Cyber Security Assessment _ through CIS Framework controls, we identify security gaps in the infrastructure design and in corporate procedures concerning recognized frameworks such as NIST and ISO 27001
Phishing Assessment _ we test user behavior and ability to manage and assess risk by sending a simulated phishing e-mail
Vulnerability Assessment _ we scan all corporate IP addresses in search of open ports with the related exposed services. Having enumerated the vulnerabilities with the relative CVEs, we move on to suggesting remediation activities to be carried out to resolve the risk.
Penetration test _ we carry out targeted penetration tests using a PenTester on services hosted on specific Hosts following a VA. These tests require known, unknown, and/or ad-hoc purchased standard exploiting techniques.
OSINT _ we identify attack areas that can be exploited by cybercriminals to harvest sensitive information