Tailored Security Briefings (Cyber/Physical)

With decades of experience in education and training at all levels, we can design an appropriate program for your employees that is both engaging and informative.  It is important to note security has two sides, physical and cyber.  Some of the basic concepts apply to both, but they become very different quickly.  The most requested training programs involve email based threats, phishing, spear phishing, ransomware and social engineering.

Internal Investigations

Internal investigations must be handled confidentially and objectively as the accused employee’s future is at stake.  All of our investigators are retired FBI Special Agents, with at least 25 years of experience in both criminal and national security investigations.  It goes without saying the amount of discretion necessary to successfully investigate a national security threat.  Our Internal Investigation service effectively provides the information necessary to move forward either to handle the situation internally or to turnover to law enforcement. Our experts help expose integrity concerns at any level, enabling you to take decisive action as soon as possible.

Risk Assessments

Comprehensive cybersecurity Risk Assessment based on standards put forth by the National Institute for Standards and Technology, Center for Internet Security, and other regulatory agencies. Our proprietary 250+ data-point assessment tool will evaluate an organization’s complete cybersecurity posture, identify critical cybersecurity risks, and provide a comprehensive report detailing risk priorities and mitigation recommendations.

Governance, Risk Management and Compliance (GRC)

Leverage our ISACA certified professionals to develop your enterprise IT governance architecture and Enterprise-based Risk Management (ERM) system.  Risk assessments are the first step in compliance strategies and risk mitigation.  We can develop policy, conduct compliance audits, assessments, and provide solutions for:

  • NIST Cybersecurity Framework
  • CIS Controls
  • HIPAA Security Rule
  • NYS DFS 23 NYCRR 500
  • Cloud Computing Management
  • Mobile Computing
  • Bring Your Own Device (BYOD)
  • Data Privacy
  • VPN Security
  • Outsourced IT

Vulnerability Scans

Utilizing leading industry tools, such as Nessus Professional to probe and identify weaknesses in your network that would allow hackers and malicious actors to gain access to your confidential information. We specialize in scanning your entire network, externally and internally, including your web and mobile applications to identify vulnerabilities. The reports generated help prioritize risk and inform remediation decisions.Penetration Testing“White hat” hacking (authorized simulated attacks) to exploit weaknesses in your systems, networks, and applications. These penetration tests identify the full scope of risk and allow for effective decision-making in employing defenses. Our most common pen test engagements include the exploit of vulnerabilities found in an organization’s external and internal network, web application and wireless network. We specialize in social engineering penetration testing.

Data Recovery / Digital Forensics

Data loss happens all too frequently and with culprits ranging from ransomware attacks to power surges, it has the potential to have a major impact on your business and your reputation. We offer solutions to quickly recover:

  • Data from a damaged or corrupted hard drive
  • Deleted files and emails
  • Recovery keys for cryptocurrency wallets

Share via