From cybersecurity to cyberresilience
Cybersecurity Coaching as a Service
We are convinced that the continuous commitment to cyber security is the only right strategy to cyber resilience. After all, you don't ‘just’ drive your car safely for a while either, you do so continuously.
You want to start taking some concrete measures but have no idea where to start? You have a meeting with an IT supplier but are looking for reinforcement in terms of IT/Cyber knowledge to have a well-founded conversation?
The CyberSecurity coach guides you in continuously taking the right steps and can do so in the following ways:
- Ad Hoc
- Ad hoc moments, freely schedulable
- Packaged
- A CyberSecurity day every month for x months
Our CyberSecurity Coach works on well-known nationally/internationally existing security frameworks with which we take you to the necessary level of cyber resilience.
CyberSecurity Awareness Workshop
The fact that we make it very easy for hackers, often without realising it, becomes clear to you in our CyberSecurity Awareness Workshop. During our 2 to max 4-hour workshop, we dive into the world of:
- Phishing, Spearphishing, Smishing, Phone fraud
- Password policies, Tips & tricks
- Do's and dont's on the internet
- How to recognise safe websites
- How to make it easy for hackers
- How to test yourself
- A.I. within hacking, how to deal with this?
Phishing training & cybersecurity e-learning
The human factor remains in the top three as a cause of a cyber incident. In some haste and urgency, a rogue link is quickly clicked, a wrong QR code causes drama, or the refund email from a known supplier or government agency is just enticing enough to click through.
With phishing training, we ensure that employees are and remain attentive in assessing legitimate emails, and report on the results without using the principle of a wall-of-shame. Recourse is important, we think randomness is even more important. From a community of local ethical phishers, the most credible phishing emails are created that, like cybercriminals, can respond well to current events.
SecureScan Light
We map the open digital windows and doors and show you how a cybercriminal looks at your business. This is done in an external, non-invasive way. We write this out in a report that tells you in human language what the impact of those open doors and windows might be.
SecureScan Pro
We go into more detail with the scanning (still in a remote non-invasive way) and also look at the links to private accounts, go into more detail on firewall and IP Address of the office...
SecureScan O365
We look very specifically at the setup of your O365 environment to bring up possible misconfiguration, forgotten accounts, old virtual machines... to the surface.
SecureAudit Core
With auditing, we go much deeper than scanning. We effectively enter the internal network and think like a cybercriminal would, with even the possibility of physical access control
- Listing devices with missing patches, ...
- Attempt to crack passwords/logins Active directory
- How quickly full admin on devices/domain
- Internal DNS checks, checks used cerOficates
- Internal site checks, Cloud links
- Backup analysis if backups are found
- Documents scan for password & logins
- Man-in-the middle attack simulation
SecureAudit Shield
On top of the actions in the Core Audit, we are going to run phishing simulations and even try to gain physical access to PCs, Servers, Server rooms... access.