Services

Consulting

We provide consultation on the various aspects of Information Security, including risk assessments, policy writing, incident response planning, and employee education. 

 

Security Testing and Auditing

We provide various services for testing an organizations security implementations, including network assessments, penetration testing, social engineering assessments, and web application testing.

  • Network Vulnerability Test

A network vulnerability test is a basic assessment of an organization’s network, highlighting any potential vulnerabilities with a report delivered to the client after the scan is complete. It will give a quick and broad assessment of major weaknesses in the client’s network.

  • Network Penetration Testing

This is a targeted network test that will focus on the network security of the client. We will use different technologies and tactics to try and breach or manipulate the network. A comprehensive report will be delivered to the client upon completion.

  • Physical Penetration Testing

This is a targeted test that will focus on the physical security of the client. We will use different tactics and strategies to try to breach or manipulate physical security mechanisms to gain entry into secured areas of the organization. A comprehensive report will be delivered to the client upon completion.

  • Social Engineering

This is a coordinated test on a physical client site. We will use different methods and techniques to manipulate the employees in an organization and try and discover security weaknesses that are uniquely human. A report will be provided upon completion.

  • Web Application Testing

Web applications are often less secure than the networks that support them. We will target these applications specifically to find security vulnerabilities that could potentially be exploited. A comprehensive report will be delivered upon completion.

 

Secure Document Destruction

We provide secure receptacles for employees to deposit confidential documents in rather than throwing them in the trash where attackers could potentially recover them. We then trade out these receptacles on a monthly schedule and transfer the documents to our secure destruction site.

Schedule a consultation today!