Basics Covered. Gaps Remain.

Legacy

Legacy gives you the essential building blocks of cyber security — monitoring, patching, and basic threat protection. It’s a starting point, not a full solution. If this is all you have, your business is exposed to modern threats that move fast and hit hard.

Hackers Perspective

Three Stages of a Cyber Attack

Cyber threats don’t strike all at once — they build up in stages. Once they’re in, they move quickly: testing systems, spreading quietly, and then applying pressure through extortion and disruption.

1

Opportunity

Bad people looking for a way in
Cyber criminals start by searching for easy entry points — a weak password, an unpatched system, or a user who clicks the wrong link. This is where strong prevention makes all the difference.
Common tactics
Exploiting vulnerabilities: Out-of-date software or missing security patches.
Email traps: Phishing links, fake invoices, or bogus MFA prompts.
Weak access points: Guessable passwords, reused logins, or exposed remote-access tools.

2

Resistance

Bad people inside your organisation
Once inside, attackers aim to take control. They encrypt data, move across systems, and disable your protections — often before you even notice.
Common tactics
Privilege escalation: Gaining admin-level access.
Lateral movement: Jumping between servers, mailboxes, and file stores.
Disabling defences: Tampering with backups, antivirus, or logging tools.

3

Leverage

The bad people making demands
With control established, attackers turn to extortion — locking systems, stealing data, and disrupting operations to demand payment or force action.
Common tactics
Ransomware lock-ups: Encrypting systems and demanding payment.
Data theft + blackmail: Threatening to leak sensitive information.
Operational disruption: Taking down servers, phones, or cloud services to create chaos and urgency.

Greg, Technical Director

If all you’ve got is Legacy, you’re technically covered — but only just. My advice? Don’t rely on minimum standards to defend against maximum‑risk threats.”

Cyber Security Packages

Cyber attacks target weaknesses at every stage. This table shows how each package strengthens your organisation across the six key security areas — from prevention and detection to continuity and recovery.

Security Areas
The parts of your organisation attackers target
Stage of Attack
Where attackers exploit this weakness
Okay
Basic controls, risks will likely remain
Good
Strong controls, reduced exposure
Excellent
High resillience, modern best practice
People & Behaviour
Opportunity
Devices & Networks
Opportunity
Detection & Response
Resistance
Configuration & Preparedness
Resistance
Recovery & Containment
Leverage
Continuity & Communication
Leverage
Security Areas
The parts of your organisation attackers target
Stage of Attack
Where attackers exploit this weakness
Okay
Basic controls, risks will likely remain
Good
Strong controls, reduced exposure
Excellent
High resillience, modern best practice
People & Behaviour
Opportunity
Devices & Networks
Opportunity
Detection & Response
Resistance
Configuration & Preparedness
Resistance
Recovery & Containment
Leverage
Continuity & Communication
Leverage
Security Areas
The parts of your organisation attackers target
Stage of Attack
Where attackers exploit this weakness
Okay
Basic controls, risks will likely remain
Good
Strong controls, reduced exposure
Excellent
High resillience, modern best practice
People & Behaviour
Opportunity
Devices & Networks
Opportunity
Detection & Response
Resistance
Configuration & Preparedness
Resistance
Recovery & Containment
Leverage
Continuity & Communication
Leverage
When combined with Advanced Backup, Microsoft 365 Premium and Cyber Essentials

Legacy Cyber Package FAQs

Get clear, simple answers about what the Legacy package does — and doesn’t cover, so you can understand where it fits into your organisation’s overall cyber security.

View All FAQs
Why is the Legacy package considered a starting point, not a full solution?
Can I upgrade from Legacy to a stronger package later?
Can a basic package help with cyber insurance requirements?
What’s the most affordable way for an SME to strengthen cyber security?
What are the main risks if I only have the Legacy package?

Related Services

Legacy

Basics Covered. Risks Remain - Essential protection with antivirus, patching, and basic security controls. A safe starting point, but not enough for today’s threats.

Proactive

Threats Prevented. Attacks Stopped. Advanced monitoring, detection, and awareness that strengthen your defences and stop most attacks before they start.

Mitgation & Response

Incidents Contained. Operations Restored. Rapid response, recovery, and continuity planning so you can act fast and minimise disruption when issues arise.

Certification & Compliance

Standards Met. Trust Earned. Achieve Cyber Essentials and align with recognised frameworks like IASME, GDPR, and ISO27001 to prove your resilience.

IT Support

Fast, friendly, and reliable support whenever you need it, ensuring minimal downtime and maximum productivity.

Internet

Dunedin IT delivers internet that’s fast, stable, and ready for business growth.

Microsoft 365

We help over 200 organisations maximise the benefits of Microsoft 365, improving the tools that foster collaboration, communication, and growth.

Automation & Workflow Intelligence

Repetition Removed. Productivity Unlocked. Free your team from manual tasks with AI-driven process automation and RPA that runs 24/7.

Behind the Scenes: How Your Backup & Continuity Works

A quick look at the tools, monitoring, and planning behind Dunedin IT’s backup and continuity service. These are the systems that keep your data protected, your operations resilient, and your team supported — without the stress of managing backup platforms yourself.

Monitoring & Investigation
We actively monitor your backups every day — checking success rates, errors, storage health, and recovery points. When something doesn’t look right, we investigate it before it becomes a problem.
Proactive Issue Detection
Backup issues are found — and fixed — before they affect your business.
Storage & Hosting Management
We manage the cloud and onsite storage behind your backups — capacity, security, encryption, and performance — ensuring everything runs smoothly in the background.

Reliable Storage Platforms
Secure, optimised storage that grows with your business.
Testing & Recovery Verification
Backups aren’t enough — they must restore correctly. We run scheduled recovery tests to verify that your data, systems, and continuity plans work in real-life scenarios.
Proven Recoverability
Confidence that your backups will restore when your organisation needs them most.
Operational Understanding
We take time to understand what is genuinely important to your business — the systems, processes, and data that matter most. Your continuity setup is built around real-world operations, not generic templates.
Business-First Priorities
Protection focused on what keeps your organisation running.
Retention, Compliance & Data Governance
We manage backup retention schedules that align with your industry regulations, compliance requirements, and internal policies — ensuring your business keeps the right data for the right length of time.
Structured Data Retention
Your organisation stays compliant without having to manage storage rules yourself.
Contacting Us
Phone, email, Teams chat, online portal — whatever works for you. No long waits. No generic scripts. Just people who know your setup and your recovery plan.
Human Support
Fast answers, clear guidance, and practical help when things go wrong.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Remove Cyber Worries. Strengthen Your Security Today.

Dunedin IT delivers secure backups, reliable recovery, and clear continuity planning — managed by real people who know your setup. Share your details and our team will make sure your data is protected, your risks are reduced, and your organisation stays operational when it matters most.

Our Locations

Edinburgh . Glasgow . Northumberland . Sussex

Our Number

0330 058 1701