top of page
AdobeStock_428712893.jpeg

Cyber Security & Resilience Services

Our integrated range of cyber security services are designed to help businesses assess, build and manage online networks. They also assist businesses and their staff to have the right strategies to respond to incidents efficiently and to mitigate any potential damage a cyber-attack may create.

 

Through Cyber PATH, local university students are trained and mentored by senior ethical hackers, to deliver all our services and to work with staff to build their cyber awareness, understand the latest cyber threats and secure the business's online environment. 

Remote Vulnerability Assessment

If your organisation is connected to the internet, this service will remotely review that connection in the same way as an attacker would perform reconnaissance, looking for potential weaknesses.

 

The service uses the same toolsets and skill sets that hackers use to map your organisation's internet connections. This service also benefits from regional Police and National Cyber Security Centre intelligence to capture the very latest known threats and techniques used by cyber criminals.

It should be noted that although the interaction with your systems is kept to a minimum, there is always a risk that poorly maintained or designed systems can suffer outages during vulnerability assessments. That is why all remote vulnerability assessments are supported with back-out and recovery plans agreed in advance to minimise risk.

 

Remote vulnerability assessments are not penetration tests, where the goal is complete systems compromise or to take full control of your systems. Remote vulnerability assessments are focused on identifying weakness that might be used to achieve that compromise.

 

Service reporting will provide a plain language interpretation of the results and how any vulnerabilities might be used by an attacker, as well as simple instructions on how any vulnerabilities might be fixed. 

To discuss whether  a Remote Vulnerability Assessment might be suitable for your business get in touch via the button below.

Remote Vulnerability Assessment
bottom of page