Eagle Eye T

To be a one stop shop for all my clients’ needs be it support, procurement and information security to keep their sensitive data safe.

About Me

Jonathan Aquilina - Owner - Eagle Eye T

Hi, I’m Jonathan! We are here to help you achieve your goals and that of your company to keep you and your client’s data safe.  We provide top-notch customer service and support.

Mission & Vision
To be a one-stop-shop for all our clients’ needs be it support, procurement or information security, we ensure sensitive data is kept safe.


Projects completed


Cup of coffee


Satisfied clients


Nominees winner


Managed Services

Looking to outsource IT support and services? Look no further. We at EagleEyeT provide cost effective support solutions and services so that you can focus on what matters most, and that is the business.

Managed Security

We provide a unique approach to cyber security and that is one of a proactive nature where we block potential threat actors before they have the chance to take advantage of any flaws in ones infrastructure or systems.

Procurement & Leasing

We also offer leasing terms for a period starting from 3 years, and after those 3 years we will work with you to renew the lease for new hardware.


We at EagleEyeT can provide you with modern day pbx VOIP solutions along side integrated video conferencing options as well.

Zero Trust Security

Zero Trust is a cyber security concept where we do not out right trust everything but we verify it before we give that trust. Here at EagleEyeT we can work with you to get your zero trust journey.

Phishing Simulation Training

Phishing is a common practice that malicious threat actors use to trick people into giving out sensitive information on sites that look like their original sites.

Dark Web Monitoring

The Dark Web is a place where alot of data ends up when a breach occurs. We crawl the dark web and provide you any updates on compromised credentials that have found their way to the darkweb so that the necessary action can be taken to change and invalidate the old password.

Google Workspace Or Microsoft 365 Backups

In the fine print both Google and Microsoft indemnify themselves from any of your corporate data that might be lost due to unfroseen circumstances. We at EagleEyeT can provide you with a cost effective solution to ensure your data is kept safe and can be restored in case of data loss.

Network Audits

We at EagleEyeT take cyber security seriously. We can carry out a detailed audit and generate a report that can be provided to the necessary people identifying any weak points in ones on prem infrastructure or azure hosted infrastructure.

Password Manager

Passwords are the key to everyone's sensitive information, and this is what hackers try to either obtain through phishing attempts sent out via email, phone call, or even sms.

Workstation & Enterprise Server Backups

We at EagleEyeT have an affordable solution that can allow workstations and servers to be backedup to a secure NAS solution or even backed up to an affordable offsite solution.

Website Development & Hosting

We provide affordable Web hosting packages and can even tailor make one to suite your needs. We use wordpress to quickly get clients websites up and running quickly and securly so they can start to establish their web presence.

Looking for a custom job and further consultancy? Click here to contact me! 👋


2016 - 2019

B.Sc Computing and Information Systems

St. Martins Institute of IT

2015 - 2016

Education Administration Programs

University of St. Thomas (TX)

2010 - 2014


Linux Professional Institute

2019 - Present

Information Technology Administrator

Deloitte Malta

2018 - 2019

Corporate IT Business Developer

Klikk Limited

2015 - 2018

IT Administrator

eCabs Company Limited

EagleEyeT Product/Service Portfolio

  • Everything
  • Dark Web Monitoring
  • Managed Security Services
  • Managed Services
  • Microsoft 365 Backups
  • Network Audits
  • Password Manager
  • Phishing Simulation Training
  • Zero Trust Security
Dark Web Monitoring

What Is The Dark Web?

What Is The Dark Web?

  • The Dark Web is an area of the internet that is not accessible via normal web browsers.
  • The Tor Network is the gateway to the Dark Web.
  • Connect to the network using the special Tor Browser.
  • This is where a lot of sensitive information ends up and is even sold by malicious threat actors.
Phishing Simulation Training

What is Phishing?

What is Phishing?

  • Malicious threat actors targets victims by contacting them by:
  • Email
  • Telephone
  • Text message
  • Threat actors pose as a legitimate institution
  • Try to get individuals to provide sensitive information
  • Personally identifiable information
  • Banking details
  • Credit card details
  • Passwords
Managed Security Services



  • Security agent that sits on your workstation
  • Monitors for:
  • Potential hacker footholds on endpoints
  • Monitors for any potential signs of ransomware
  • Round-the-clock monitoring 24/7/365
  • Provide remediation steps to eliminate the potential hacker footholds or beginning signs of ransomware
Zero Trust Security

What is Zero Trust?

What is Zero Trust?

  • Security Framework
  • Requires all users be it inside or outside the organization to be:
  • Authenticated
  • Authorized
  • Continuously validated
  • Continuous validation is required to ensure the security configuration and posture prior to giving access or retaining access to applications or data
  • Threatlocker will allow you to achieve this
Password Manager



  • Security agent that sits on your workstation or server
  • When initially deploying the agent, it is set into learning mode for a period, so it learns what is currently in use and on the workstations or server
  • After enforcing mode is enabled anything that was not learned will need to be approved and a definition gets define
  • Network Access Control
  • Control over what can be accessed
Microsoft 365 Backups

Microsoft 365 Managed SOC

Microsoft 365 Managed SOC

  • Cost effective 24/7/365 monitoring team that monitors ones Microsoft 365 tenant
  • Any changes that can have security implications get reported via email to confirm they are authorized.
  • If changes are not authorized, remediate steps are provided to fix the issue reported

Clients & Reviews

Sandra Haltner

President / CEO Haltner Design Build

Jonathan assisted with a marketing brochure that was very successful and is still used today.

Warren Camilleri

Tech Operations Specialist

Jonathan is a guy of many talents and ideas, hes quick to find a solution, able to help with issues when needed and his biggest trait is that he listens analyses and then responds with a better answer then expected. Jonathan has and continues to help with the TDF, MLUG, OSSMALTA in his spare time and his contributions is deeply appreciated by the community.

Monika Puchala

Very professional service, he is always ready to help to resolve any IT issues. Skilful and a very competent professional.

Latest Posts

Get In Touch

Let's talk about everything!

Don’t like forms? Send me an email. 👋