Cybercriminals hack devices, steal personal information, send spam, run phishing scans and target bank accounts.
It’s a global problem. How do you know your business is secure?
Identify & Prioritise
We begin every project by using a number of techniques to prioritise assets in terms of their vulnerabilities. This will chart a path to any possible exploitation vectors, which will be discussed with the client before any exploitation attempts are made if needed. If we identify any critical vulnerability that requires immediate attention, we’ll inform the organisation straight away to minimise the window of exposure.
Post exploitation, Defence Logic will use any access or privileges to attempt privilege escalation attacks penetrate your networks at the highest level possible. Detailed records will be kept charting our path including recovered data and copies of files that were changed. Our aim is to minimise disruption to any systems.
We produce a full report for your organisation which details the testing outcome and the paths taken to achieve any outcomes. Our risks are classified in accordance with the CVSS rating for any vulnerabilities found.