Operated by Genis Pieterse Consulting (Pty) Ltd
Cyber Security Review
The latest Cyber Security Threat research indicates that around 80% of cyber attacks utilizes soft-point entry techniques to compromise networks and gain access. Ransomware and data theft is both highly disruptive and impacts severely on the organizations' reputation. These attacks are primarily executed using soft entry points such as Phishing, Spoofing, Identity Based Attacks and Social Engineering. Conventional network security focuses on detecting hard-point entry techniques such as Denial of Service attacks which is actively monitored and managed using network based watch-dog type systems and software from within the organizations' own IT security team. We offer a cyber security service aimed at actively assessing your companies soft-point vulnerability.
10
Passive Soft Point Attack Review
In collaboration with our client we initiate an organization wide soft-point attack vector review. In this review we utilize Phishing and Spoofing techniques, over a set period, as a means of assessing the client vulnerability and identify individual users for awareness training and cyber behavior training.
11
Active Soft Point Entry Attack Review
In this we work closely with our client by identifying specific individuals who present a higher entry point risk for the organization. We then, during phase one, initiate a Social Engineering attack vector to assess the interaction with the users, and analyze their behavior, information exchange and social vulnerabilities.
During phase two, we initiate an Identity Based Attack vector, with permission of the users, to assess account accessibility, password strength, and other social metric's which could be utilized as entry or confidence points when a hostile attack is initiated.