NOTE: CyberCecurity offers a full range of both assessment and technical testing services. Our assessment services examine your strategic governance of risk management. The technical testing utilizes ethical hacker best practices to reconnoiter and/or attempt to penetrate your IT infrastructure--just like a hacker would. For more information about our ASSESSMENT services please go to: https://www.cybercecurity.com/assessments-and-testing
The IT infrastructure technical testing services are designed to actually TEST and/or monitor the quality of your IT infrastructure defenses. Our IT infrastructure technical testing services include:
IT infrastructure technical testing features include:
The following IT infrastructure technical testing options are available:
Vulnerability Testing: (Delivery time: approx. 2-4 weeks) Vulnerability testing is the process of defining, identifying, classifying and prioritizing vulnerabilities in computer systems, applications and network infrastructures. Typically, vulnerability testing consists of both automated and manual processes. Vulnerability testing is also referred to as “vulnerability scans” and “vulnerability assessments.”
Types of vulnerability testing available to you: Network, application, mobile, database, host-based, wireless network. Also note that there is EXTERNAL testing and INTERNAL testing. External is when we simulate an attacker that is not in your system yet and who is reconnoitering your system prior to a penetration attempt. Internal is when the tester is already inside your system and is trying to move laterally within your system.
Penetration Testing: (Delivery time: approx. 30-60 days) A primary difference between penetration testing and vulnerability testing is that it is more aggressive and attempts to breach your systems’ external and internal defenses. Penetration testing is also referred to as “ethical hacking.”
Penetration testing attempts to exploit vulnerabilities identified during vulnerability testing. Penetration testing consists of both automated and manual processes–but depending on the situation, more manual processes will be employed. The same types of penetration tests are available as vulnerability tests described above.
Physical Testing: (Delivery time: approx. 2-4 weeks) Also referred to as “cyber-physical security tests,” ”red teaming” or ”physical penetration testing,” these are primarily manual tests of your company’s physical security. They evaluate things like video security, alarms systems, visitor monitoring, work area security, etc. They also look at things like “can the after-hours cleaning personnel get access to our systems and data?”
Social Engineering Testing: (Delivery time: approx. 2-4 weeks) Social engineering refers to all techniques aimed at tricking or manipulating a target into revealing specific information or performing a specific action for illegitimate reasons. Social engineering is at the core of ransomware and other popular email “phishing” attacks. Common social engineering attacks include phishing, vishing, pretexting, baiting, quid pro quo, tailgating, and CEO fraud.
External Attack Surface Testing (EAST): (Delivery time: TBD) EAST testing shares some commonalities with vulnerability testing in that both types of test are probing you EXTERNALLY and collecting information. EAST goes a bit further by continuously monitoring the communications between your company and external sources and warning you of known and possible threats.
Open Source Intelligence Testing (OSINT): (Delivery time: approx. 2-4 weeks) OSINT is a manual and automated process of intelligence gathering on the open and dark webs for posted/public information related to individuals and companies that can be used for attack. This intelligence gathering process includes social media platforms.
For more testing and pricing information please contact:
Ray Hutchins, Managing Partner
CyberCecurity
rh@cybercecurity.com
303-887-5864
Common question: My CIO is in favor of bringing in a consulting firm to assess our security program following a series of minor security incidents. I'm reluctant to do so because I think it will only serve as a distraction. Should I hold firm, or find a way to work with the consultants, and if so, what's the best way to do so. ANSWER. |