Cyber Investigations & IT Security

In a constantly-changing world where everything and everyone depends on digital resources and connections, there are always flaws, incidents and malicious entities that can harm your data or infrastructure. Whether it concerns a crashed disk, disgruntled employee with malicious intentions or a competitor who wants to intercept your confidential communications, we offer professional and tailor-made solutions. To us, it is crucial that your information stays safe, is treated with the utmost care it deserves and that you feel safe and confident in the protection and security of your data, devices and staff.

A few of the services that we offer include:

External Penetration Testing

✓ Service Detection
✓ Vulnerability Scanning
✓ PCI-DSS Audits

Web Penetration Testing

These days, most customer-impacting attacks involve the exploiting of vulnerabilities in websites. Our services can be used against open-source CMS frameworks, custom-developed banking websites, tailored web forms and basically anything else that is publicly accessible. We can test for specific vulnerabilities such as SQL injection attacks, XSS vulnerabilities or WAF evasion techniques.

Network Auditing and Penetration Testing

✓ Auditing of policies and documentation
✓ Penetration testing of internal networks – simulating a hacker attacking your network
✓ Vulnerability assessments
✓ Network stress-testing

Digital Forensics

✓ Data recovery – crashed hard-disks, unbootable computers and in some cases even encrypted disks or volumes can be recovered. This includes, but is not limited to, exposure to fire, water and external forces.
✓ Tracking and tagging – we can not only identify rogue users and devices but can also profile suspect users, their devices and their internet traffic.
✓ Dump analysis – if your company was attacked and your IDS has created a traffic dump, we can interpret it and report exactly what happened and how it happened.
✓ Damage reports / post-mortem reports – want to know what happened, what damage was done and how this can be prevented in the future? No problem! We will happily provide you with a full overview of the attacks and will report on any damage done.

Awareness & Training

✓ In-depth training for system and network administrators or operations teams
✓ Employee awareness training

Consultancy and Risk Assessment

✓ Analysis and reporting of all kinds of solutions
✓ Advising on network and hardware solutions

Configuring Infrastructure

Should you require any equipment to be securely configured, do not hesitate to contact us. This covers almost any operating system, hardware or service, ranging from network infrastructure to private mail-servers, service configurations (hardening) or appliance configurations.