


























Most firms we assess have limited visibility of where their data sits, who can access it, and whether access controls match the sensitivity of what is stored.
Our assessment shows you;
- Weak data security controls, regardless of where the data is.
- Access controls strength, and storage data practices.
- Identifiys gaps in your current posture and what insurers expect

ICAEW, ACCA, and AAT all publish guidance on cyber risk management for member firms. GDPR places direct obligations on how you process and store personal data. Professional indemnity insurers are asking more detailed questions about controls at renewal.
Firms without documented answers are seeing higher premiums or coverage exclusions.
Our assessment delivers;
- Alignment to your environment against regultory obligations
- Gaps that could affect PI renewal terms or regulatory standing
- Documented evidence that your insurer can reference

Tax deadlines, audit cycles, and client reporting do not pause for IT failures. If your systems go down during January filing season or year-end, the commercial impact is immediate - missed deadlines, delayed reports, and clients who cannot reach you when they need you most.
Our assessment confirms;
- Backup assessment, recovery, and continuity readiness
- Identify single points of failure in your practice infrastructure
- Test whether your current setup could survive a disruption during peak periods

Security controls shouldn't slow your team down. The right assessment identifies where friction is coming from - poor password practices, outdated access policies, inconsistent device management - and recommends practical fixes that improve security and usability together.
Our Assessment;
- Identifies controls that create unnecessary friction for fee earners
- Recommends changes that improve security without adding admin burden
- Aligns security practices with how your team actually works day-to-day

We review your current systems, users, client data flows, access controls, and existing supplier relationships. We map your practice structure against the risks that matter most - client data exposure, business continuity, and regulatory obligations.
We run a structured assessment across your environment - identity and access, endpoint protection, email security, backup and recovery, and data handling practices. Every finding is documented, scored by severity, and mapped to a practical remediation path.
You receive a written assessment report specific to your firm - not a generic template. It includes prioritised findings, recommended actions, estimated effort, and a clear summary your Partners can review without needing a technical background.
PI insurers are tightening requirements at renewal. The assessment produces documented evidence of your controls; access management, endpoint protection, backup and recovery, data handling, giving you a stronger position and reducing the risk of exclusions or premium increases.
Every finding is scored by severity and mapped to estimated effort. Your Partners get a clear sequence of actions, starting with what reduces the most risk for the least disruption; not a 40-page register of theoretical concerns.
Executive summary up front. Prioritised findings with plain-language explanations. A remediation roadmap your leadership team can review, challenge, and approve without needing a technical translator.
Clear visibility, practical priorities, and documented evidence of your cybersecurity posture.
We work independently of your current IT provider. This is an assessment, not a takeover. You get an objective view of your security posture without any pressure to change suppliers.
We map how client data moves through your practice — from intake to storage to sharing — and identify where access controls, permissions, or handling practices create exposure.
We assess your controls against the expectations of GDPR, ICAEW/ACCA cyber guidance, and the questions your professional indemnity insurer is asking at renewal.
Every finding comes with a severity rating, a recommended action, and an estimated effort — so your Partners can make informed decisions about what to address first.
The assessment report includes an executive summary, a risk matrix, and a remediation roadmap - structured so Partners can review it, challenge it, and act on it without a technical translator.
We assess your backup, recovery, and continuity readiness — including whether you could recover during filing season without losing client data or missing deadlines.
Every finding is specific to your environment, your systems, and your team — with actions your practice can actually implement within existing resource constraints.
After the assessment, we can support remediation, provide ongoing monitoring, or work alongside your existing IT provider to implement changes - but only if you want us to. The assessment stands on its own.
We needed an independent partner to assess our security posture across multiple offices. The team were highly effective and knowledgeable.
On the ball and always there when we need them. The initial assessment set the foundation for everything that followed
otooles were great to deal with on IT support and cyber. The assessment process was straightforward and the findings were immediately actionable.
otooles are consultative and genuinely hands-on. The cybersecurity assessment gave us a clear picture of where we stood and what to prioritise, without the hard sell
They gave us a clear view of our risks and a practical plan to improve security without creating extra overhead for the team.
otooles helped us strengthen our cybersecurity posture while simplifying day-to-day IT demands. Practical, responsive, and commercially minded
otooles have taken real pressure off our internal team. They don't feel like an external provider - they feel like part of the firm.
The assessment was thorough but practical. We got a clear report our board could review without needing a technical background
Common questions from Partners and practice leaders considering a cybersecurity assessment.
A structured, independent review of your firm's technology environment — covering access controls, endpoint protection, email security, data handling, backup and recovery, and business continuity. You receive a written report with prioritised findings and a remediation roadmap.
No. We work independently of your existing IT provider. The assessment is objective and unconflicted — we review your environment as it stands, without any requirement to change suppliers. Your current provider doesn't need to be involved unless you want them to be.
A written assessment report specific to your firm. It includes an executive summary for Partners, a detailed findings section with severity ratings, a prioritised remediation roadmap, and evidence documentation suitable for insurers and regulatory purposes.
Most assessments are completed within two to three weeks - including the scoping call, environment review, and report delivery. We work around your practice schedule, not the other way around.
Yes. PI insurers are increasingly asking firms to evidence cyber controls at renewal. The assessment produces documented evidence of your security posture, the controls in place, and the actions you are taking - which strengthens your position at renewal and can reduce the risk of exclusions or premium increases.
Yes. We work with practice management platforms, client portals, document management systems, cloud accounting integrations, and Microsoft 365 environments. The assessment is scoped around how your practice actually operates — not around a generic IT checklist.
Cyber Essentials is a useful baseline, but it is a self-assessment against a defined checklist. Our assessment goes deeper - reviewing how controls are actually implemented in your environment, identifying gaps between policy and practice, and producing findings specific to your firm rather than a pass/fail against a standard.
Yes. After the assessment, we can support remediation directly, work alongside your existing IT provider to implement changes, or step into an ongoing managed security role. But the assessment stands on its own — there is no obligation to engage further.
We work with accounting and professional services firms between 15 and 80 employees — where the practice has outgrown ad hoc IT but does not have a dedicated security resource internally. This is the inflection point where an independent assessment adds the most value.
The cost depends on the size and complexity of your practice - primarily the number of users, systems in scope, and locations. For a firm of 15 to 40 staff with a single office, assessments typically fall between £2,500 and £4,500. For larger or multi-site practices up to 80 staff, the range is £4,500 to £7,500. We confirm the exact scope and fee after the scoping call - there is no commitment until you have seen a written proposal.
If we identify a critical vulnerability or active exposure during the assessment, we notify you immediately rather than waiting for the final report. The assessment includes a defined escalation process for urgent findings - you will not be left waiting for a document while a serious risk goes unaddressed.
A 30-minute call to understand your practice environment, discuss your priorities, and determine whether the assessment is right for your firm. No preparation required.