Affordable cyber resilience services
- Security Awareness Training - The training is focussed on those with little or no cyber security or technical knowledge and is delivered in small, succinct modules using real world examples.
Corporate Internet Discovery - This service may be used to learn what is being said on the internet about an organisation, what information employees are releasing or if there are any damaging news stories, social media posts or associations.
- Individual Internet Investigation - The information gathered in this type of investigation might be used to support pre-employment checks, to manage potential threats to a Director of an organisation or their families, or to understand more about a specific person of interest.
- Remote Vulnerability Assessment - Remote vulnerability assessments are focussed on identifying weaknesses in the way your organisation connects to the internet. Service reporting will provide a plain language interpretation of the results and how any vulnerabilities might be used by an attacker, as well as simple instructions on how any vulnerabilities might be fixed.
- Internal Vulnerability Assessment - The service will scan and review your internal networks and systems looking for weaknesses such as poorly maintained or designed systems, insecure Wi-Fi networks, insecure access controls, or opportunities to access and steal sensitive data.
- Web App Vulnerability Assessment - This service assesses your website and web services for weaknesses. The service reporting will describe in plain language, what each weakness means to your business and the risks associated with each. Service reporting will include plans and guidance on how to fix those weaknesses.
- Security Policy Review - This service offers a review of your current security policy, how it is written and how it is implemented.
- Cyber Business Continuity Review - This service offers a review of your business continuity planning and the resilience of your organisation to cyber-attacks such as ransomware or when attackers take control of your core systems.