Sigma detection rules, and more detection capabilities, publicly available for free, which you can run for your SMB.

Do you need consultation? Or just want to chat about cybersecurity?

At LG CyberSec, we don’t just respond to threats — we anticipate them. Our cybersecurity consulting services are designed to empower organizations with strategic insight, expert guidance, and tailored solutions to protect what matters most: your data, your systems, and your reputation.

Or if you just want to chat about anything cybersecurity, get in touch, we’d love to chat and help you in any way we can!

UK Charities ↗

Discounted services available for registered UK charities.

“Hackers don’t knock. We build doors they can’t find.”

– LG CyberSec, Founder

Our Cybersecurity Blog.

  • UK Digital ID Privacy Concerns: How New Identity Systems Could Compromise Your Security

    UK Digital ID Privacy Concerns: How New Identity Systems Could Compromise Your Security

    The UK government’s push towards a comprehensive digital identity system promises convenience and efficiency, but beneath the surface lies a complex web of privacy and security concerns that could fundamentally alter how citizens interact with digital services. As small businesses and consumers increasingly rely on digital platforms, understanding the potential risks of centralized identity verification…

  • Ukraine Warns of CABINETRAT Backdoor: How XLL Add-ins in Signal ZIPs Target Your Business

    Ukraine Warns of CABINETRAT Backdoor: How XLL Add-ins in Signal ZIPs Target Your Business

    In an alarming development that has caught the attention of cybersecurity experts worldwide, Ukraine’s Computer Emergency Response Team (CERT-UA) has issued urgent warnings about a sophisticated malware campaign leveraging CABINETRAT backdoor technology. This threat specifically targets organizations through weaponized Excel XLL add-ins disguised within seemingly innocent ZIP archives, representing a significant evolution in cybercriminal tactics…

  • How Wireshark Can Transform SMB Network Security

    How Wireshark Can Transform SMB Network Security

    In today’s digital landscape, small and medium-sized businesses (SMBs) face an alarming reality: 43% of cyber attacks target small businesses annually, with average losses reaching $25,000 per incident. As cyber threats continue to evolve, SMBs need robust network monitoring tools to protect their digital assets. Enter Wireshark – a powerful, open-source network protocol analyzer that…

  • Complete Guide to Securing Web Browsers in SMBs: Protect Your Business from Cyber Threats

    Complete Guide to Securing Web Browsers in SMBs: Protect Your Business from Cyber Threats

    In today’s digital landscape, securing web browsers in SMBs has become more critical than ever. With small businesses accounting for 43% of cyber attacks annually and losing an average of $25,000 per incident, browser security represents your first line of defense against increasingly sophisticated threats. Web browsers serve as gateways to the internet, handling everything…

  • Sigma Detection Rules for SIEM: A Complete Guide for SMBs in 2025

    Sigma Detection Rules for SIEM: A Complete Guide for SMBs in 2025

    In today’s rapidly evolving threat landscape, small and medium-sized businesses face an unprecedented challenge in defending against sophisticated cyberattacks. Sigma detection rules for SIEM detections have emerged as a game-changing solution that democratizes advanced threat detection capabilities, making enterprise-level security accessible to organizations of all sizes. These standardized detection rules are transforming how businesses approach…

  • 40 NPM Packages Compromised: How Bundle.js Supply Chain Attack Threatens Your Business Credentials

    40 NPM Packages Compromised: How Bundle.js Supply Chain Attack Threatens Your Business Credentials

    In a sophisticated cyber attack that sent shockwaves through the JavaScript development community, over 40 npm packages were compromised in a coordinated supply chain attack designed to steal developer credentials using malicious bundle.js code. This incident highlights the growing threat of supply chain attacks targeting the very foundation of modern web development. For small and…