Let us launch a controlled cyber-attack on your network, applications, processes or environments. Security is a very important component to any organization that is connected to the Internet. Please feel free to send us an email to begin a conversation about what types of tests your organization could use.
Let us run comprehensive snapshots of known vulnerabilities detected on Internet-facing hosts for your company. This can be a one-off process or continued weekly, monthly or yearly. We provide your organization with a detailed report on your network, point out potential hazards and suggest fixes. Stay on top of all the current threats on the Internet.
We can implement social engineering in the context of information security, by using psychological manipulation on your organization by performing certain actions or divulging confidential information.
Remote Tests are used to trick an employee into compromising confidential data using electronic means. The tester could conduct such an attack via a phishing email campaign.
Physical Tests require direct contact with the employee to retrieve sensitive information. It may also involve tactics like Dumpster Diving, Imitation, Intimidation or trying to convince the subject via telephone calls.
We will look at discovering vulnerabilities and gaps in your network infrastructure. We can check both internal and external access points, by running tests locally at your site and/or remotely from the Internet.
We target the following network areas in our penetration tests:
We also test software modules with penetration testing:
Our mobile tests intend to analyze the wireless devices used at the client site. The list of devices includes items such as tablets, laptops, notebooks, smartphones, etc. We also test the protocols used for configuring wireless, and access points for wireless setup.
Copyright © 2021 Get Event Log - All Rights Reserved.