How We Work

In today's world of increasing pressures on resources and the requirement to 'do more with less', the organisations that succeed are those that can quickly adapt to changing circumstances, including embracing new ways of working or harnessing new technologies, without exposing themselves to unacceptable risks.

At Actica we help our clients navigate the minefields to implement leading edge solutions safely and cost-effectively. We do this by:

  • Working in partnership with our clients. We provide an in-depth understanding of change management best practice, new ways of working, new technologies and extensive practical experience of their use and deployment. Combining this with our clients' experience of their business enables us to determine the best solutions to their needs.
  • Employing the best business management and ICT specialists. Our consultants combine strong technical expertise with a natural flair for problem solving and acute commercial awareness. Their practical experience gives them insight into the difficulties likely to be encountered during an assignment and the best ways of avoiding them.
  • Investing in training and research. We invest extensively in training and research to ensure our consultants have market leading knowledge.
  • Being committed to quality. We pride ourselves on providing the highest possible quality of service. Our standards of operation and integrity are widely recognised by our clients, who return to us time and time again.

Cyber Essentials

Cyber Essentials

Actica takes cyber security seriously. We are committed to safeguarding the information that is entrusted to us. Our commitment is illustrated through our award of a Cyber Essentials badge.

Cyber Essentials is a government scheme to enable organisations to demonstrate that that they have sound cyber security practices in place. The scheme covers the basics of cyber security in an organisation's enterprise or corporate IT system. It focuses on internet originated attacks against IT systems and concentrates on five key security controls: boundary firewalls and internet gateways; secure configuration; access control; malware protection; and patch management. The controls were identified after analysis of a wide range of successful cyber-attacks by CESG, the information security arm of GCHQ. The five controls can effectively mitigate cyber-attacks by attackers using unsophisticated tools widely available on the internet.

Certification against the scheme involves an independently verified self-assessment. Organisations assess themselves against the five controls and a qualified assessor from an independent Certification Body verifies the information provided.

For further information on the scheme please see