Make Your IT Systems and Information More Secure
Cybersecurity is a persistent and increasing business risk for organizations that depend on mobile endpoints that connect through networked and cloud-enabled platforms.
With solutions tailored to your specific needs, BlackBerry’s cybersecurity consulting and tools will help you:
- Identify the latest cybersecurity threats
- Develop risk appropriate mitigation strategies
- Implement and maintain IT security standards and techniques
- Defend against the risk of future attacks
Penetration testing is the process of attempting to gain access to computer systems, networks, mobile devices, wireless communications and web applications, without knowledge of usernames, passwords or any other normal means of access. With permission from your organization to test, the ultimate goal is to find vulnerabilities that a hacker could exploit and tell you how to remove the vulnerability.
Standard types of testing available include:
External penetration testing to ensure that your Company’s IT systems are secure from any internet based attack.
Internal penetration testing to reveal any potential issues that may allow a server to be compromised by a user already on the internal network, including internal employees.
PCI DSS ASV Scanning to scan infrastructure related to card payments.
Social Engineering to identify environment and human vulnerabilities that can threaten your networks.
THINK (Threat Intelligence and Knowledge) service provides a unique and ‘real world’ approach to assessing the security of your organization. Cyber threats can come from any of a number of sources, but all have one advantage in common: time. To better simulate this reality, unlike a standard penetration test, a THINK test will typically occur over a period of time. This allows the testers to observe the targets and choose the most effective time for an attack, or attempt multiple low scale assaults to gain an understanding of the nature of protections in place.
Cyber Essentials Plus
Are you a supplier to the Ministry of Defense or its Supply Chain?
From January 2016 the MoD will stipulate in all new contracts for MoD identifiable products and services that Cyber Essentials or Cyber Essentials PLUS is a requirement upon commencement of the contract.
Encription Limited is an authorized certification body under the QG Cyber Essentials accreditation scheme
Unlock the potential of digital evidence. Today, crime often involves use of digital devices either directly or indirectly. A forensic examination of these devices can reveal important information that could strengthen a case.
Choose from a range of forensic services including:
Digital forensic investigations on hard drives, removable media, digital cameras and smartphones.
Incident response support to advise on the correct steps to follow in order to ensure evidence is collected and the incident is contained.
One-day onsite forensic readiness consultation to help you develop an incident response plan.
Damaged drive recovery can help you avoid losing business critical data contained on hard disks.
IT Security Training
Learn how to protect your organization from potential threats with a wide range of professional IT security and forensics training courses. These courses are delivered either on-site or in-house by active penetration testers.
Link CSS Override
Have a look at some of the tools and resources available, or get in touch with us to inquire further about the services available.