This statement is made pursuant to section 54(1) of the Modern Slavery Act 2015 and sets out the steps AML “Midlands” Ltd has taken to ensure that slavery and human trafficking are not taking place in our supply chains or in any part of our business.
AML “Midlands” Ltd is committed to acting ethically and with integrity in all our business relationships and to implementing and enforcing effective systems and controls to ensure modern slavery is not taking place anywhere in our own business or in our supply chains.
AML “Midlands Ltd” operates in the Technology sector, with offices in the UK. The company employs approximately 10 staff, including both permanent and contract workers.
It functions as a standalone entity but works closely with a network of subcontractors and strategic partners. The company’s supply chain includes materials, logistics, and services sourced from both domestic and international suppliers, particularly in Europe.
Our supply chains include the sourcing of [products/services/materials] from [regions or types of suppliers]. We recognise that some regions and sectors may carry a higher risk of modern slavery and human trafficking.
We expect all our suppliers to adhere to our ethical standards and comply with applicable laws regarding labour practices and human rights.
We have implemented the following policies to support our commitment to preventing modern slavery and human trafficking:
Anti-Slavery and Human Trafficking Policy – outlines our zero-tolerance approach to modern slavery.
Supplier Code of Conduct – sets out clear expectations of ethical conduct.
Whistleblowing Policy – provides a mechanism for employees and stakeholders to report concerns, including modern slavery.
We carry out due diligence on our suppliers, especially those operating in high-risk sectors or geographies. This includes:
Assessing potential risk areas in our supply chains
Conducting supplier audits and site visits where appropriate
Requiring suppliers to confirm compliance with our policies
We are working to enhance our supplier onboarding process to better identify and manage risks related to forced labour.
We provide training to key staff involved in procurement and supply chain management, helping them to identify signs of modern slavery and understand how to respond to concerns.
We use the following key performance indicators (KPIs) to measure our effectiveness in ensuring slavery and human trafficking are not taking place:
Number of staff trained
Number of supplier audits completed
Number of reported incidents and responses
We are committed to reviewing and improving our processes regularly.
Think of these as different “levels” of security watching over your systems:
🔹 EDR (Endpoint Detection & Response)
Focus: Individual devices (laptops, desktops, servers)
EDR is like having a security guard on each device. It monitors activity, detects suspicious behaviour (like malware or hacking attempts), and helps respond quickly if something goes wrong.
👉 Simple way to say it:
“EDR protects the devices your team uses every day.”
🔹 MDR (Managed Detection & Response)
Focus: Outsourced expert monitoring
MDR builds on EDR by adding a team of cybersecurity experts who monitor alerts for you 24/7 and respond to threats.
👉 Simple way to say it:
“MDR gives you a security team without hiring one.”
🔹 XDR (Extended Detection & Response)
Focus: Everything working together (devices, email, network, cloud)
XDR connects multiple security tools into one system, giving a broader view of threats across your entire environment—not just devices.
👉 Simple way to say it:
“XDR sees the bigger picture across your whole IT environment.”
🔹 ITDR (Identity Threat Detection & Response)
Focus: User identities and access (logins, accounts)
ITDR protects against attacks targeting user accounts—like stolen passwords or phishing—by monitoring how identities are used and spotting unusual behaviour.
👉 Simple way to say it:
“ITDR protects your users’ identities—the front door to your systems.”
A common question we often get asked by our clients is what Anti-virus do you recommended or should you stick Microsoft Defender. While both are great at keeping your device safe, Bitdefender has some additional features that are incredibly advantageous to keep your business safe and secure.
Real-Time Protection: Bitdefender is known for its superior real-time threat detection and response capabilities, which can provide more comprehensive protection against emerging threats.
Additional Security Layers: Bitdefender includes features like ransomware protection, banking and payment protection, and network attack protection, which add extra layers of security to your digital life.
Advanced Features: Bitdefender offers a range of advanced features that Microsoft Defender lacks, such as webcam and microphone protection, a robust VPN service, and a file shredder.
To conclude I think Microsoft Defender is a solid, free option that comes pre-installed with Windows. However, if you are a business, you will need more advanced features and comprehensive protection, making Bitdefender the better choice.
This is only my opinion and not necessarily the view of the company.