Services for web & data security


  • A team of IT engineers and ISΟ 27001:2013 Lead auditors for information security management systems, with more than 20 years of experience in I.T. security.
  • I.T. security and GDPR consulting
  • I.T. audits
  • Trainings for the information and internet safety
  • Secure websites & e-shops
  • Secure backup your files to the cloud
  • Logo design and business cards design & print


Secure websites

secure e-shops

  • Design and host your personal or business website for desktop / notebook / tablet & smartphones
  • Your own domain name

          and your own email addresses   

         ( fully  


         with computer/tablet/smartphone

  • Webmail (use your email from anywere in the world)
  • Password prodected files (for any folder you want)
  • Secure website in a UK  data center (Free SSL certificate) or in a German data center (Free SSL certificate) &  free custom CMS

Free website builder in your own cpanel.








Design your website with our free website builder or your own wordpress blog from thousand free Wordpress templates.

Free backup and free email address.

  • Design and host your personal or business eshop for desktop / notebook / tablet & smartphones
  • Your own domain name ( and email address (
  • Webmail (Use your email from anywere)
  • Paypal or cash payment options
  • Multible delivery options (by price / weight or free)
  • Multible images for the same product
  • Compare products
  • Multible discounts
  • Your own username and password.






damaged hdd or USB ?


Thousands of working hours...

and the disk has been damaged...

or empty the recycle been?

Files recovery

from a hdd (internal or usb external) or memory stick or camera / smartphone card

gallery/rec-data, following the principles of personal data protection that provided by relevant laws and international conventions, will not do so any unauthorized and unwarranted use of your data. will never disclose, sell, exchange personal information or other information you trust us.

Στις τιμές ΔΕΝ συμπεριλαμβάνεται η αγορά νέας μνήμης ή δίσκου, σε περίπτωση που είναι ήδη χαλασμένος. Ο πελάτης είναι υπεύθυνος να μας παρέχει άλλο μέσο αποθήκευσης.

Στις υπηρεσίες μας ΔΕΝ συμπεριλαμβάνεται εγκατάσταση προγραμμάτων π.χ. Windows/Office/Antivirus κτλ. Μόνο επανάκτηση δεδομένων, όπως αρχεία π.χ.Word/Excel/Powerpoint/Access/Acrobat reader/Autocad/Images/Videos και πολλά άλλα !!

Personal data prodection   Προστασία προσωπικών δεδομένων

Terms & conditions /  Όροι & προϋποθέσεις

Usb memory stick or cd/dvd: 95€

Memory card for mobile, camera, video camera: 125€    

Desktop hdd or notebook hdd or external hdd: 215€

Το, ακολουθώντας τις αρχές της προστασίας των προσωπικών δεδοµένων που προβλέπονται από τους σχετικούς νόµους και διεθνείς συµβάσεις, δεν πρόκειται να προβεί σε οποιαδήποτε αθέµιτη και χωρίς την προηγούµενη έγκρισή σας, χρήση των δεδομένων σας.

To µε κανέναν τρόπο ΔΕΝ αποκαλύπτει, δηµοσιοποιεί, πωλεί, ανταλλάσσει τα προσωπικά στοιχεία και τις πληροφορίες που µας εµπιστεύεστε.

Prices DO NOT include the purchase of a new memory or disk if it is already damaged. The customer is responsible for providing us with another storage.

Our services DO NOT include installation of programs, f.e. Windows/ Office/Antivirus etc. Only retrieving data such as Word/Excel/Powerpoint/Access/Acrobat Reader/ Autocad/Images/Videos and more!

ISO 27001 implementation, documentation & certification


  • ISO/IEC 27001:2013 specifies the requirements for setting an information systems management system within the context of the organization.
  • ISMS (information systems management system) has been defined as a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organisation’s information security to achieve business objectives.
  • It also includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic, can be applied to all types of organizations and can be customized as per management intent

The structure of the ISO/IEC 27001:2013 is as follows:

  •    Introduction
  •    Normative references
  •    Terms and definitions
  •    Context of the organization
  •    Leadership
  •    Planning
  •    Support
  •    Operation
  •    Performance evaluation
  •    Improvement

Determining organization context and check for prescribed controls. These include:

  •   Information security policies
  •   Organization of information security
  •   Human resource security
  •   Asset management
  •   Access control
  •   Cryptography
  •   Physical and environmental security
  •   Operations security
  •   Communications security
  •   System acquisition, development and maintenance
  •   Supplier relationships
  •   Information security incident management
  •   Information security aspects of business continuity management
  •   Compliance

Management can delineate the scope to be covered under the ISO 27001 standard. We examine in scope applications to check the information security system including physical access, logical access, database controls, network controls, internet controls, intranet controls, controls in remote connectivity, etc. Evaluating or drafting new security policy to accommodate a secure management system in compliance to standard is our main objective.


Contact US



Phone:   95 500 250 / 99 489791

I am interesting for