top of page
Code Image 1 for TSCM.jpg

Cyber Security Review

The latest Cyber Security Threat research indicates that around 80% of cyber attacks utilizes soft-point entry techniques to compromise networks and gain access.  Ransomware and data theft is both highly disruptive and impacts severely on the organizations' reputation. These attacks are primarily executed using soft entry points such as Phishing, Spoofing, Identity Based Attacks and Social Engineering. Conventional network security focuses on detecting hard-point entry techniques such as Denial of Service attacks which is actively monitored and managed using network based watch-dog type systems and software from within the organizations' own IT security team. We offer a cyber security service aimed at actively assessing your companies soft-point vulnerability.    

Circuit Board

10

Passive Soft Point Attack Review

In collaboration with our client we initiate an organization wide soft-point attack vector review. In this review we utilize Phishing and Spoofing techniques, over a set period, as a means of assessing the client vulnerability and identify individual users for awareness training and cyber behavior training.    

11

Active Soft Point Entry Attack Review

In this we work closely with our client by identifying specific individuals who present a higher entry point risk for the organization. We then, during phase one, initiate a Social Engineering attack vector to assess the interaction with the users, and analyze their behavior, information exchange and social vulnerabilities.

 

During phase two, we initiate an Identity Based Attack vector, with permission of the users, to assess account accessibility, password strength, and other social metric's which could be utilized as entry or confidence points when a hostile attack is initiated.   

Code_edited.jpg
bottom of page