what we do?
Before we can advise and implement security adjustments we need to examine your infrastructure to determine your current level of risk. Offcourse this is done with the highest confidentiality.
When the current level of risk has been determined we will advice you with a set of best practises to harden your IT-Security. This is done by technical and social advise (like social hacking techniques).
After our advise has been given and implemented by your organisation we will check if the current level of risk has been lowered. After all : security is a continuously process !
keep in touch
We value a good relationship with our customers. So it is important to stay in contact. A relationship which is built on trust,confidentiality and result is what counts.
WHO WE ARE ?
Our goal is to harden security at local and semi-government institutions and small to medium companies. We have more than 15 years experience and extensive knowledge of firewalls , operating systems, ethical- and social hacking and penetration tests.
Because of our small team we can offer our services and know-how for a small fee.
We want to make security-advice AFFORDABLE.
Contact us for our current rates.
On a scale from 1 to 100 percent, how much do you think is your company at risk?
Do you know the answer ?
- Microsoft Patch Tuesday – August 2017 August 9, 2017This month the vendor has patched 48 vulnerabilities, 26 of which are rated Critical. Publish to Facebook: No Twitter Card Style: summary This month Microsoft has patched 48 vulnerabilities, 26 of which are rated Critical. As always, customers are advised to follow these security best practices: read more
- Latest Intelligence for July 2017 August 4, 2017Email malware rate continues to increase and WannaCry, Petya inspire other threats to add self-spreading components. Publish to Facebook: No Twitter Card Style: summary read more
- Attackers are increasingly living off the land July 12, 2017The use of fileless threats and dual-use tools by attackers is becoming more common. Background Image on Blogs "Quilted" Page: SR-EB-Header-image43_4.jpg Publish to Facebook: No Twitter Card Style: summary Click to Tweet: Attackers increasingly using legitimate tools to hide in plain sight All 10 APTs Symantec looked at used system tools in their attacks Click […]