Our Cloud Security Assessment is designed to assess your cloud hosted services for security weakness including misconfigurations, that can be exploited by an attacker to gain access to your service. We can assess the configuration of your Microsoft O365, Azure or AWS cloud environments and provide recommendations to help reduce your cyber risks.
​
With the move to remote working, the reliance on cloud services has increased dramatically, bringing with it increased cyber exposure. Many of the cloud security issues we come across are due to misconfiguration of cloud services, so it is vital that cloud assessments are included in your due diligence before you upload your data. Cloud providers tend to operate a ‘shared responsibility model’ so it is important to understand what you as the client are responsible for and what the cloud provider is responsible for.


A penetration test is an authorised test of a computer network or system and looks for security weaknesses. We can conduct penetration tests on your internal IT environment, perimeter network, Wi-Fi, Remote access, end user devices and cloud hosted services.
​
Our testers aim to identify publicly known vulnerabilities and common configuration faults in your IT system using the same tools and techniques as an attacker. The outcome from a penetration test is a report identifying the vulnerabilities, associated risks to your organisation and recommendations for remediation.
Phishing Assessments
Phishing is a commonly used technique by cyber criminals and can involve emails, text messaging, phone calls or social media. An attacker will attempt to trick users into doing ‘the wrong thing’, such as clicking a web link that will download malware or direct them to a malicious website. Phishing can also be used to trick users to disclose personal information or passwords which the attacker will use to masquerade as the user to gain access to valuable data on your system.
A key element in defending against phishing attacks is educating users to spot such attempts and report them. Our Phishing assessments are designed to test your user behaviour through simulated phishing attacks. We develop attack scenarios that are contextualised to your environment and report on agreed criteria such as which users were fooled by the attack and what information we managed to collect.


