Cyber protect plus Methodology
1. IDENTIFY
We begin every engagement by ensuring we have a thorough understanding of our customers’ requirements as we realize no two engagements are created equal. Meeting with our team will help us understand and identify your desired objectives and outcomes.
2. ASSESS
At the start of your engagement, our team will begin by assessing your company’s environment, including your technical and personnel within the company. At this stage, we begin formulating our plan of attack and begin the data-gathering stage of our assessment.
3. EXPLOIT
Once our team has completed their data-gathering stage they will begin attempting to exploit a wide range of items including misconfigurations, vulnerabilities, human errors, compromised credentials, and more. All exploitation is completed in a non-destructive manner.
4. REMEDIATE
Upon reaching the conclusion of your engagement our team will work to compile our findings into a final report which will be shared with your team. This report will outline items of concern that were found during our test along with required remediation steps to safeguard your business against future cyber attacks.