Methodologies, frameworks, tools and software
By following a methodical approach we will perform Penetration Tests, Red Team exercises or a number of other Information Security Services. At end of which you get a detailed report documenting the entire process and the steps taken.
If you think you are 100% secure, then you probably have been 100% breached already. Security is a layered strategy and a moving target.
60% of businesses closed within 6 months
90% of the remainder closed within 2 years
Some more statistics here.
There are multiple indicators a breach. Like, pop-ups, anti-virus being deactivated, strange files appearing on hard drive, wallpaper image changes, etc.
The problem is that these days with sophitcated attackers you will most likely never know you were breached till it is far too late. Usually victims find out about the breach via a third party at which time your data is already on the internet.
You can submit the query to us and we can assist you in following up on the issue. You can submit it directly to the parties involved and to the police.
Social Media: (bottom of screen)
Phone: 071 371 2416
Attend conferences, usergroups and discussion groups. Donate something (could be time) to the local hackspaces. Conbribute to open source projects. Create open source hardware.
Sorry but you can't right now, we're getting there.